You are on page 1of 7

CDMA: Code Division Multiple Access

Code Division Multiple Access is a channel access method used by several radio
communication technologies. It is a digital cellular technology and an example of multiple
access. It is generally used for mobile communication.

Multiple access means that several transmitters can send information simultaneously over
a single communication channel. In this system, different CDMA codes are assigned to
different users and the user can access the whole bandwidth for the entire duration.

Difference between CDMA and GSM


Criteria CDMA GSM

Technology CDMA is based on GSM operates on the wedge spectrum. it uses both
spread-spectrum time division multiple access (TDMA) and frequency
technology which makes division multiple access (fdma). TDMA provide multi-
the optimum use of user access by cutting up the channel into different
available bandwidth. time slice and fdma provides the multi-user access by
separating the used frequency.

Security CDMA is more secure GSM is less secure than CDMA.


than GSM.

Global reach CDMA is used in usa and GSM is used over 80% of the world network in over
some part of canada and 210 countries.
japan. CDMA is used only
GSM is used 76% of the users worldwide.
by 24% of the users
worldwide.

Data CDMA has faster data GSM has slower data transfer as compared to CDMA.
Transfer transfer as compared to
Rate GSM.

Radiation CDMA phones emits less GSM phones emits continuous wave pulses and emits
exposure radiation than GSM almost 28 times more radiation than CDMA phones.
phones.

ISDN - Integrated Services Digital Network


ISDN is a set of protocols that is based on high-speed fully digitized telephone service. The main
aim of ISDN is to provide a fully integrated digital service to the users.
These are a set of communication standards for simultaneous digital transmission
of voice, video, data, and other network services over the traditional circuits of the
public switched telephone network. Before ISDN, the telephone system was seen
as a way to transmit voice, with some special services available for data. The
main feature of ISDN is that it can integrate speech and data on the same lines,
which were not available in the classic telephone system. 

ISDN is a circuit-switched telephone network system, but it also provides access


to packet-switched network.

GPRS: General Packet Radio Service


GPRS stands for General Packet Radio Service. It is a packet oriented wireless data
communication service for mobile communications on 2G and 3G cellular communication
systems. It is non-voice, high speed packet switching technology intended for GSM
networks.

It is based on a modulation technique called Gaussian minimum-shift keying (GMSK). To


enable GPRS on a GSM or TDMA network, we are required to add two core modules: the
Gateway GPRS Service Node (GGSN) and the Serving GPRS Service Node (SGSN).

GPRS can be used to provide connections on the basis of internet protocols that support a
wide variety of enterprises as well as commercial applications.

Benefits of GPRS
o It provides higher data transfer speed
o It provides instant connection and immediate data transfer.
o It is very cost-effective.
o It has innovative and superior applications. It provides internet applications over mobile and
also facilitates Web browsing, IM messages, E- commerce etc

GPRS is considered as 2.5G technology because it is more advanced than standard 2G


digital technology, but does not meet the requirements of 3G technology.

Satellite
o A satellite is an artificial object which is placed intentionally into an orbit of any natural
satellite. Satellites are used for many purposes i.e. weather forecasting, digital transmission,
scientific research and development etc.
o In a communication context, a satellite is a specialized wireless transmitter/receiver that is
launched by a rocket and placed in orbit around the earth.
o A satellite can be natural, like the moon, or artificial (human made). So we can say that a
satellite is an object that moves in a curved path around a planet.
Below are 13 of the most common server types used today:

 Application Servers. ...


 Client Servers. ...
 Collaboration Servers. ...
 FTP Servers. ...
 List Servers. ...
 Mail Servers. ...
 Open Source Servers. ...
 Proxy Servers.

What is a Proxy Server?


A proxy server is a computer that offers a service to allow clients to make indirect network
connections to the other network services. A client connects to the proxy server, and then requests
a connection, file, or other resource available on a different server.
Then the proxy provides the required resource either by connecting to the specified server or by
obtaining through its cache.

Advantages
The advantages of a proxy server are as follows −
o It helps the clients to protect their important information from getting hacked by
hackers.
o The proxy server is also used to enhance the security and privacy level of the client's
device while surfing by using different proxies.
o Proxy servers can be used any number of times for speeding up the browsing and
access data because of their good cache system.
o As the cache system of a proxy server is very good, when you access any websites
using a proxy server, it is having the chance to store your desired data in their cache
system. As a result we can access them whenever we want.
o A proxy server is also used in bypassing blocked websites.
Working of a Proxy
When we type a website name, say Google.com or alibaba.com, the ISP (Internet Service Provider)
establishes a request and connects to the destination computer by exposing the requestor IP
address.
If we use proxy our requests get redirected. That is, the request goes from the client computer to
the ISP but it is sent to the proxy server instead of hitting the website directly. Thus, for external
systems the requestor IP address is the proxy IP, but not the real client computer IP address which
is masked.

Need of Proxy
We should use proxy for the following reasons:
Speedy Internet access
Controlled access
Balancing traffic
Improved Security
Privacy Benefits
Get access to blocked resources.

