V3nom's
  • Welcome
  • Getting Started
    • CEH v13
    • Basics of Networking
      • Network Models
        • Application Layer in OSI ->
        • Presentation Layer in OSI ->
          • Comprehensive list of character encoding formats
        • Session Layer in OSI ->
        • Transport Layer in OSI ->
        • Network Layer in OSI ->
        • Data Link Layer in OSI ->
        • Physical Layer ->
    • Arch Linux Installation Guide
    • How to add VBoxLinuxAdditions.run in Debian Based Linux Distros
    • C# Programming Language
  • Research Papers
    • Word Embedding for Anomaly Detection
    • Build your own Redis
    • Blockchain Technology
    • Interactive blocks
    • OpenAPI
    • Integrations
  • Risk Analysis & Mitigation Notes
    • Risk Analysis & Mitigation
      • Unit 1: An Introduction to Risk Management
      • Unit 2: The Threat Assessment Process
      • Unit 3: Vulnerability Issues
      • Unit 4 ( Risk Analysis & Mitigation )
      • Unit 5 ( Risk Analysis & Mitigation )
  • Ethical Hacking
    • Ethical Hacking Syllabus
      • Unit I: Introduction ( English )
      • Unit I: Introduction ( Hinglish )
      • Unit II: The Business Perspective ( English )
      • Unit II: The Business Perspective ( Hinglish )
      • Unit III: Preparing for a Hack ( English )
      • Unit III: Preparing for a Hack ( Hinglish )
      • Unit IV: Enumeration ( English )
      • Unit IV: Enumeration ( Hinglish )
      • Unit V: Deliverables ( English )
      • Unit V: Deliverables ( Hinglish )
  • .NET Framework Notes
    • .NET Framework Syllabus
      • Unit - I ( Hinglish Version )
      • Unit - I ( English - Version for exams )
      • Unit - II ( Hinglish Version - For Understanding )
      • Unit - II (English Version - for papers)
      • Unit - III ( Hinghlish Version )
      • Unit - III ( English - Version )
      • Unit - IV ( Hinglish Version )
      • Unit - IV ( English Version )
      • Unit - V ( Hinglish Version )
      • Unit - V ( English Version )
  • IOT
    • unit 1
    • unit 2
    • unit 3
    • unit 4
    • unit 5
  • AD-Hoc and Wireless Networks
    • Unit 1 ( Hinglish )
    • unit 2 Hinglish
    • All assignments answers with questions
    • Mind Maps for All Questions
    • Page
  • Distributed Systems
    • Unit 1
    • Unit 2
    • Unit 3
    • Unit 4
    • Unit 5
  • Group 1
    • 1’s and 2’s Complement
    • Direct Memory Access
    • Register Transfer Level
    • Interrupt-Based Input/Output (I/O)
    • Memory and CPU Design
    • Instruction Cycle
    • Addressing Modes
    • Pipelining
    • Three Types of Hazards
    • All Types of Differences Tables
    • Parallel Processing
    • Addition/Subtraction Conversion
    • Data Representation
    • Page 1
Powered by GitBook
On this page
  • 1. Ad Hoc Networks
  • 2. Characteristics of Wireless Channel
  • 3. Modulation Techniques
  • 4. Multiple Access Techniques
  • 5. Voice Coding
  • 6. Error Control
  • 7. Computer Networks
  • 8. Computer Networks Software
  • 9. Computer Network Architecture
  • 10. IEEE 802 Networking Standards
  • 11. Fundamentals of WLANs
  • 12. Bluetooth
  1. AD-Hoc and Wireless Networks

Unit 1 ( Hinglish )

1. Ad Hoc Networks

Definition

Ad Hoc network ek self-organizing wireless network hai jo bina kisi centralized control ya fixed infrastructure ke devices ko directly connect karta hai. Har device ek node ki tarah kaam karta hai jo signal transmit aur receive kar sakta hai.

Characteristics

  1. Dynamic Topology: Devices apne positions ko frequently change karte hain, jo network ki structure ko dynamically adjust karta hai.

  2. Decentralized Control: Kisi fixed base station ki zarurat nahi hoti. Har device independent hai aur ek dusre ke sath direct communicate karta hai.

