{"id":2315,"date":"2017-07-22T03:21:26","date_gmt":"2017-07-22T03:21:26","guid":{"rendered":"http:\/\/isophal.info\/?p=2315"},"modified":"2017-07-22T03:21:26","modified_gmt":"2017-07-22T03:21:26","slug":"%e1%9e%8f%e1%9e%be-network-%e1%9e%98%e1%9e%b6%e1%9e%93%e1%9e%82%e1%9e%bb%e1%9e%8e%e1%9e%9f%e1%9e%98%e1%9f%92%e1%9e%94%e1%9e%8f%e1%9f%92%e1%9e%8f%e1%9e%b7%e1%9e%a2%e1%9f%92%e1%9e%9c%e1%9e%b8%e1%9e%81","status":"publish","type":"post","link":"https:\/\/isophal.com\/news\/2017\/07\/22\/2315.html\/","title":{"rendered":"\u178f\u17be Network \u1798\u17b6\u1793\u1782\u17bb\u178e\u179f\u1798\u17d2\u1794\u178f\u17d2\u178f\u17b7\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7?"},"content":{"rendered":"<p>\u178f\u17be Networking \u1798\u17b6\u1793\u1782\u17bb\u178e\u179f\u1798\u17d2\u1794\u178f\u17d2\u178f\u17b7\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7?<\/p>\n<ul>\n<li>\u17a2\u17b6\u1785\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u1795\u17d2\u179f\u1796\u17d2\u179c\u1795\u17d2\u179f\u17b6\u1799\u1795\u179b\u17b7\u178f\u1795\u179b \u1793\u17b7\u1784 \u1798\u17b6\u1793\u1791\u17c6\u1793\u17b6\u1780\u17cb\u1791\u17c6\u1793\u1784\u1787\u17b6\u1798\u17bd\u1799\u17a2\u178f\u17b7\u1790\u17b7\u1787\u1793<\/li>\n<li>\u1798\u17b6\u1793\u1794\u17d2\u179a\u179f\u17b7\u1791\u17d2\u1792\u17b7\u1797\u17b6\u1796\u1781\u17d2\u1796\u179f\u17cb \u1780\u17b6\u178f\u17cb\u1794\u1793\u17d2\u1790\u1799\u1780\u17b6\u179a\u1785\u17c6\u178e\u17b6\u1799 \u1780\u17b6\u179a\u1791\u17c6\u1793\u17b6\u1780\u17cb\u1791\u17c6\u1793\u1784\u1798\u17b6\u1793\u1794\u17d2\u179a\u179f\u17b7\u1791\u17d2\u1792\u17b7\u1797\u17b6\u1796<\/li>\n<li>\u17a2\u17b6\u1785\u17b1\u17d2\u1799\u1799\u17be\u1784\u17a2\u17b6\u1785\u1785\u17c2\u1780\u1785\u17b6\u1799 \u1793\u17bc\u179c\u200bConnection \u17b1\u17d2\u1799\u1782\u17d2\u1793\u17b6\u1791\u17c5\u179c\u17b7\u1789\u1791\u17c5\u1798\u1780\u1794\u17b6\u1793<\/li>\n<li>Sharing Music and Video files in Local area Network<\/li>\n<li>Research and online learning<\/li>\n<li>Chatting with friends<\/li>\n<li>Planning vacation<\/li>\n<li>Purchasing gifts and supplies<\/li>\n<\/ul>\n<p>2. \u178f\u17be\u200b Networking \u1795\u17d2\u179f\u17c6\u17a1\u17be\u1784\u1796\u17b8\u1792\u17b6\u178f\u17bb\u1795\u17d2\u179f\u17c6\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7?<\/p>\n<ul>\n<li>Host ( PC, laptop, server, n-printer): \u1782\u17ba\u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u1794\u17d2\u179a\u17be\u179f\u17c6\u179a\u17b6\u1794\u17cb\u1794\u1789\u17d2\u1787\u17bc\u1793 \u1793\u17b7\u1784\u1791\u1791\u17bd\u179b message \u178a\u17c4\u1799\u1795\u17d2\u1791\u17b6\u179b\u17cb \u1793\u17c5\u179b\u17be\u1794\u178e\u17d2\u178f\u17b6\u1789 network\u17d4<\/li>\n<li>Shared Peripherals (I-printer, scanner, webcam): \u1782\u17ba\u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u178a\u17c2\u179b\u1798\u17b7\u1793\u17a2\u17b6\u1785\u1795\u17d2\u1789\u17be\u179a\u1793\u17b7\u1784\u1791\u1791\u17bd\u179b\u179f\u17b6\u179a\u1780\u17d2\u1793\u17bb\u1784\u1794\u178e\u17d2\u178f\u17b6\u1789\u178a\u17c4\u1799\u1795\u17d2\u1791\u17b6\u179b\u17cb\u1791\u17c1\u179c\u17b6\u178f\u17d2\u179a\u17bc\u179c\u178f\u17c2\u178f\u1797\u17d2\u1787\u17b6\u1794\u17cb\u1791\u17c5\u1780\u17b6\u1793\u17cb