Sunday, January 20, 2013

Mobile Communication Technology


2. EDGE: Enhanced Data Rates for GSM Evolution or EGPRS connection is a technology that has the highest rate of data transfer over GPRS. If the EDGE network is available in some places, there is no GPRS service is used as a substitute for EDGE.

3. Wi-Fi: Wireless Fidelity is a technology which uses wireless communication to transmit data, previously used Wi-Fi only with laptops and handhelds, but now a days it is also used in modern mobile phones that have Wi-Fi services. The advantage of using Wi-Fi is the transmission rate, and it can support up to 100 Mbps.

4. Bluetooth: Bluetooth is a technology used to transmit data between devices within a small range of 100 meters. The network formed from Bluetooth devices known as piconet. Bluetooth technology can be used to create connections between multiple devices resulting in machine to machine communication. At one point, seven devices can communicate via Bluetooth.

5. GSM: Global System for Mobile Communications technology is a technology of digital cellular network used in the second generation, but later 3G was achieved by increasing the speed circuit-switched network. GSM operates on different frequencies for 2G and 3G.

• 2G Network GSM operating in 850 MHz or 1900 MHz.
• 3G GSM network operating frequency of 2100MHz

Mechanisms Used in Data Communication


Secure HTTP (S-HTTP)

S-HTTP uses a different technology for SSL. After establishing the connection, the messages between the client and server are involved in a safe. this
provides the confidentiality, integrity and authentication. However, this technology is used more predominantly between clients and web servers.

Virtual Private Network (VPN)

VPNs are widely used in organizations to secure data transfers. They create secure data transfers by establishing secure tunnels through a public network (eg Internet). Organizations choose VPN, mainly due to its relatively low cost. ACME Widgets can build a VPN between headquarters and field sales offices. A carefully configured VPN can provide a very high level of confidentiality and sender authentication message integrity. VPNs typically use Layer 2 Tunneling Protocol (L2TP) for packet encapsulation.

Data Trunk Transmission


This way you can see the traffic, censor information and intelligence to do their job. Unfortunately, in doing so, also find and eliminate dissent - I do not like that concept in the United States because we believe in freedom and liberty above all, however, this is how they do in their countries. Okay so let's talk about this for a second if?

The NSA had a decent concept, which was approved by Congress and that it would channel the main information systems that manage Internet communications, fax, and voice traffic and enable a computer to read what's going through of this bottleneck. They call this system, Einstein 2 and 3. This makes sense, and this is a good way to do it. Why are they doing here in the United States? Well, in 2003, they were concerned about terrorism, and is a good way to find out who the bad guys are as communications from abroad.

Lately, it has been considered that once such a system was in place, you can also search malicious computer code, viruses, worms, or even what might infiltrate our software, banking, capital markets, military contractors or infrastructure. It would also help anyone with a computer connected to the Internet or via a smartphone, tablet, laptop, computer, or perhaps an entire IT system of catching a cold or virus as well. This all makes sense right? Sure, but you can imagine that those who wish to maintain privacy, ensuring freedom and liberty, especially freedom of expression are up in arms over this.Read More

Serial Data Communications


The "electronic brains" behind the data message is a dedicated silicon chip known as "Universal Asynchronous Receiver / Transmitter (UART). This chip is an interface between the parallel bus communications internal device and the serial port (' Com '). Some UART chips are able to cache large amounts of data from the computer bus while transmitting to serial ports at speeds up to 115 kbps approx.

The serial port connectors in use today contain 9 or 25-pin, with the pin assignment indicating a younger age modem for connection to the computer. The legacy of having dedicated pins for the transmission, reception and other control functions, allows serial data transmit and receive simultaneously, ie full duplex.

Naturally, the bidirectional communication is a great benefit, but only if the transmitter and the receiver can optimize the amount of data transmitted and the time intervals in which this is done. This important feature is known as "flow control" and is implemented by having a device to tell the other when and when not sending data, as in most USB to RS485 or RS232 RS485 converters.