  3. Multi-hop Communication: Agar source aur destination ke beech direct link nahi ho, toh middle nodes signal ko relay karte hain.

  4. Energy Constraints: Devices battery-operated hoti hain, isliye power optimization bahut zaruri hota hai.

  5. Limited Scalability: Bade networks me performance degrade hone lagti hai kyunki har node ko zyada traffic handle karna padta hai.

  6. Self-Healing: Agar koi node fail ho jaye, toh network automatically alternate path find kar leta hai.

Applications

  1. Disaster Recovery: Bina infrastructure ke quickly communication setup karne ke liye, jaise earthquakes ya floods ke baad.

  2. Military Operations: Battlefield me soldiers aur equipment ke beech secure communication.

  3. IoT (Internet of Things): Smart homes aur industrial IoT devices ke beech local communication.

  4. Healthcare: Emergency situations me mobile medical units ko connect karna.

  5. Vehicular Networks (VANETs): Cars ke beech direct communication for traffic management.


Real-World Example

Ek trekking group jungle me gaya hai jaha mobile towers ka signal nahi aa raha. Har trekker ke paas ek walkie-talkie hai jo directly ek dusre se connect kar raha hai bina kisi centralized tower ke. Ye ek Ad Hoc network ka perfect example hai.


Advantages

  1. Cost-Effective: Infrastructure ki zarurat nahi hoti, toh cost kam hoti hai.

  2. Quick Deployment: Easily aur quickly deploy kiya ja sakta hai.

  3. Flexibility: Dynamic topology ki wajah se flexible communication possible hai.

Disadvantages

  1. Limited Range: Long-range communication ke liye suitable nahi hai.

  2. Security Risks: Bina centralized control ke, unauthorized access ka risk hota hai.

  3. Energy Drain: Nodes ki battery jaldi khatam ho sakti hai.


Diagram

[Node A] <-----> [Node B] <-----> [Node C]
(Source)          (Relay)      (Destination)

Mind Map

Ad Hoc Networks
    ├── Definition: Wireless network without infrastructure
    ├── Characteristics:
    │    ├── Dynamic Topology
    │    ├── Decentralized Control
    │    ├── Multi-hop Communication
    │    ├── Energy Constraints
    ├── Applications:
    │    ├── Disaster Recovery
    │    ├── Military Operations
    │    ├── IoT
    │    ├── Healthcare
    │    └── VANETs
    ├── Advantages:
    │    ├── Cost-Effective
    │    ├── Quick Deployment
    │    └── Flexible
    ├── Disadvantages:
    │    ├── Limited Range
    │    ├── Security Risks
    │    └── Energy Drain
    └── Example: Walkie-talkie in a trekking group

2. Characteristics of Wireless Channel

Wireless communication ka backbone wireless channel hai, jo ek medium ke roop me kaam karta hai jaha electromagnetic waves travel karti hain. Lekin ye wired communication ke mukable unique aur complex hai.


Key Characteristics

1. Path Loss

  • Definition: Signal ki power distance ke sath kam hoti hai.

  • Cause: Signal air me spread hota hai aur obstacles (buildings, trees) ki wajah se weaken hota hai.

  • Real-Life Example: Ek radio station ka signal city ke andar kam ho jata hai compared to open highways.

2. Shadowing

  • Definition: Signal strength obstructed hoti hai jab signal ek large obstacle (like a building) ke piche ho.

  • Effect: Signal kuch areas me completely block ho sakta hai.

  • Real-Life Example: Ghar ke andar mobile signal weak hona jab ghar ek tower ke piche ho.

3. Multipath Fading

  • Definition: Signal multiple paths se receiver tak pahuchta hai (reflections, scattering), jisse constructive ya destructive interference hoti hai.

  • Effect: Signal ki strength up and down hoti rehti hai.

  • Real-Life Example: FM radio signals ka "distort" hona jab car move kar rahi ho.

4. Doppler Effect

  • Definition: Signal ki frequency me change aata hai jab transmitter aur receiver ek dusre ke relative motion me hote hain.

