SlideShare uma empresa Scribd logo
1 de 9
SMK TTDI JAYA
JALAN SASTERA U2/1, 40150 SHAH ALAM
S07
THE LATEST DEVELOPMENT IN NETWORKS AND COMMUNICATIONS
Prepared by:
Name: Syahzani Arinah binti Shaheran
IC Number: 991109-10-5632
Prepared for:
En. Kamal bin Lahami
1.0 INTRODUCTION
Computer networks and communications a telecommunications network which allows computers
to exchange data. In computer networks, networked computing devices exchange data with each
other along network links (data connections). The connections between nodes are established
using either cable media or wireless media. The best-known computer network is the Internet.
Network computer devices that originate, route and terminate the data are called network nodes.
Nodes can include hosts such as personal computers, phones, servers as well as networking
hardware. Two such devices can be said to be networked together when one device is able to
exchange information with the other device, whether or not they have a direct connection to each
other.
2.0 MOBILE COMPUTING
2.1 DEFINITION
Mobile computing is human–computer interaction by which a computer is expected to be
transported during normal usage. Mobile computing involves mobile communication, mobile
hardware, and mobile software. Communication issues include ad hoc and infrastructure
networks as well as communication properties, protocols, data formats and concrete
technologies. Hardware includes mobile devices or device components. Mobile software deals
with the characteristics and requirements of mobile applications. Mobile Computing is a
technology that allows transmission of data, voice and video via a computer or any other wireless
enabled device without having to be connected to a fixed physical link.
2.2 SPECIFICATIONS, SERVICES AND FREQUENCIES OF MOBILE
COMPUTING
ZTE Obsidian
(http://www.phonearena.com/phones/ZTE-Obsidian_id9566)
Latest released date of ZTE Obsidian is 13th August 2015
Specifications  UMTS (Universal Mobile Telecommunications System)
 HSDPA (High-Speed Downlink Packet Access)
 HSUPA (High-Speed Uplink Packet Access)
 GSM (Global System for Mobile Communication)
 EDGE (Enhanced Data GSM Environment)
 802.11 b/ g/ n Wi-Fi
 Bluetooth 4.0 wireless technology
Services  Browser (HTML, HTML5)
 YouTube (Upload)
 Music player (Playlists, MP3)
 Camera (5 megapixels)
 Camcorder (Video calling)
 Front-facing camera (2 megapixels)
 Speakers (Earpiece, Loudspeaker)
 Touchscreen (Capacitive, Multi-touch)
 Display (Physical size: 4.5 inches)
 Battery (Capacity: 1800 mAh)
Frequencies  GSM (850, 900, 1800, 1900 MHz)
 UMTS (850, 1700/2100, 1900 MHz)
 Wi-Fi (802.11 b,g,n)
 Bluetooth (4.0 GHz)
 FDD LTE (700 ,1700, 1900, 2100 MHz)
3.0 INTERNET TECHNOLOGY AND SERVICES
3.1 VoIP
VoIP is a methodology and group of technologies for the delivery of voice communications and
multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms
commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and
broadband phone service. VoIP systems employ session control and signaling protocols to
control the signaling, set-up, and tear-down of calls. Example of VoIP is teamspeak
(https://www.teamspeak.com)
3.2 BLOG
Blog is a discussion or informational site published on the World Wide Web and consisting of
discrete entries or post typically displayed in reverse chronological order (the most recent post
appears first). Until 2009, blogs were usually the work of a single individual occasionally of a
small group, and often covered a single subject. More recently "multi-author blogs" (MABs)
have developed, with posts written by large numbers of authors and professionally edited. MABs
from newspapers, other media outlets, universities, think tanks, advocacy groups and similar
institutions account for an increasing quantity of blog traffic. The rise of Twitter and other
"microblogging" systems helps integrate MABs and single-author blogs into societal new
streams. Blog can also be used as a verb, meaning to maintain or add content to a blog. Example
of blog is (http://www.thecluelessgirl.com/)
4.0 TYPES OF NETWORK
4.1 PAN
PAN is a computer network used for data transmission among devices such as computers,
telephones and personal digital assistants. PANs can be used for communication among the
personal devices themselves (intrapersonal communication), or for connecting to a higher level
network and the Internet (an uplink). The data cable is an example of the above PAN. This is
also a Personal Area Network because that connection is for the users personal use. PAN is used
for personal use only. In another usage, a personal area network (PAN) is a technology that could