In the world of communication specific hardware serial pins assigned to this function are: Data Terminal Ready (DTR) and Data Set Ready (DSR), Request To Send (RTS) and Clear To Send (CTS). By controlling these lines the device connected to the computer can react to a surge of data (beyond its cache to handle) by reducing the 'Clear To Send "(CTS) Pin Signal, knowing that their control CTS pin computer see the signal drops, and stop sending data.

Friday, January 18, 2013

Data Communication


Anyone interested in how networks are interconnected, enabling communication with a variety of different types of media.
Once you determine the data communication is the field for you and you have an idea of ​​what the occupation in the communications industry data you may want to pursue, you can begin to pursue their degree data communication .
ITT Technical Institute offers not only a much sought after degree in data communications, combining classroom study with real-world training, the institute also offers the option of obtaining your degree online communication of data, that makes it easy for you to balance your education data communication with their work and personal lives.

The data communication courses online have the same value as those offered in our classrooms. Here, you will not only learn the fundamentals of data communications, you can learn and know how to apply what you have learned. This makes obtaining employment and follow his career much easier after graduation.
If you choose to get your complete data communication degree online or in the classroom, you'll be on your way to a rewarding career that helps communicate computer networks, helping the world communicate business. Who knows, maybe you can help develop a simplified method for communication network or maybe even help transform the industry and how we communicate electronically.

Different Types Of Data Communication Media


2. Twisted Pair Cable

Twisted pair cables are available in two types and these include shielded and unshielded twisted pair cables. It is commonly used because it is lighter and cheaper. They consist of solid copper wire strands that help reduce vulnerability to electromagnetic interference and cross-talk shows. This type of cable is cheaper and can support up 100mps speed capability.

3. Optical fiber

Unlike other types of cables, optical fiber used for communicating electrical signals and comprises reflective coating which prevents the light loss in the core glass. Although it is very expensive and difficult to install fiber optic cables can support at least 2 Gbps and are not vulnerable to interference EMI. It has also very fast data transmission attenuation and very low in comparison with other data cables.
This type of data media networking involves multiple computers through a wireless connection. Creating a wireless connection is much easier as there is no physical connection is required and can connect multiple computers in a room. Unbounded media or using the air space as a transmission medium for electron waves. Some of the media are unlimited satellite radio, Bluetooth and Wi-Fi, among others. Installation of the wireless network is much easier and faster compared to limited media that require an expert to complete the setup. Through the wireless settings, you can also transfer large data files to any computer on the network from the unlimited media supports very high bandwidths as the wired network.
In general, in order to transmit data via networked computers, you will need to use either type of bounded or unbounded media. Depending on the type of network you want to create, suitable type of media is required to enable communication and proper consisted of data.

Wednesday, January 2, 2013

Surveillance Technologies


One of the most common is security cameras. When you decide that you need to buy a camera for security reasons, you should consider some important points. Once you can focus on what you need, find the element will be much easier.

If you are familiar with surveillance technologies, know what you need easier. However, for the amateur, to start from scratch. How do you plan to use security cameras to buy? If you intend to follow all of your outside his home, a camera may be just what you need.

For those who want to protect your home and make it as safe as possible, it might be a good idea to buy cameras for the interior and exterior of your home. Before you start shopping, have all areas inside and outside where you want to install security measures for monitoring.Read More

Cloud Computing and Data Security


Cloud computing is changing the way IT is delivered to businesses and how businesses can now leverage the technologies to be very nimble and agile, yet large. Cloud is a technology that maintains data and applications by making use of the internet and central remote servers. Cloud computing enables users to run their necessary applications without actually installing the software or hardware. The consumers can access their necessary files at any remote computer having internet access. This technology is handy as it facilitates efficient computing by a central storage, memory, process and bandwidth.

Cloud computing can be broken down into three components:
• "Application"
• "Storage"
• "Connectivity."

Each segment serves a different purpose and offers different products for businesses and individuals around the world.
Cloud computing has two primary deployment models. They are: Read More