  • Effect: High-speed communication networks me errors badhne lagte hain.

  • Real-Life Example: Train ke andar mobile signal ka fluctuate hona.

5. Noise and Interference

  • Definition: Wireless channels me unwanted signals (noise) aur dusre devices ke signals (interference) hoti hain jo data transmission ko disrupt karte hain.

  • Real-Life Example: Bluetooth aur Wi-Fi ek hi frequency band (2.4 GHz) par hone ki wajah se interference hona.

6. Limited Bandwidth

  • Definition: Wireless spectrum finite hai, jo har user ke liye bandwidth ki availability limit karta hai.

  • Effect: Bandwidth ke limitation ki wajah se network slow ho sakta hai.

  • Real-Life Example: Public Wi-Fi par speed ka kam ho jana jab zyada log connected ho.


Advantages of Wireless Channels

  1. Mobility: Devices ko move karne ki freedom.

  2. Scalability: Easily new devices add kiya ja sakta hai.

  3. Cost Reduction: Wires ki zarurat nahi.


Disadvantages of Wireless Channels

  1. Signal Degradation: Distance aur obstacles ki wajah se quality kam hoti hai.

  2. Security Risks: Unauthorized access ka risk zyada hota hai.

  3. Interference Issues: Multiple devices ka ek hi frequency par kaam karna.


Diagram

Transmitter --> Path Loss --> Shadowing --> Multipath Fading --> Receiver
                    \--> Noise & Interference / Doppler Effect

Mind Map

Wireless Channel Characteristics
    ├── Path Loss
    │    ├── Signal weakens with distance
    │    └── Example: Radio signal weak in urban areas
    ├── Shadowing
    │    ├── Obstruction by buildings/objects
    │    └── Example: Mobile signal blocked indoors
    ├── Multipath Fading
    │    ├── Multiple paths causing interference
    │    └── Example: FM signal distortion in cars
    ├── Doppler Effect
    │    ├── Frequency shift due to motion
    │    └── Example: Signal fluctuating in a moving train
    ├── Noise & Interference
    │    ├── Unwanted signals and device interference
    │    └── Example: Wi-Fi and Bluetooth interference
    └── Limited Bandwidth
         ├── Finite spectrum limits data transfer
         └── Example: Slow public Wi-Fi during peak hours

3. Modulation Techniques

Wireless communication me, modulation ka matlab hai carrier signal ki properties (amplitude, frequency, phase) ko modify karke data transmit karna. Yeh technique signal transmission ko efficient aur reliable banati hai.


Types of Modulation Techniques

1. Amplitude Modulation (AM)

  • Definition: Signal ki amplitude (strength) ko change karke information encode ki jati hai, frequency aur phase constant rehti hai.

  • Advantages:

    • Simple implementation.

    • Long-distance communication possible.

  • Disadvantages:

    • Noise kaafi zyada affect karta hai.

    • Power efficiency low hoti hai.

  • Real-Life Example: AM radio broadcasting.


2. Frequency Modulation (FM)

  • Definition: Carrier signal ki frequency ko modify karke data encode kiya jata hai, amplitude constant rehta hai.

  • Advantages:

    • Noise resistance zyada hoti hai.

    • Better sound quality compared to AM.

  • Disadvantages:

    • Complex hardware required.

    • High bandwidth usage.

  • Real-Life Example: FM radio (88–108 MHz band).


3. Phase Modulation (PM)

  • Definition: Carrier signal ki phase ko modify kiya jata hai, amplitude aur frequency constant rehte hain.

  • Advantages:

    • Noise immunity moderate hoti hai.

    • Efficient for digital communication.

  • Disadvantages:

    • Complex implementation.

  • Real-Life Example: Wi-Fi and Bluetooth communication.


4. Quadrature Amplitude Modulation (QAM)

  • Definition: Amplitude aur phase modulation ka combination hota hai. Ek hi carrier signal par zyada data encode kiya ja sakta hai.

  • Advantages:

    • High data rate transmission.

    • Efficient bandwidth utilization.

  • Disadvantages:

    • Noise sensitivity high hoti hai.

  • Real-Life Example: 4G LTE networks.