Host\u17d4<\/li>\n<li>Networking devices(Switch, hub): \u1782\u17ba\u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u179f\u17c6\u179a\u17b6\u1794\u17cb\u178f\u1797\u17d2\u1787\u17b6\u1794\u17cb Host\u17d4<\/li>\n<li>Networking media(Cabling): \u1782\u17ba\u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u179f\u17c6\u179a\u17b6\u1794\u17cb\u178f\u1797\u17d2\u1787\u17b6\u1794\u17cb\u1796\u17b8 Networking Devices \u1791\u17c5\u1780\u17b6\u1793\u17cb Host\u17d4<\/li>\n<\/ul>\n<p>3. \u178f\u17bd\u1793\u17b6\u1791\u17b8\u179a\u1794\u179f\u17cb Computer \u1793\u17c5\u1780\u17d2\u1793\u17bb\u1784\u1794\u178e\u17d2\u178f\u17b6\u1789 networking \u17d4<\/p>\n<ul>\n<li>\u1787\u17b6 Server \u178a\u17c2\u179b\u1787\u17b6\u200bHost \u178a\u17c2\u179b\u1798\u17b6\u1793 Software \u178a\u17c2\u179b\u1782\u17c1\u17a2\u17b6\u1785\u17b1\u17d2\u1799\u179c\u17b6\u1795\u17d2\u178f\u179b\u17cb\u1796\u178f\u1798\u17b6\u1793\u178a\u17bc\u1785\u1787\u17b6 email \u1793\u17b7\u1784 webpages \u1791\u17c5\u1780\u17b6\u1793\u17cb Host \u178a\u1791\u17c3 \u1780\u17d2\u1793\u17bb\u1784\u1794\u178e\u17d2\u178f\u17b6\u1789\u17d4<\/li>\n<li>\u1787\u17b6\u200b client \u1787\u17b6 Host \u178a\u17c2\u179b\u1798\u17b6\u1793 Software \u178a\u17c2\u179b\u17a2\u17b6\u1785\u17b1\u17d2\u1799\u179c\u17b6\u179f\u17d2\u1793\u17be\u1793\u17b7\u1784\u1794\u1784\u17d2\u17a0\u17b6\u1789\u1796\u178f\u1798\u17b6\u1793\u178a\u17c2\u179b\u1791\u1791\u17bd\u179b\u1794\u17b6\u1793\u1796\u17b8 Server\u17d4<\/li>\n<li>\u17a2\u17b6\u1785\u1795\u17d2\u178f\u179b\u17cb Service \u1785\u17d2\u179a\u17be\u1793\u1791\u17c5\u1780\u17b6\u1793\u17cb client \u1798\u17d2\u1793\u17b6\u1780\u17cb \u17ac \u1785\u17d2\u179a\u17be\u1793\u1793\u17b6\u1780\u17cb\u1780\u17d2\u1793\u17bb\u1784\u1796\u17c1\u179b\u178f\u17c2\u1798\u17bd\u1799\u17d4<\/li>\n<\/ul>\n<p>4. Peer to Peer Networking \u1782\u17ba\u1787\u17b6\u178f\u1797\u17d2\u1787\u17b6\u1794\u17cb\u17a7\u1794\u1780\u179a\u178e\u17cd\u178a\u17c2\u179b\u1785\u17bc\u179b\u179a\u17bd\u1798\u1787\u17b6\u1794\u178e\u17d2\u178f\u17b6\u1789 \u17a0\u17be\u1799\u1798\u17b6\u1793\u179f\u17b7\u1791\u17d2\u1792\u17b7\u179f\u17d2\u1798\u17be\u1782\u17d2\u1793\u17b6 \u17a2\u17b6\u1785\u1787\u17b6 server \u1795\u1784 \u1793\u17b7\u1784\u200b \u1787\u17b6 Client\u200b\u200b \u1795\u1784\u17d4<\/p>\n<p>\u00b7 \u1782\u17bb\u178e\u179f\u1798\u17d2\u1794\u178f\u17d2\u178f\u17b7<\/p>\n<ul>\n<li>Easy to set up<\/li>\n<li>Less complexity<\/li>\n<li>Lower cost since network devices and dedicated servers may not be required<\/li>\n<li>Can be used for simple tasks such as transferring files and sharing printers<\/li>\n<\/ul>\n<p>\u00b7 \u1782\u17bb\u178e\u179c\u17b7\u1794\u178f\u17d2\u178f\u17b7<\/p>\n<ul>\n<li>\u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u1799\u17ba\u178f\u1796\u17b8\u1796\u17d2\u179a\u17c4\u17c7 Computer \u17a2\u17b6\u1785\u1787\u17b6 server \u1795\u1784 \u17a2\u17b6\u1785\u1787\u17b6 client \u1795\u1784\u17d4<\/li>\n<li>No centralized administration<\/li>\n<li>Not as secure<\/li>\n<li>Not scalable<\/li>\n<li>All devices may act as both clients and servers which can slow their performances<\/li>\n<\/ul>\n<p>5. \u178f\u17bd\u1793\u17b6\u1791\u17b8\u179a\u1794\u179f\u17cb Hub<\/p>\n<p>Hub \u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u179b\u17be\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1791\u17b8\u1798\u17bd\u1799\u200b\u200b\u17d4\u1782\u17c1\u1794\u17d2\u179a\u17beHub\u178a\u17be\u1798\u17d2\u1794\u17b8\u1792\u17d2\u179c\u17be\u1780\u17b6\u178f\u1797\u17d2\u1787\u17b6\u1794\u17cbHosts\u17a2\u17c4\u1799\u1794\u17b6\u1793\u1785\u17d2\u179a\u17be\u1793\u200b\u17d4\u179c\u17b6\u1782\u17d2\u1798\u17b6\u1793\u179b\u1791\u17d2\u1792\u1797\u17b6\u1796\u178f\u17d2\u179a\u17bd\u178f\u1796\u17b7\u1793\u17b7\u178f\u17d2\u1799\u1798\u17be\u179bMac Address\u179a\u1794\u179f\u17cbsource \u17acDestination\u1791\u17c1 \u17a0\u17c1\u178f\u17bb\u1793\u17c1\u17c7\u1793\u17c5\u1796\u17c1\u179b\u1798\u17b6\u1793Host \u178e\u17b6\u1798\u17bd\u1799 Send Message \u179c\u17b6\u178f\u17d2\u179a\u17bc\u179cSend Message \u1793\u17c4\u17c7\u1791\u17c5\u1782\u17d2\u179a\u1794\u17cbPorts\u178a\u17c2\u179b\u1794\u17b6\u1793\u1797Connect\u1791\u17c5\u1780\u17b6\u1793\u17cb\u179c\u17b6\u17d4\u1782\u17bb\u178e\u179f\u1798\u17d2\u1794\u178f\u17d2\u178f\u17b7\u179a\u1794\u179f\u17cbHub \u1782\u17ba \u1797\u17d2\u1787\u17b6\u1794\u17cbHosts\u1794\u17b6\u1793\u1785\u17d2\u179a\u17be\u1793,\u1798\u17b6\u1793\u178f\u1798\u17d2\u179b\u17c3\u1790\u17c4\u1780\u1787\u17b6\u1784Switch \u1793\u17b7\u1784Regenerate \u179a\u179b\u1780\u179f\u1789\u17d2\u1789\u17b6\u178a\u17c2\u179b\u1781\u17d2\u179f\u17c4\u1799\u17a2\u17c4\u1799\u1791\u17c5\u1787\u17b6\u1781\u17d2\u179b\u17b6\u17c6\u1784 \u17a0\u17be\u1799\u1794\u1789\u17d2\u1787\u17bc\u1793\u1794\u1793\u17d2\u178f\u17d4 \u1782\u17bb\u178e\u179c\u17b7\u1794\u178f\u17d2\u178f\u17b7\u179a\u1794\u179f\u17cbHub\u1782\u17ba\u179c\u17b6\u1787\u17b6\u1794\u17d2\u179a\u1797\u17c1\u1791Half-duplex( \u17a2\u17b6\u1785\u1794\u17b6\u1793\u178f\u17c2\u1791\u1791\u17bd\u179b \u17ac\u1794\u1789\u17d2\u1787\u17bc\u1793Message\u1793\u17c5\u1780\u17d2\u1793\u17bb\u1784\u1796\u17c1\u179b\u178f\u17c2\u1798\u17bd\u1799), \u1794\u1789\u17d2\u1787\u17bc\u1793Message\u1798\u17b7\u1793\u1785\u17c6\u1782\u17c4\u179b\u178a\u17c5\u1791\u17c1 \u178a\u17be\u1798\u17d2\u1794\u17b8\u17a2\u17c4\u1799\u1785\u17c6\u1782\u17c4\u179b\u178a\u17c5\u178f\u17d2\u179a\u17bc\u179cSend Message \u1791\u17c5\u1782\u17d2\u179a\u1794\u17cbPort\u1791\u17b6\u17c6\u1784\u17a2\u179f\u17cb\u178a\u17c2\u179bActive \u17d4<br \/>\n6. \u178f\u17bd\u1793\u17b6\u1791\u17b8\u179a\u1794\u179f\u17cb Switch<\/p>\n<p>Switch \u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cd\u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u179b\u17be\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1791\u17b8\u1796\u17b8\u1793\u17c3 