enable wearable computer devices to communicate with other nearby computers and exchange
digital information using the electrical conductivity of the human body as a data network. For
example, two people each wearing business card-size transmitters and receivers conceivably
could exchange information by shaking hands. The transference of data through intra-body
contact, such as handshakes, is known as linkup. The human body's natural salinity makes it a
good conductor of electricity.
4.2 VPN
VPN extends a private network across a public network, such as the Internet. It enables users to
send and receive data across shared or public networks as if their computing devices were
directly connected to the private network, and thus are benefiting from the functionality, security
and management policies of the private network. A VPN is created by establishing a virtual
point-to-point connection through the use of dedicated connections, virtual tunneling protocols,
or traffic encryption. A VPN spanning the Internet is similar to a wide area network (WAN).
From a user perspective, the extended network resources are accessed in the same way as
resources available within the private network. Traditional VPNs are characterized by a point-to-
point topology, and they do not tend to support or connect broadcast domains. Therefore,
communication, software, and networking, which are based on OSI layer 2 and broadcast
packets, such as NetBIOS used in Windows networking, may not be fully supported or work
exactly as they would on a local area network (LAN). VPN variants, such as Virtual Private
LAN Service (VPLS), and layer 2 tunneling protocols, are designed to overcome this limitation.
4.3 WLAN
WLAN is a wireless computer network that links two or more devices using a wireless
distribution method (often spread-spectrum or OFDM radio) within a limited area such as a
home, school, computer laboratory, or office building. This gives users the ability to move
around within a local coverage area and still be connected to the network, and can provide a
connection to the wider Internet. Most modern WLANs are based on IEEE 802.11 standards,
marketed under the Wi-Fi brand name. Wireless LANs have become popular in the home due to
ease of installation and use, and in commercial complexes offering wireless access to their
customers; often for free. New York City, for instance, has begun a pilot program to provide city
workers in all five boroughs of the city with wireless Internet access. WLAN hardware initially
cost so much that it was only used as an alternative to cabled LAN in places where cabling was
difficult or impossible.
4.4 WIMAX
WiMAX is a family of wireless communications standards initially designed to provide 30 to 40
megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations.
The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to
promote conformity and interoperability of the standard. The forum describes WiMAX as "a
standards-based technology enabling the delivery of last mile wireless broadband access as an
alternative to cable and DSL". IEEE 802.16m or Wireless MAN-Advanced is a candidate for the
4G, in competition with the LTE Advanced standard. WiMAX supports mobile, nomadic and
fixed wireless applications. A mobile user, in this context, is someone in transit, such as a
commuter on a train. A nomadic user is one that connects on a portable device but does so only
while stationary -- for example, connecting to an office network from a hotel room and then
again from a coffee shop. Fixed wireless typically refers to wireless connectivity among non-
mobile devices in homes or businesses. According to the WiMAX forum, the group's aim is to
promote and certify compatibility and interoperability of devices based on the 802.16
specification, and to develop such devices for the marketplace.
5.0 CONCLUSION
Communication is one of the biggest advantages provided by the computer networks. Different
computer networking technology has improved the way of communications people from the
same or different organization can communicate in the matter of minutes for collaborating the
work activities. In offices and organizations computer networks are serving as the backbone of
the daily communication from top to bottom level of organization. Different types of software
can be installed which are useful for transmitting messages and emails at fast speed.
6.0 REFERENCES
 https://en.wikipedia.org/wiki/Computer_network
 https://en.wikipedia.org/wiki/Mobile_computing
 http://www.phonearena.com/phones/ZTE-Obsidian_id9566
 https://en.wikipedia.org/wiki/Blog