5. Pulse Code Modulation (PCM)

  • Definition: Analog signals ko discrete digital signals me convert karke transmit karte hain.

  • Advantages:

    • Digital systems ke liye best suited.

    • Noise immunity zyada hoti hai.

  • Disadvantages:

    • High bandwidth requirement.

  • Real-Life Example: Voice transmission in telephony.


Why Modulation is Necessary?

  1. Long-Distance Transmission: Direct low-frequency signals ko transmit karna inefficient hota hai.

  2. Frequency Multiplexing: Multiple signals ko ek saath transmit karne ke liye alag frequencies assign hoti hain.

  3. Noise Reduction: Modulated signals noise ke against better resist karte hain.


Mind Map

Modulation Techniques
    ├── Amplitude Modulation (AM)
    │    ├── Changes amplitude
    │    ├── Simple implementation
    │    └── Example: AM radio
    ├── Frequency Modulation (FM)
    │    ├── Changes frequency
    │    ├── Noise resistance
    │    └── Example: FM radio
    ├── Phase Modulation (PM)
    │    ├── Changes phase
    │    ├── Efficient for digital
    │    └── Example: Wi-Fi
    ├── Quadrature Amplitude Modulation (QAM)
    │    ├── Combines amplitude & phase
    │    ├── High data rates
    │    └── Example: 4G LTE
    └── Pulse Code Modulation (PCM)
         ├── Converts analog to digital
         ├── Best for voice/data
         └── Example: Telephony

4. Multiple Access Techniques

Wireless communication me multiple access techniques ka use hota hai ek hi communication medium par multiple users ke signals efficiently transmit karne ke liye. Yeh techniques ensure karti hain ki interference minimize ho aur bandwidth ka efficient utilization ho.


Types of Multiple Access Techniques

1. Frequency Division Multiple Access (FDMA)

  • Definition: Available bandwidth ko multiple frequency bands me divide karke users ko allocate kiya jata hai.

  • How It Works: Har user apna unique frequency band use karta hai.

  • Advantages:

    • Simple implementation.

    • Real-time communication support karta hai.

  • Disadvantages:

    • Bandwidth wastage hota hai.

    • Interference between adjacent frequency bands ho sakta hai.

  • Real-Life Example: Traditional analog cellular networks.


2. Time Division Multiple Access (TDMA)

  • Definition: Time slots assign karke multiple users ek hi frequency band share karte hain.

  • How It Works: Users ko fixed time slots me data transmit karne ki permission milti hai.

  • Advantages:

    • Spectral efficiency zyada hoti hai.

    • Cost-effective implementation.

  • Disadvantages:

    • Synchronization required hota hai.

    • Delay-sensitive applications ke liye suitable nahi.

  • Real-Life Example: 2G GSM systems.


3. Code Division Multiple Access (CDMA)

  • Definition: Sabhi users ek hi frequency band share karte hain, lekin alag-alag codes use karke data transmit hota hai.

  • How It Works: Data ko pseudo-random codes ke saath modulate kiya jata hai, jisse har user ka data unique ban jata hai.

  • Advantages:

    • Interference immunity zyada hoti hai.

    • High data capacity handle kar sakta hai.

  • Disadvantages:

    • Complex implementation.

    • Power control issues ho sakte hain.

  • Real-Life Example: 3G cellular systems.


4. Orthogonal Frequency Division Multiple Access (OFDMA)

  • Definition: Available frequency spectrum ko orthogonal sub-carriers me divide karke users ko allocate kiya jata hai.

  • How It Works: Har user ek ya zyada sub-carriers par data transmit karta hai.

  • Advantages:

    • Efficient for high-speed data transmission.

    • Frequency-selective fading ke against resistant.

  • Disadvantages:

    • Synchronization complex hota hai.

    • High peak-to-average power ratio issues.

  • Real-Life Example: 4G LTE networks, Wi-Fi (802.11ax).


5. Space Division Multiple Access (SDMA)

  • Definition: Users ko spatial domain me segregate karke data transmit kiya jata hai.

  • How It Works: Antennas ki beamforming capabilities ka use hota hai to direct signals to specific users.