Mail Server
A mail server is a computer system that sends and receives email. In
many cases, web servers and mail servers are combined in a single
machine. However, large ISPs and public email services (such as Gmail
and Hotmail) may use dedicated hardware for sending and receiving
email.

In order for a computer system to function as a mail server, it must


include mail server software. This software allows the system
administrator to create and manage email accounts for
any domains hosted on the server.

Mail servers send and receive email using standard email protocols. For
example, the SMTP protocol sends messages and handles outgoing
mail requests. The IMAP and POP3 protocols receive messages and are
used to process incoming mail.

Mail server software is available for multiple platforms. The most


popular mail server for Windows is Microsoft Exchange Server.

Web Servers

Web server is a computer where the


web content is stored. Basically web server is used to host the web sites but there exists other web
servers also such as gaming, storage, FTP, email etc.
Web site is collection of web pages whileweb server is a software that respond to the request for web
resources.

Application Server
An application server is a type of server designed to install, operate and host
applications and associated services for end users, IT services and organizations. It
facilitates the hosting and delivery of high-end consumer or business applications,
which are used by multiple and simultaneously connected local or remote users.

Commands in networking

PING
It stands for Packet INternet
Groper. The idea is to verify if a network host is reachable from the site where the PING
command issued. When a PING command is issued, a packet of 64 bytes is sent to the destination
computer.
The computer then waits for a reply from the destination computer. The source computer receives a
reply if the
connection between the two computers is good. Apart from testing the connection, it also gives
the round trip time for a packet to return to the source computer and the amount of packet loss

window.C:\>ping www.google.com
Pinging www.l.google.com [64.233.161.99] with 32 bytes of data:
Reply from 64.233.161.99: bytes=32 time=58ms TTL=242
Reply from 64.233.161.99: bytes=32 time=70ms TTL=242
Reply from 64.233.161.99: bytes=32 time=60ms TTL=242
Reply from 64.233.161.99: bytes=32 time=60ms TTL=242
Ping statistics for 64.233.161.99:
Packets: Sent = 4, Received = 4, Lost = 0 (0% loss),
Approximate round trip times in milli-seconds:
Minimum = 58ms, Maximum = 70ms, Average = 62ms

Tracert
Tracert allows you to trace every router that a packet has traversed during its journey towards the
destination. A packet travels through several routers before its reaches its destination.

C:\>tracert www.google.com
Tracing route to www.l.google.com [64.233.161.104] over a maximum of 30 hops:
1 3 ms 3 ms 3 ms 192.168.0.1
2 10 ms 14 ms 9 ms 10.116.96.1
3 11 ms 22 ms 11 ms srp0-0.brhmalhe-rtr2.bham.rr.com [66.25.96.2]
4 27 ms 25 ms 25 ms pos2-0.tampflerl.rtr3.tampabay.rr.com [65.32.8.109]
5 26 ms 26 ms 26 ms pop1-tby-P0-1.atdn.net [66.185.136.169]
6 36 ms 26 ms 25 ms bb1-tby-P0-0.atdn.net [66.185.136.160]
7 45 ms 43 ms 42 ms bb2-atm-P7-0.atdn.net [66.185.152.245]
8 45 ms 43 ms 42 ms pop2-atm-P1-0.atdn.net [66.185.147.211]
9 42 ms 41 ms 42 ms Google.atdn.net [66.185.147.218]
10 44 ms 53 ms 53 ms 216.239.46.157
11 44 ms 71 ms 55 ms 66.249.95.124
12 58 ms 58 ms 60 ms 216.239.47.149
13 60 ms 58 ms 58 ms 216.239.47.69
14 63 ms 66 ms 58 ms 216.239.47.156
15 61 ms 61 ms 58 ms 64.233.161.104
Trace complete.

Netstat
In some
networking scenarios, there may be a need to run several server software applications on the
same machine, which may use the same default port for connection. The netstat command allows
a user to identify if a particular port is free on in use and avoid software crashes due to
unavailability of the port.

C:\>netstat
Active Connections
Proto Local Address Foreign Address State
TCP ams:1053 baym-cs6.msgr.hotmail.com:1863 ESTABLISHED
TCP ams:1056 cs34.msg.dcn.yahoo.com:5050 ESTABLISHED
TCP ams:1070 sip25.voice.re2.yahoo.com:5061 ESTABLISHED
TCP ams:1115 192.168.0.12:5101 ESTABLISHED

Ipconfig
The information regarding your IP address, gateway and the subnet mask is displayed. More
information can be obtained by using the following command:
ipconfig/all
Ipconfig can be used to renew or release a DHCP configuration for all interface cards or
adapters. In order to see the formats in which Ipconfig can be used, type the following:

ARP
The ARP command maps the IP addresses of a station to the MAC hardware addresses , The ARP
request contains the IP address of the requestor and IP address of
the computer whose MAC address is desired. The ARP packet is broadcasted and the destination
computer accepts the packet by looking at its IP address. The destination computer then sends an
ARP reply packet that contains its IP address and MAC address to the requestor.
arp –a
The following arp cache table is displayed:
C:\>arp -a
Interface: 192.168.0.8 --- 0x20002
Internet Address Physical Address Type
192.168.0.1 00-09-5b-36-b4-06 dynamic

You might also like