7.0 GROUP MEMBERS
 Syahzani Arinah binti Shaheran
 Nadiyah binti Ahmad Subki
 Khairunnisa binti Kamarulzaman

Mais conteúdo relacionado

Mais procurados

Template s07.1 [2015]
Template s07.1 [2015]Template s07.1 [2015]
Template s07.1 [2015]
Bazlin Ahmad
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
Prof. Othman Alsalloum
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4
jashleyfaye
 

Mais procurados (20)

Ecommerce Chap 07
Ecommerce Chap 07Ecommerce Chap 07
Ecommerce Chap 07
 
Bluetooth Broadcasting
Bluetooth BroadcastingBluetooth Broadcasting
Bluetooth Broadcasting
 
NETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGYNETWORK COMMUNICATION TECHNOLOGY
NETWORK COMMUNICATION TECHNOLOGY
 
networking tutorial
networking tutorialnetworking tutorial
networking tutorial
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Template s07.1 [2015]
Template s07.1 [2015]Template s07.1 [2015]
Template s07.1 [2015]
 
Siraj e commerce project
Siraj e commerce projectSiraj e commerce project
Siraj e commerce project
 
Telecommunication and networks
Telecommunication  and networksTelecommunication  and networks
Telecommunication and networks
 
Computer Networks Basics
Computer Networks BasicsComputer Networks Basics
Computer Networks Basics
 
A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...A novel password based mutual authentication technique for 4 g mobile communi...
A novel password based mutual authentication technique for 4 g mobile communi...
 
Manika
ManikaManika
Manika
 
Akki
AkkiAkki
Akki
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Telecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technologyTelecommunications, the internet, and wireless technology
Telecommunications, the internet, and wireless technology
 
Bluetooth
BluetoothBluetooth
Bluetooth
 
Mobile computing Assignment
Mobile computing AssignmentMobile computing Assignment
Mobile computing Assignment
 
Introduction To Mobile Computing
Introduction To Mobile ComputingIntroduction To Mobile Computing
Introduction To Mobile Computing
 
CSC 134
CSC 134CSC 134
CSC 134
 
Ae2da alvarado_cos4
Ae2da alvarado_cos4Ae2da alvarado_cos4
Ae2da alvarado_cos4
 
Pertemuan 8 mobile computing
Pertemuan 8   mobile computingPertemuan 8   mobile computing
Pertemuan 8 mobile computing
 

Destaque

Sabre (Fares Filing)
Sabre (Fares Filing)Sabre (Fares Filing)
Sabre (Fares Filing)
mirza_salman
 
Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...
Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...
Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...
Roberto Rabat Chame
 

Destaque (15)

Rossato 2015
Rossato 2015Rossato 2015
Rossato 2015
 
Pain
PainPain
Pain
 
GAME DEVE
GAME DEVEGAME DEVE
GAME DEVE
 
ZARA_WINTER coll
ZARA_WINTER collZARA_WINTER coll
ZARA_WINTER coll
 
Sabre (Fares Filing)
Sabre (Fares Filing)Sabre (Fares Filing)
Sabre (Fares Filing)
 
Certificate
CertificateCertificate
Certificate
 
Trabajo grupal compu
Trabajo grupal compuTrabajo grupal compu
Trabajo grupal compu
 
قادر رشيد(أبو شوان)..پشتئاشان بين الآلام والصمت
قادر رشيد(أبو شوان)..پشتئاشان بين الآلام والصمتقادر رشيد(أبو شوان)..پشتئاشان بين الآلام والصمت
قادر رشيد(أبو شوان)..پشتئاشان بين الآلام والصمت
 
Tcc versao-final-paloma-jacinto-da-silva-polo-orós-sem.-vii (1)
Tcc versao-final-paloma-jacinto-da-silva-polo-orós-sem.-vii (1)Tcc versao-final-paloma-jacinto-da-silva-polo-orós-sem.-vii (1)
Tcc versao-final-paloma-jacinto-da-silva-polo-orós-sem.-vii (1)
 
AGRISSÊNIOR nOTÍCIAS - Nº 586 an 23 agosto_2016.ok
AGRISSÊNIOR nOTÍCIAS - Nº 586 an  23 agosto_2016.okAGRISSÊNIOR nOTÍCIAS - Nº 586 an  23 agosto_2016.ok
AGRISSÊNIOR nOTÍCIAS - Nº 586 an 23 agosto_2016.ok
 
Paag 192
Paag 192Paag 192
Paag 192
 
Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...
Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...
Ceplac realiza ii encontro de produtores e técnicos sobre a cadeia produtiva ...
 