OSI Model\u17d4 \u179c\u17b6\u1794\u1789\u17d2\u1787\u17bc\u1793Message\u1785\u17c6\u1782\u17c4\u179b\u178a\u17c5\u17d4 \u1793\u17c5\u1796\u17c1\u179b Host\u1798\u17bd\u1799\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u179b\u17be\u1780\u17b6\u179aSend Message\u179c\u17b6\u1780\u178f\u17cb\u1785\u17c6\u178e\u17b6\u17c6 Mac Address\u179a\u1794\u179f\u17cb Source \u1793\u17b7\u1784Destination\u1790\u17b6\u178f\u17d2\u179a\u17bc\u179c\u1785\u17c1\u1789 \u17ac\u1794\u1789\u17d2\u1787\u17bc\u1794\u178f\u17b6\u1798\u1795\u17d2\u179b\u17bc\u179c(Port)\u178e\u17b6 \u178a\u17c4\u1799Mac Address table\u17d4\u1794\u17be\u179c\u17b6\u1798\u17b7\u1793\u178a\u17b9\u1784\u1790\u17b6Destination\u178f\u17d2\u179a\u17bc\u179c\u1794\u1789\u17d2\u1787\u17bc\u1794\u178f\u17b6\u1798Port\u178e\u17b6\u1791\u17c1(Mac Address\u17a2\u178f\u17cb\u1798\u17b6\u1793\u1793\u17c5\u1780\u17d2\u1793\u17bb\u1784 Mac Address table)\u179c\u17b6\u1793\u17b9\u1784Send Message\u1791\u17c5\u1782\u17d2\u179a\u1794\u17cbPorts\u1791\u17b6\u17c6\u1784\u17a2\u179f\u17cb\u178a\u17c2\u179bActive\u178a\u17bc\u1785Hub\u17d4 \u1796\u17c1\u179b\u1794\u1789\u17d2\u1787\u17bc\u1793\u1791\u17c5\u178a\u179b\u17cbClients\u178e\u17b6\u178a\u17c2\u179b\u17a2\u178f\u17cb\u1798\u17b6\u1793Mac Address\u178a\u17bc\u1785 Mac Address\u179a\u1794\u179f\u17cbDestination\u179c\u17b6\u1793\u17b9\u1784Block \u1785\u17c4\u179b \u1798\u17b6\u1793\u178f\u17c2Client\u178e\u17b6\u178a\u17c2\u179b\u1798\u17b6\u1793Mac Address\u178a\u17bc\u1785 Mac Address\u179a\u1794\u179f\u17cbDestination\u1791\u17c1\u178a\u17c2\u179b\u1791\u1791\u17bd\u179b\u1799\u1780 Message\u1793\u17c4\u17c7\u17d4\u1782\u17bb\u178e\u179f\u1798\u17d2\u1794\u178f\u17d2\u178f\u17b7\u179a\u1794\u179f\u17cbSwitch\u1782\u17ba\u179c\u17b6\u1787\u17b6Full-duplex, \u1780\u17b6\u178f\u17cb\u1794\u1793\u17d2\u1790\u1799\u1785\u17c6\u1793\u17bd\u1793Broadcasts \u1793\u17b7\u1784Support VLAN \u17d4\u1782\u17bb\u178e\u179c\u17b7\u1794\u178f\u17d2\u178f\u17b7\u179a\u1794\u179f\u17cbSwitch\u1782\u17ba\u1793\u17c5\u178f\u17c2\u1798\u17b6\u1793Broadcasts, \u1780\u17b6\u1794\u1789\u17d2\u1787\u17bc\u1793\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u1799\u17ba\u178f \u1793\u17b7\u1784\u1798\u17b6\u1793\u178f\u1798\u17d2\u179b\u17c3\u1790\u17d2\u179b\u17c3\u1787\u17b6\u1784 Hub \u17d4<br \/>\n7. \u178f\u17bd\u1793\u17b6\u1791\u17b8\u179a\u1794\u179f\u17cb Router<\/p>\n<p>Router\u1787\u17b6\u17a7\u1794\u1780\u179a\u178e\u17cdNetwork\u178a\u17c6\u178e\u17be\u179a\u1780\u17b6\u179a\u179b\u17be\u179f\u17d2\u179a\u1791\u17b6\u1794\u17cb\u1791\u17b8\u1796\u17b8\u179a\u1794\u179fIOS Model \u17d4\u1782\u17c1\u1794\u17d2\u179a\u17be\u179c\u17b6\u178a\u17be\u1798\u17d2\u1794\u17b8\u1797\u17d2\u1787\u17b6\u1794\u17cb Network \u1793\u17c5\u1780\u17d2\u1793\u17bb\u1784\u178f\u17c6\u1794\u1793\u17cb\u1798\u17bd\u1799 \u1791\u17c5\u1793\u17b9\u1784 Network \u178f\u17c6\u1794\u1793\u17cb\u1798\u17bd\u1799 \u17ac\u1785\u17d2\u179a\u17be\u1793\u1795\u17d2\u179f\u17c1\u1784\u1791\u17c0\u178f\u200b\u17d4 \u179c\u17b6\u178a\u17bc\u1785\u1787\u17b6 Switch \u1796\u17d2\u179a\u17c4\u17c7\u1790\u17b6\u179c\u17b6\u17a2\u17b6\u1785\u17a2\u17b6\u1793 Message \u178a\u17c2\u179b\u1794\u17b6\u1793Send \u1798\u1780\u1780\u17b6\u1793\u17cb\u179c\u17b6\u17d4 \u179c\u17b6\u1798\u17b7\u1793\u178a\u17bc\u1785 Switch \u178f\u17d2\u179a\u1784\u17cb\u179c\u17b6\u17a2\u17b6\u1785\u179f\u17d2\u179a\u17b6\u1799Frame\u178a\u17c2\u179b\u1798\u17b6\u1793\u1795\u17d2\u1791\u17bb\u1780 Mac Address \u179a\u1794\u179f\u17cbSource \u1793\u17b7\u1784 Destination\u17d4 \u1793\u17c5\u1796\u17c1\u179bRouter\u179f\u17d2\u179a\u17b6\u1799Frame\u179c\u17b6\u1793\u17b9\u1784\u1783\u17be\u1789 Packet \u178a\u17c2\u179b\u1798\u17b6\u1793\u1795\u17d2\u1791\u17bb\u1780 IP Address\u179a\u1794\u179f\u17cb Source \u1793\u17b7\u1784Destination\u179a\u1794\u179f\u17cb Host\u178a\u17c2\u179b\u1794\u17b6\u1793Send\u1791\u17c5\u1780\u17b6\u1793\u17cb\u179c\u17b6\u17d4Router\u1794\u17d2\u179a\u17be IP Address \u179a\u1794\u179f\u17cb Destination \u178a\u17be\u1798\u17d2\u1794\u17b8\u1794\u1789\u17d2\u1787\u17bc\u1793 Message \u17a2\u17c4\u1799\u1785\u17c6\u1782\u17c4\u179b\u178a\u17c5\u17d4 Port \u1793\u17b8\u1798\u17bd\u1799\u17d7\u179a\u1794\u179f\u17cb Router \u1794\u1789\u17d2\u1787\u17b6\u1780\u17cb\u1796\u17b8\u1780\u17b6\u179a\u178f\u1797\u17d2\u1785\u17b6\u1794\u17cb Networks\u1795\u17d2\u179f\u17c1\u1784\u17d7\u1782\u17d2\u1793\u17b6 \u17a0\u17c1\u178f\u17bb\u1793\u17c1\u17c7\u179c\u17b6\u178f\u17d2\u179a\u17bc\u179c\u178a\u17b9\u1784\u1790\u17b6 IP Address \u179a\u1794\u179f\u17cb Destination \u178f\u17d2\u179a\u17bc\u179c\u1794\u1789\u17d2\u1787\u17bc\u1793\u178f\u17b6\u1798 Port \u1798\u17bd\u1799\u178e\u17b6\u17d4 Router \u1794\u17d2\u179a\u17be Routing table \u178a\u17be\u1798\u17d2\u1794\u17b8\u1780\u178f\u17cb IP Address \u179a\u1794\u179f\u17cbDestination ,Source \u1793\u17b7\u1784\u179f\u17d2\u179c\u17c2\u1784\u179a\u1780\u1796\u17d0\u178f\u17cc\u1798\u17b6\u1793\u1794\u1793\u17d2\u1790\u17c2\u1798\u178a\u17c2\u179b\u1791\u17b6\u1780\u17cb\u1791\u1784\u1793\u17b9\u1784 IP Address\u178e\u17b6\u1798\u17bd\u1799\u178a\u17be\u1798\u17d2\u1794\u17b8\u1794\u1789\u17d2\u1787\u17bc\u1793Message\u17a2\u17c4\u1799\u1785\u17c6\u1782\u17c4\u179b\u178a\u17c5\u17d4\u179c\u17b6\u178f\u17d2\u179a\u17bc\u179c\u1780\u17b6\u179aProtocol \u178a\u17c2\u179b\u178a\u17bc\u1785\u1782\u17d2\u1793\u17b6\u179a\u179c\u17b6\u1784 Router \u1793\u17b7\u1784\u17a7\u1794\u1780\u179a\u178e\u17cd\u178a\u17c2\u179b\u1794\u17b6\u1793\u1797\u17d2\u1787\u17b6\u1794\u17cb\u1787\u17b6\u1798\u17bd\u1799\u179c\u17b6\u178a\u17be\u1798\u17d2\u1794\u17b8\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u1791\u17c6\u1793\u17b6\u1780\u17cb\u1791\u17c6\u1793\u1784\u17d4<br \/>\n8. \u17a2\u178f\u17d2\u1790\u1794\u17d2\u179a\u1799\u17c4\u1787\u1793\u17cd\u1793\u17c3 Wireless Technology<\/p>\n<ul>\n<li>Mobility : \u1797\u17b6\u1796\u17a2\u17b6\u1785\u1785\u179b\u17d0\u178f\u1794\u17b6\u1793 \u1795\u17d2\u178f\u179b\u17cb\u1793\u17bc\u179c\u1797\u17b6\u1796\u1784\u17b6\u1799\u179f\u17d2\u179a\u17bd\u179b\u178a\u179b\u17cb\u1780\u17b6\u179a\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb Computer<\/li>\n<li>Scalability : \u17a2\u17b6\u1785\u17b1\u17d2\u1799\u1799\u17be\u1784\u1796\u1784\u17d2\u179a\u17b8\u1780\u1780\u17b6\u179a\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1794\u17b6\u1793\u1785\u17d2\u179a\u17be\u1793, \u178a\u17c2\u1793\u179f\u17c1\u179c\u17b6\u1794\u17b6\u1793\u1780\u17b6\u1793\u17cb\u178f\u17c2\u1786\u17d2\u1784\u17b6\u1799\u17d4<\/li>\n<li>Flexibility: \u1797\u17b6\u1796\u17a2\u17b6\u1785\u1794\u178f\u17cb\u1794\u17c2\u1793\u1794\u17b6\u1793\u1784\u17b6\u1799\u179f\u17d2\u179a\u17bd\u179b \u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u178f\u1797\u17d2\u1787\u17b6\u1794\u17cb\u1782\u17d2\u179a\u1794\u17cb\u1796\u17c1\u179b\u179c\u17c1\u179b\u17b6\u17d4<\/li>\n<li>Cost Saving: \u1780\u17b6\u178f\u17cb\u1794\u1793\u17d2\u1790\u1799\u1780\u17b6\u179a\u1785\u17c6\u178e\u17b6\u1799<\/li>\n<li>Reduce installation time: \u1780\u17b6\u178f\u17cb\u1794\u1793\u17d2\u1790\u1799\u179a\u1799\u17c8\u1796\u17c1\u179b\u1793\u17c3\u1780\u17b6\u179a\u178f\u1798\u17d2\u179b\u17be\u1784<\/li>\n<li>Reliability in harsh environment: \u1791\u17c4\u17c7\u1794\u17b8\u1793\u17c5\u179f\u17d2\u1790\u17b6\u1793\u1797\u17b6\u1796\u179b\u17c6\u1794\u17b6\u1780\u1794\u17c9\u17bb\u178e\u17d2\u178e\u17b6\u1780\u17cf\u178a\u17c4\u1799\u1780\u17cf\u179c\u17b6\u1793\u17c5\u178f\u17c2\u1795\u17d2\u178f\u179b\u17cb\u1791\u17c6\u1793\u17bb\u1780\u1785\u17b7\u178f\u17d2\u178f\u178a\u179b\u17cb\u1799\u17be\u1784\u178a\u17c2\u179a\u17d4<\/li>\n<\/ul>\n<p>9. \u1782\u17bb\u178e\u179c\u17b7\u1794\u178f\u17d2\u178f\u17b7\u1793\u17c3 wireless LAN Technology<\/p>\n<ul>\n<li>Interference: \u1786\u17b6\u1794\u17cb\u1791\u1791\u17bd\u179b\u179a\u1784\u1780\u17b6\u179a\u179a\u17c6\u1781\u17b6\u1793 \u1794\u17be\u17a2\u17b6\u1780\u17b6\u179f\u1792\u17b6\u178f\u17bb\u1794\u17d2\u179a\u17c2\u1794\u17d2\u179a\u17bd\u179b\u17a2\u17b6\u1785\u1792\u17d2\u179c\u17be\u17b1\u17d2\u1799 Connection \u1796\u17b7\u1794\u17b6\u1780\u17d4 \u178a\u17bc\u1785\u1787\u17b6 Phones, microwave\u17d4<\/li>\n<li>Networking and Data Security: \u1782\u17d2\u1798\u17b6\u1793\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1794\u178e\u17d2\u178f\u17b6\u1789 \u1793\u17b7\u1784\u179f\u17bb\u179c\u178f\u17d2\u1790\u17b7\u1797\u17b6\u1796\u1791\u17b7\u1793\u17d2\u1793\u1793\u17d0\u1799\u1796\u17b8\u1796\u17d2\u179a\u17c4\u17c7\u17a2\u17d2\u1793\u1780\u178a\u1791\u17c3\u17a2\u17b6\u1785\u1784\u17b6\u1799\u179f\u17d2\u179a\u17bd\u179b\u1780\u17d2\u1793\u17bb\u1784\u1780\u17b6\u179a\u178f\u1797\u17b6\u17d2\u1787\u1794\u17cb\u1785\u17bc\u179b\u1780\u17d2\u1793\u17bb\u1784\u1794\u178e\u17d2\u178f\u17b6\u1789\u179a\u1794\u179f\u17cb\u1799\u17be\u1784\u17d4<\/li>\n<li>Technology: \u1780\u17c6\u179b\u17b6\u17c6\u1784\u1793\u17c3\u1780\u17b6\u179a\u1794\u1789\u17d2\u1787\u17bc\u1793\u1781\u17d2\u179f\u17c4\u1799\u1787\u17b6\u1784\u1780\u17b6\u179a\u1794\u17d2\u179a\u17be\u1781\u17d2\u179f\u17c2 Network\u17d4<\/li>\n<\/ul>\n<p>10. \u200b\u178f\u17be Wireless Networking \u1798\u17b6\u1793\u1794\u17c9\u17bb\u1793\u17d2\u1798\u17b6\u1793\u1794\u17d2\u179a\u1797\u17c1\u1791?