  • Advantages:

    • Bandwidth reuse possible hota hai.

    • Signal interference minimize hoti hai.

  • Disadvantages:

    • Advanced antenna systems ki zarurat hoti hai.

  • Real-Life Example: Satellite communication systems.


Comparison of Multiple Access Techniques

Technique
Key Feature
Example
Advantage
Limitation

FDMA

Divides frequencies

Analog networks

Simple implementation

Wastes bandwidth

TDMA

Divides time slots

2G GSM

Spectral efficiency

Needs synchronization

CDMA

Unique codes for users

3G networks

High capacity

Power control issues

OFDMA

Orthogonal sub-carriers

4G LTE

Efficient for high speeds

Complex synchronization

SDMA

Spatial domain allocation

Satellites

Minimizes interference

Needs advanced systems


Why Are Multiple Access Techniques Important?

  1. Efficient Resource Utilization: Spectrum ko effectively divide karte hain.

  2. Minimizes Interference: Techniques ka use karke interference ko reduce karte hain.

  3. Supports Multiple Users: Large number of users ko ek system par support karta hai.


Mind Map

Multiple Access Techniques
    ├── FDMA
    │    ├── Divides frequencies
    │    ├── Simple implementation
    │    └── Example: Analog networks
    ├── TDMA
    │    ├── Divides time slots
    │    ├── Cost-effective
    │    └── Example: 2G GSM
    ├── CDMA
    │    ├── Unique codes for users
    │    ├── High capacity
    │    └── Example: 3G networks
    ├── OFDMA
    │    ├── Orthogonal sub-carriers
    │    ├── High-speed data
    │    └── Example: 4G LTE
    └── SDMA
         ├── Uses spatial domain
         ├── Bandwidth reuse
         └── Example: Satellites

5. Voice Coding

Voice coding ka goal hai voice signals ko compress karna, taaki data efficiently transmit kiya ja sake. Voice coding important hai wireless communication me, jahan bandwidth limited hota hai. Iska use voice signals ko encode karne ke liye hota hai, jisse communication mein efficiency improve hoti hai.

Voice Coding Techniques:

  1. PCM (Pulse Code Modulation)

    • Definition: PCM ek digital representation hai analog voice signal ka. Voice ko samples mein convert kiya jata hai, fir un samples ko binary form me represent kiya jata hai.

    • Working: Voice signal ko ek fixed interval me sample kiya jata hai aur har sample ko quantize karte hain.

    • Advantage: Simple aur reliable technique.

    • Disadvantage: High bandwidth consumption.

    • Real-Life Example: Landline phones.

  2. ADPCM (Adaptive Differential Pulse Code Modulation)

    • Definition: PCM ka optimized version hai jisme ek sample ke comparison me dusra sample calculate kiya jata hai, isse data compression achieve hota hai.

    • Working: ADPCM voice signal ko represent karne ke liye ek adaptive method use karta hai, jisme previous sample aur present sample ke difference ko encode kiya jata hai.

    • Advantage: Bandwidth ki savings.

    • Disadvantage: Slightly complex implementation.

    • Real-Life Example: Used in mobile networks for better bandwidth utilization.

  3. CELP (Code Excited Linear Prediction)

    • Definition: CELP voice coding technique hai jo speech signal ko efficiently represent karti hai by predicting the speech waveform and encoding the prediction error.

    • Working: Voice signal ko model kiya jata hai using linear prediction techniques aur fir error ko encode kiya jata hai.

    • Advantage: High-quality voice compression.

    • Disadvantage: High complexity.

    • Real-Life Example: VoIP calls.

Mind Map

Voice Coding
    ├── PCM
    │    ├── Simple, reliable
    │    └── Example: Landline phones
    ├── ADPCM
    │    ├── Efficient compression
    │    └── Example: Mobile networks
    └── CELP
         ├── High-quality compression
         └── Example: VoIP calls

6. Error Control

Error Control ka objective hai transmission me hone wale errors ko detect aur correct karna. Wireless networks me, noise aur interference ke kaaran errors zyada hote hain, isliye error control systems essential hote hain.