INFO491FinalPaper
INFO491FinalPaperINFO491FinalPaper
INFO491FinalPaper
 
نموذج سولو - التوازن النمو على المدى الطويل
نموذج سولو - التوازن النمو على المدى الطويلنموذج سولو - التوازن النمو على المدى الطويل
نموذج سولو - التوازن النمو على المدى الطويل
 
AHRA Communication Presentation
AHRA Communication PresentationAHRA Communication Presentation
AHRA Communication Presentation
 

Semelhante a ICTL

Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)
vishalmotwani
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
ajaymane22
 

Semelhante a ICTL (20)

Review of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network ProtocolsReview of Mobile Ad Hoc Network Protocols
Review of Mobile Ad Hoc Network Protocols
 
A017220112
A017220112A017220112
A017220112
 
Wireless and intranet
Wireless and intranetWireless and intranet
Wireless and intranet
 
final IT ppt.pptx
final IT ppt.pptxfinal IT ppt.pptx
final IT ppt.pptx
 
Work exp ( wireless netwrk)
Work exp ( wireless netwrk)Work exp ( wireless netwrk)
Work exp ( wireless netwrk)
 
What is soho network
What is soho networkWhat is soho network
What is soho network
 
Communication technology by nikund
Communication technology by nikundCommunication technology by nikund
Communication technology by nikund
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Pranjal Mishra ppt
Pranjal Mishra pptPranjal Mishra ppt
Pranjal Mishra ppt
 
Manet overview
Manet overviewManet overview
Manet overview
 
Presentation3 network
Presentation3 networkPresentation3 network
Presentation3 network
 
An Introduction To Computer Networking A Survey
An Introduction To Computer Networking  A SurveyAn Introduction To Computer Networking  A Survey
An Introduction To Computer Networking A Survey
 
Setting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subjectSetting-up-Computer-Networks in CSS subject
Setting-up-Computer-Networks in CSS subject
 
Cn
CnCn
Cn
 
Basic networking tutorial
Basic networking tutorialBasic networking tutorial
Basic networking tutorial
 
Cnetworks
CnetworksCnetworks
Cnetworks
 
fmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of networkfmxhnkmcjbg,lBasics of network
fmxhnkmcjbg,lBasics of network
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 
Networking tutorial
Networking tutorialNetworking tutorial
Networking tutorial
 
Basic lecture
Basic lectureBasic lecture
Basic lecture
 

Último

Último (20)

Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
NO1 Top Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Ex...
 
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptxOn_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
On_Translating_a_Tamil_Poem_by_A_K_Ramanujan.pptx
 
Single or Multiple melodic lines structure
Single or Multiple melodic lines structureSingle or Multiple melodic lines structure
Single or Multiple melodic lines structure
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 
SOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning PresentationSOC 101 Demonstration of Learning Presentation
SOC 101 Demonstration of Learning Presentation
 
How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17How to Add New Custom Addons Path in Odoo 17
How to Add New Custom Addons Path in Odoo 17
 
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...Kodo Millet  PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
Kodo Millet PPT made by Ghanshyam bairwa college of Agriculture kumher bhara...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Plant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptxPlant propagation: Sexual and Asexual propapagation.pptx
Plant propagation: Sexual and Asexual propapagation.pptx
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Sociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning ExhibitSociology 101 Demonstration of Learning Exhibit
Sociology 101 Demonstration of Learning Exhibit
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
Graduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - EnglishGraduate Outcomes Presentation Slides - English
Graduate Outcomes Presentation Slides - English
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 