<br \/>\nWireless Networking \u1798\u17b6\u1793 \u17e3 \u1794\u17d2\u179a\u1797\u17c1\u1791\u1782\u17ba\u17d6<br \/>\n\u00b7 Wireless Personal Area Network (WPAN)<\/p>\n<ul>\n<li>\u1785\u17c6\u1784\u17b6\u1799\u1798\u17b7\u1793\u179f\u17bc\u179c\u1794\u17b6\u1793\u1786\u17d2\u1784\u17b6\u1799 \u178f\u17bc\u1785\u1787\u17b6\u1784 10m<\/li>\n<li>\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1795\u17d2\u1791\u17b6\u179b\u17cb\u1781\u17d2\u179b\u17bd\u1793 \u17ac \u1787\u17b6\u1780\u17d2\u179a\u17bb\u1798<\/li>\n<li>\u179f\u17c6\u179a\u17b6\u1794\u17cb \u178f\u1797\u17d2\u1787\u17b6\u1794\u17cb mice, keyboard, PDAs \u1791\u17c5 computer<\/li>\n<li>\u179b\u17d2\u1794\u17bf\u1793 \u178f\u17bc\u1785\u1787\u17b6\u1784 3Mbps<\/li>\n<li>\u1798\u17b6\u1793 Application \u1787\u17b6 Peer to Peer(device to device)<\/li>\n<li>Standards: Bluetooth v2.0 + EDR**<\/li>\n<\/ul>\n<p>\u00b7 Wireless Local Area Network(WLAN)<\/p>\n<ul>\n<li>\u179f\u17c6\u179a\u17b6\u1794\u17cb\u1796\u1784\u17d2\u179a\u17b8\u1780\u1796\u17d2\u179a\u17c6\u178a\u17c2\u1793 network \u178a\u17c2\u179b\u1794\u17d2\u179a\u17be\u1781\u17d2\u179f\u17c2<\/li>\n<li>\u17a2\u1793\u17bb\u1789\u17d2\u1789\u17b6\u178f\u17b7\u17b1\u17d2\u1799\u17a2\u17d2\u1793\u1780\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb connect to wired network through device known as Access Point(AP)<\/li>\n<li>Standard: IEEE802.11 a\/b\/g\/n.<\/li>\n<li>\u179b\u17d2\u1794\u17bf\u1793\u200b 1-&gt;540 Mbps<\/li>\n<li>Range: Medium<\/li>\n<li>\u1794\u17d2\u179a\u17be\u1794\u17d2\u179a\u17b6\u179f\u17cb\u1793\u17c5\u1795\u17d2\u1791\u17c7, \u1787\u17b6\u179b\u1780\u17d2\u1781\u178e\u17c8 small business and enterprise network<\/li>\n<\/ul>\n<p>\u00b7 Wireless Wide Area Network(WWAN)<\/p>\n<ul>\n<li>\u1787\u17b6\u1794\u17d2\u179a\u1797\u17c1\u1791 Wireless network \u1782\u17d2\u179a\u1794\u178a\u178e\u17d2\u178f\u1794\u17cb\u179f\u17c1\u179c\u17b6\u1792\u17c6 \u1781\u17d2\u179b\u17b6\u17c6\u1784\u1780\u17d2\u179b\u17b6<\/li>\n<li>Standard: Phone CDMA (code division multiple access) or Global system for Mobile Communication (GSM)<\/li>\n<li>\u179b\u17d2\u1794\u17bf\u1793 10-&gt;384Kbps<\/li>\n<li>\u179a\u1799\u17c8\u1785\u17c6\u1784\u17b6\u1799\u1786\u17d2\u1784\u17b6\u1799<\/li>\n<li>\u1794\u17d2\u179a\u17be\u179f\u17c6\u179a\u17b6\u1794\u17cb PDAs, Mobile, Phones, Cellular access<\/li>\n<\/ul>\n<p>11. \u178f\u17be Wireless LAN \u1795\u17d2\u179f\u17c6\u17a1\u17be\u1784\u1796\u17b8\u1792\u17b6\u178f\u17bb\u1795\u17d2\u179f\u17c6\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7?