Error Control Techniques:

  1. Error Detection

    • Definition: Error detection techniques ka use data transmission me errors ko identify karne ke liye hota hai.

    • Methods:

      • Parity Bit: Ek extra bit add karte hain jo total bits ka even ya odd hona ensure karta hai.

      • Checksums: Data ka sum calculate karke transmission ke baad validate kiya jata hai.

    • Advantage: Simple aur fast.

    • Disadvantage: Errors ko fix nahi kar sakte.

  2. Error Correction

    • Definition: Error correction techniques me errors ko detect karne ke baad unhe automatically correct bhi kiya jata hai.

    • Methods:

      • Hamming Code: Parity bits ko strategically place karke single-bit errors ko correct karte hain.

      • Reed-Solomon Code: Error correction ka advanced technique, commonly used in CDs, DVDs.

    • Advantage: Errors ko automatically correct karte hain.

    • Disadvantage: Complex aur bandwidth overhead.

  3. ARQ (Automatic Repeat Request)

    • Definition: ARQ ek retransmission-based error correction method hai. Jab receiver ko data me error milta hai, wo sender ko request bhejta hai data ko dubara bhejne ke liye.

    • Advantage: Effective for reliable communication.

    • Disadvantage: Delay aur bandwidth consumption.

Mind Map

 Error Control
    ├── Error Detection
    │    ├── Parity Bit
    │    └── Checksum
    ├── Error Correction
    │    ├── Hamming Code
    │    └── Reed-Solomon Code
    └── ARQ
         ├── Retransmission-based
         └── Example: Reliable communication

7. Computer Networks

Computer Networks ka mtlb hai ek group of computers ko connect karna jisse wo data exchange kar sakein. Ye network physical aur logical components ka combination hote hain jo communication facilitate karte hain.

Types of Computer Networks:

  1. LAN (Local Area Network)

    • Definition: Small geographical area me computers ko connect karna.

    • Characteristics: High-speed data transfer, limited to a building or a campus.

    • Examples: Office networks, home Wi-Fi networks.

  2. WAN (Wide Area Network)

    • Definition: LANs ko geographically distant locations tak connect karna.

    • Characteristics: Covers large geographical areas, slower speed compared to LAN.

    • Examples: The Internet, corporate networks.

  3. MAN (Metropolitan Area Network)

    • Definition: A network spread across a city or a large campus.

    • Characteristics: Larger than LAN but smaller than WAN, high-speed communication.

    • Examples: City-wide Wi-Fi networks.

  4. PAN (Personal Area Network)

    • Definition: Personal devices ko connect karne ke liye chhoti network.

    • Characteristics: Short-range communication, low power consumption.

    • Examples: Bluetooth devices.


Mind Map

Computer Networks
    ├── LAN
    │    └── Small area, high-speed
    ├── WAN
    │    └── Large area, Internet
    ├── MAN
    │    └── City-wide network
    └── PAN
         └── Personal device connection

8. Computer Networks Software

Computer Networks Software ka use network devices ke beech communication ko manage aur control karne ke liye hota hai. Ye software typically operating systems, protocol stacks, aur management tools ko include karta hai.

Types of Network Software:

  1. Operating Systems

    • Definition: Networking operating systems wo OS hain jo computers ko networked devices se connect karte hain.

    • Examples: Windows Server, Linux, macOS.

  2. Protocol Stacks

    • Definition: Protocol stack ek set hota hai networking protocols ka jo ek specific task perform karte hain, jaise data transmission, error correction, etc.

    • Example: OSI model (7 layers), TCP/IP stack.

  3. Network Management Software

    • Definition: Ye software network ki health ko monitor karta hai aur troubleshoot karne me madad karta hai.

    • Examples: Wireshark, SolarWinds, Nagios.

Mind Map

Computer Networks Software
    ├── Operating Systems
    ├── Protocol Stacks
    └── Network Management Software

9. Computer Network Architecture

Computer Network Architecture ka matlab hai network ka structure aur design. Ye hardware, software, aur protocols ka combination hota hai jisse network devices ek dusre se communicate karte hain.