ICTL

  • 1. SMK TTDI JAYA JALAN SASTERA U2/1, 40150 SHAH ALAM S07 THE LATEST DEVELOPMENT IN NETWORKS AND COMMUNICATIONS Prepared by: Name: Syahzani Arinah binti Shaheran IC Number: 991109-10-5632 Prepared for: En. Kamal bin Lahami
  • 2. 1.0 INTRODUCTION Computer networks and communications a telecommunications network which allows computers to exchange data. In computer networks, networked computing devices exchange data with each other along network links (data connections). The connections between nodes are established using either cable media or wireless media. The best-known computer network is the Internet. Network computer devices that originate, route and terminate the data are called network nodes. Nodes can include hosts such as personal computers, phones, servers as well as networking hardware. Two such devices can be said to be networked together when one device is able to exchange information with the other device, whether or not they have a direct connection to each other. 2.0 MOBILE COMPUTING 2.1 DEFINITION Mobile computing is human–computer interaction by which a computer is expected to be transported during normal usage. Mobile computing involves mobile communication, mobile hardware, and mobile software. Communication issues include ad hoc and infrastructure networks as well as communication properties, protocols, data formats and concrete technologies. Hardware includes mobile devices or device components. Mobile software deals with the characteristics and requirements of mobile applications. Mobile Computing is a technology that allows transmission of data, voice and video via a computer or any other wireless enabled device without having to be connected to a fixed physical link.
  • 3. 2.2 SPECIFICATIONS, SERVICES AND FREQUENCIES OF MOBILE COMPUTING ZTE Obsidian (http://www.phonearena.com/phones/ZTE-Obsidian_id9566) Latest released date of ZTE Obsidian is 13th August 2015 Specifications  UMTS (Universal Mobile Telecommunications System)  HSDPA (High-Speed Downlink Packet Access)  HSUPA (High-Speed Uplink Packet Access)  GSM (Global System for Mobile Communication)  EDGE (Enhanced Data GSM Environment)  802.11 b/ g/ n Wi-Fi  Bluetooth 4.0 wireless technology Services  Browser (HTML, HTML5)  YouTube (Upload)  Music player (Playlists, MP3)  Camera (5 megapixels)  Camcorder (Video calling)
  • 4.  Front-facing camera (2 megapixels)  Speakers (Earpiece, Loudspeaker)  Touchscreen (Capacitive, Multi-touch)  Display (Physical size: 4.5 inches)  Battery (Capacity: 1800 mAh) Frequencies  GSM (850, 900, 1800, 1900 MHz)  UMTS (850, 1700/2100, 1900 MHz)  Wi-Fi (802.11 b,g,n)  Bluetooth (4.0 GHz)  FDD LTE (700 ,1700, 1900, 2100 MHz) 3.0 INTERNET TECHNOLOGY AND SERVICES 3.1 VoIP VoIP is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, broadband telephony, and broadband phone service. VoIP systems employ session control and signaling protocols to control the signaling, set-up, and tear-down of calls. Example of VoIP is teamspeak (https://www.teamspeak.com)
  • 5. 3.2 BLOG Blog is a discussion or informational site published on the World Wide Web and consisting of discrete entries or post typically displayed in reverse chronological order (the most recent post appears first). Until 2009, blogs were usually the work of a single individual occasionally of a small group, and often covered a single subject. More recently "multi-author blogs" (MABs) have developed, with posts written by large numbers of authors and professionally edited. MABs from newspapers, other media outlets, universities, think tanks, advocacy groups and similar institutions account for an increasing quantity of blog traffic. The rise of Twitter and other "microblogging" systems helps integrate MABs and single-author blogs into societal new streams. Blog can also be used as a verb, meaning to maintain or add content to a blog. Example of blog is (http://www.thecluelessgirl.com/) 4.0 TYPES OF NETWORK 4.1 PAN
  • 6. PAN is a computer network used for data transmission among devices such as computers, telephones and personal digital assistants. PANs can be used for communication among the personal devices themselves (intrapersonal communication), or for connecting to a higher level network and the Internet (an uplink). The data cable is an example of the above PAN. This is also a Personal Area Network because that connection is for the users personal use. PAN is used for personal use only. In another usage, a personal area network (PAN) is a technology that could enable wearable computer devices to communicate with other nearby computers and exchange digital information using the electrical conductivity of the human body as a data network. For example, two people each wearing business card-size transmitters and receivers conceivably could exchange information by shaking hands. The transference of data through intra-body contact, such as handshakes, is known as linkup. The human body's natural salinity makes it a good conductor of electricity. 