<\/p>\n<p>Wireless LAN \u1795\u17d2\u179f\u17c6\u17a1\u17be\u1784\u1796\u17b8 wireless Client \u17ac STA, Access Point, Wireless Bridge \u1793\u17b7\u1784 Antenna\u17d4<br \/>\n\u00b7 Access Point<\/p>\n<ul>\n<li>Controls access between a wired and a wireless network, I.E. allows wireless clients to gain access to a wired network and vice versa<\/li>\n<li>Acts as a media converter accepting the Ethernet frames from the wired network and converting them to 802.11 compliant<\/li>\n<\/ul>\n<p>\u00b7 Wireless Clients\/STA<\/p>\n<ul>\n<li>Any Host device that can participate in a wireless network. Most devices that can be connected to a traditional wired network can be connected to a WLAN if equipped with the proper wireless NIC and software.<br \/>\nCan either be stationary or mobile.<\/li>\n<\/ul>\n<p>\u00b7 Wireless Bridge<\/p>\n<ul>\n<li>Used to connect two wired networks through a wireless link<\/li>\n<li>Allows long range point to point connections between networks<\/li>\n<li>Using the unlicensed RF frequencies networks 40 km (25 mile) or more apart can be connected without the use of wires<\/li>\n<\/ul>\n<p>\u00b7 Antenna<\/p>\n<ul>\n<li>Increases the strength of the wireless signal<\/li>\n<li>Receives the wireless signal from a STA<\/li>\n<\/ul>\n<p>12. Security on wireless LAN<\/p>\n<p>\u00b7 Limiting access to a WLAN<\/p>\n<ul>\n<li>Mac Address Filtering<\/li>\n<\/ul>\n<p>\u00b7 Authentication on a WLAN<\/p>\n<ul>\n<li>Open Authentication<\/li>\n<li>Pre Share Keys (PSK)<\/li>\n<li>Extensible Authentication Protocol (EAP )<\/li>\n<\/ul>\n<p>\u00b7 Wired Equivalency Protocol(WEP)<br \/>\n\u00b7 Encryption on a WLAN<\/p>\n<ul>\n<li>WIFI Protected Access(WPA)<\/li>\n<li>Traffic Filtering on a WLAN<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>\u178f\u17be Networking \u1798\u17b6\u1793\u1782\u17bb\u178e\u179f\u1798\u17d2\u1794\u178f\u17d2\u178f\u17b7\u17a2\u17d2\u179c\u17b8\u1781\u17d2\u179b\u17c7? \u17a2\u17b6\u1785\u1792\u17d2\u179c\u17be\u1780\u17b6\u179a\u1795\u17d2\u179f\u1796\u17d2\u179c\u1795\u17d2\u179f\u17b6\u1799\u1795\u179b\u17b7\u178f\u1795\u179b \u1793\u17b7\u1784 \u1798\u17b6\u1793\u1791\u17c6\u1793\u17b6\u1780\u17cb\u1791\u17c6\u1793\u1784\u1787\u17b6\u1798\u17bd\u1799\u17a2\u178f\u17b7\u1790\u17b7\u1787\u1793 \u1798\u17b6\u1793\u1794\u17d2\u179a\u179f\u17b7\u1791\u17d2\u1792\u17b7\u1797\u17b6\u1796\u1781\u17d2\u1796\u179f\u17cb&hellip;<\/p>\n","protected":false},"author":1,"featured_media":2316,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[32],"tags":[],"class_list":["post-2315","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-networking"],"_links":{"self":[{"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/posts\/2315","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/comments?post=2315"}],"version-history":[{"count":1,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/posts\/2315\/revisions"}],"predecessor-version":[{"id":2317,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/posts\/2315\/revisions\/2317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/media\/2316"}],"wp:attachment":[{"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/media?parent=2315"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/categories?post=2315"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/isophal.com\/news\/wp-json\/wp\/v2\/tags?post=2315"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}