Key Aspects:

  1. Client-Server Model

    • Definition: Isme ek centralized server hota hai jo multiple clients ko services provide karta hai.

    • Example: Web servers serving websites to clients.

  2. Peer-to-Peer (P2P) Model

    • Definition: Isme har node (device) client aur server dono roles perform karta hai.

    • Example: File-sharing systems like BitTorrent.

  3. Hybrid Models

    • Definition: Ye models client-server aur peer-to-peer ka combination hote hain.

    • Example: Cloud services like Google Drive.

Mind Map


Computer Network Architecture
    ├── Client-Server Model
    ├── Peer-to-Peer Model
    └── Hybrid Models


10. IEEE 802 Networking Standards

IEEE 802 standards define karte hain ki wireless aur wired networks kaise work karte hain. In standards ka use communication protocols, physical layer aur data link layer ke liye hota hai.

Key IEEE 802 Standards:

  1. IEEE 802.3 (Ethernet)

    • Definition: Ethernet standard ka use wired LANs me hota hai.

    • Speed: 10 Mbps to 400 Gbps.

  2. IEEE 802.11 (Wi-Fi)

    • Definition: Wireless Local Area Network (WLAN) ka standard, jo wireless communication ko define karta hai.

    • Speed: 2 Mbps to 9.6 Gbps.

  3. IEEE 802.15 (Bluetooth)

    • Definition: Bluetooth standard ko short-range wireless communication ke liye define kiya gaya hai.

    • Range: 10 meters.

  4. IEEE 802.16 (WiMAX)

    • Definition: WiMAX ek broadband wireless standard hai jo metropolitan area networks (MAN) me use hota hai.

    • Speed: 75 Mbps to 1 Gbps.

Mind Map


IEEE 802 Networking Standards
    ├── IEEE 802.3 (Ethernet)
    ├── IEEE 802.11 (Wi-Fi)
    ├── IEEE 802.15 (Bluetooth)
    └── IEEE 802.16 (WiMAX)

11. Fundamentals of WLANs

WLAN (Wireless Local Area Network) ka use wireless devices ko ek local area me connect karne ke liye hota hai. Ye typically Wi-Fi technology pe based hota hai.

Key Concepts in WLAN:

  1. Access Points (AP)

    • Definition: AP ek device hota hai jo wireless devices ko wired LAN se connect karta hai.

    • Function: AP signals ko transmit karte hain aur devices ko network se connect karte hain.

  2. Wi-Fi Standards (IEEE 802.11)

    • Definition: WLANs ko IEEE 802.11 standards ke according design kiya jata hai.

    • Frequency Bands: 2.4 GHz aur 5 GHz.

  3. Security in WLAN

    • WEP (Wired Equivalent Privacy): Old security protocol, but less secure.

    • WPA (Wi-Fi Protected Access): Improved security mechanism.

    • WPA2: Current standard for Wi-Fi security.

Mind Map


Fundamentals of WLANs
    ├── Access Points (AP)
    ├── Wi-Fi Standards
    └── WLAN Security

12. Bluetooth

Bluetooth ek wireless technology hai jo short-range communication ke liye use hoti hai. Iska use devices ko connect karne ke liye kiya jata hai, jaise headphones, keyboards, aur mobile phones.

Bluetooth Key Features:

  1. Low Power Consumption

    • Definition: Bluetooth devices low power pe kaam karte hain, isliye unka battery life zyada hota hai.

    • Example: Bluetooth headphones.

  2. Short Range

    • Range: 100 meters tak.

  3. Device Pairing

    • Definition: Bluetooth devices ko ek secure connection establish karne ke liye pair kiya jata hai.

    • Example: Pairing your phone with a Bluetooth speaker.

  4. Bluetooth Versions

    • Bluetooth 1.0: Oldest version, slower data rates.

    • Bluetooth 4.0 (BLE): Low Energy Bluetooth for IoT devices.

    • Bluetooth 5.0: Increased range and speed.


Mind Map

Bluetooth
    ├── Low Power Consumption
    ├── Short Range
    ├── Device Pairing
    └── Bluetooth Versions

Previousunit 5Nextunit 2 Hinglish

Last updated 4 months ago