4.2 VPN VPN extends a private network across a public network, such as the Internet. It enables users to send and receive data across shared or public networks as if their computing devices were directly connected to the private network, and thus are benefiting from the functionality, security and management policies of the private network. A VPN is created by establishing a virtual point-to-point connection through the use of dedicated connections, virtual tunneling protocols, or traffic encryption. A VPN spanning the Internet is similar to a wide area network (WAN).
  • 7. From a user perspective, the extended network resources are accessed in the same way as resources available within the private network. Traditional VPNs are characterized by a point-to- point topology, and they do not tend to support or connect broadcast domains. Therefore, communication, software, and networking, which are based on OSI layer 2 and broadcast packets, such as NetBIOS used in Windows networking, may not be fully supported or work exactly as they would on a local area network (LAN). VPN variants, such as Virtual Private LAN Service (VPLS), and layer 2 tunneling protocols, are designed to overcome this limitation. 4.3 WLAN WLAN is a wireless computer network that links two or more devices using a wireless distribution method (often spread-spectrum or OFDM radio) within a limited area such as a home, school, computer laboratory, or office building. This gives users the ability to move around within a local coverage area and still be connected to the network, and can provide a connection to the wider Internet. Most modern WLANs are based on IEEE 802.11 standards, marketed under the Wi-Fi brand name. Wireless LANs have become popular in the home due to ease of installation and use, and in commercial complexes offering wireless access to their customers; often for free. New York City, for instance, has begun a pilot program to provide city workers in all five boroughs of the city with wireless Internet access. WLAN hardware initially cost so much that it was only used as an alternative to cabled LAN in places where cabling was difficult or impossible.
  • 8. 4.4 WIMAX WiMAX is a family of wireless communications standards initially designed to provide 30 to 40 megabit-per-second data rates, with the 2011 update providing up to 1 Gbit/s for fixed stations. The name "WiMAX" was created by the WiMAX Forum, which was formed in June 2001 to promote conformity and interoperability of the standard. The forum describes WiMAX as "a standards-based technology enabling the delivery of last mile wireless broadband access as an alternative to cable and DSL". IEEE 802.16m or Wireless MAN-Advanced is a candidate for the 4G, in competition with the LTE Advanced standard. WiMAX supports mobile, nomadic and fixed wireless applications. A mobile user, in this context, is someone in transit, such as a commuter on a train. A nomadic user is one that connects on a portable device but does so only while stationary -- for example, connecting to an office network from a hotel room and then again from a coffee shop. Fixed wireless typically refers to wireless connectivity among non- mobile devices in homes or businesses. According to the WiMAX forum, the group's aim is to promote and certify compatibility and interoperability of devices based on the 802.16 specification, and to develop such devices for the marketplace.
  • 9. 5.0 CONCLUSION Communication is one of the biggest advantages provided by the computer networks. Different computer networking technology has improved the way of communications people from the same or different organization can communicate in the matter of minutes for collaborating the work activities. In offices and organizations computer networks are serving as the backbone of the daily communication from top to bottom level of organization. Different types of software can be installed which are useful for transmitting messages and emails at fast speed. 6.0 REFERENCES  https://en.wikipedia.org/wiki/Computer_network  https://en.wikipedia.org/wiki/Mobile_computing  http://www.phonearena.com/phones/ZTE-Obsidian_id9566  https://en.wikipedia.org/wiki/Blog  7.0 GROUP MEMBERS  Syahzani Arinah binti Shaheran  Nadiyah binti Ahmad Subki  Khairunnisa binti Kamarulzaman