Sunteți pe pagina 1din 4

WiMAX stands for WorldWide Interoperability for Microwave Access and is technically referred

to by the IEEE as 802.16. WiMAX is also commonly termed 4G network. It is a wireless wide
area network (WAN) that can cover what DSL lines can cover, but without wires. It can give
Internet connectivity to computers in the way GSM has given phone connectivity to mobile
phones and made them replace fixed landline phones.

The bandwidth and range of WiMAX make it suitable for the following potential applications:

Providing portable mobile broadband connectivity across cities and countries through a
variety of devices.

Providing a wireless alternative to cable and digital subscriber line (DSL) for "last mile"
broadband access.

Providing data, telecommunications (VoIP) and IPTV services (triple play).

Providing a source of Internet connectivity as part of a business continuity plan.

Smart grids and metering.

Comparison

Comparisons and confusion between WiMAX and Wi-Fi are frequent, because both are related
to wireless connectivity and Internet access.[24]

WiMAX is a long range system, covering many kilometres, that uses licensed or
unlicensed spectrum to deliver connection to a network, in most cases the Internet.

Wi-Fi uses unlicensed spectrum to provide access to a local network.

Wi-Fi is more popular in end user devices.

Wi-Fi runs on the Media Access Control's CSMA/CA protocol, which is connectionless
and contention based, whereas WiMAX runs a connection-oriented MAC.

WiMAX and Wi-Fi have quite different quality of service (QoS) mechanisms:

o WiMAX uses a QoS mechanism based on connections between the base station
and the user device. Each connection is based on specific scheduling algorithms.

o Wi-Fi uses contention access all subscriber stations that wish to pass data
through a wireless access point (AP) are competing for the AP's attention on a
random interrupt basis. This can cause subscriber stations distant from the AP to
be repeatedly interrupted by closer stations, greatly reducing their throughput.
Both IEEE 802.11, which includes Wi-Fi, and IEEE 802.16, which includes WiMAX,
define Peer-to-Peer (P2P) and wireless ad hoc networks, where an end user
communicates to users or servers on another Local Area Network (LAN) using its access
point or base station. However, 802.11 supports also direct ad hoc or peer to peer
networking between end user devices without an access point while 802.16 end user
devices must be in range of the base station.

VoIP stands for Voice over Internet Protocol. It is also referred to as IP Telephony or
Internet Telephony.

Voice over Internet Protocol is a category of hardware and software that enables
people to use the Internet as the transmission medium for telephone calls by
sending voice data in packets using IP rather than by traditional circuit
transmissions of the PSTN.

3G refers to the third generation of mobile telephony (that is,


cellular) technology. The third generation, as the name
suggests, follows two earlier generations.

The first generation (1G) began in the early 80's with commercial deployment of Advanced
Mobile Phone Service (AMPS) cellular networks. Early AMPS networks used Frequency
Division Multiplexing Access (FDMA) to carry analog voice over channels in the 800 MHz
frequency band.

The second generation (2G) emerged in the 90's when mobile operators deployed two competing
digital voice standards. In North America, some operators adopted IS-95, which used Code
Division Multiple Access (CDMA) to multiplex up to 64 calls per channel in the 800 MHz band.
Across the world, many operators adopted the Global System for Mobile communication (GSM)
standard, which used Time Division Multiple Access (TDMA) to multiplex up to 8 calls per
channel in the 900 and 1800 MHz bands.

The International Telecommunications Union (ITU) defined the third generation (3G) of mobile
telephony standards IMT-2000 to facilitate growth, increase bandwidth, and support more
diverse applications. For example, GSM could deliver not only voice, but also circuit-switched
data at speeds up to 14.4 Kbps. But to support mobile multimedia applications, 3G had to deliver
packet-switched data with better spectral efficiency, at far greater speeds.
two distinct 3G families: 3GPP and 3GPP2

3GPP technologies evolved as follows.

General Packet Radio Service (GPRS) offered speeds up to 114 Kbps.

Enhanced Data Rates for Global Evolution (EDGE) reached up to 384 Kbps.

UMTS Wideband CDMA (WCDMA) offered downlink speeds up to 1.92 Mbps.

High Speed Downlink Packet Access (HSDPA) boosted the downlink to 14Mbps.

LTE Evolved UMTS Terrestrial Radio Access (E-UTRA) is aiming for 100 Mbps.

An electronic banking outlet, which allows customers to complete basic transactions


without the aid of a branch representative or teller.

There are two primary types of automated teller machines, or ATMs. The basic units
allow the customer to only withdraw cash and receive a report of the account's
balance. The more complex machines will accept deposits, facilitate credit card
payments and report account information. To access the advanced features of the
complex units, you will usually need to be a member of the bank that operates the
machine.

A VPN utilizes public telecommunications networks to conduct private data communications.


Most VPN implementations use the Internet as the public infrastructure and a variety of
specialized protocols to support private communications through the Internet.

VPN follows a client and server approach. VPN clients authenticate users, encrypt data, and
otherwise manage sessions with VPN servers utilizing a technique called tunneling.

VPN clients and VPN servers are typically used in these three scenarios:

1. to support remote access to an intranet,


2. to support connections between multiple intranets within the same organization, and
3. to join networks between two organizations, forming an extranet.

The main benefit of a VPN is the lower cost needed to support this technology compared to
alternatives like traditional leased lines or remote access servers.

VPN users typically interact with simple graphical client programs. These applications support
creating tunnels, setting configuration parameters, and connecting to and disconnecting from the
VPN server. VPN solutions utilize several different network protocols including PPTP, L2TP,
IPsec, and SOCKS.
VPN servers can also connect directly to other VPN servers. A VPN server-to-server connection
extends the intranet or extranet to span multiple networks.

Many vendors have developed VPN hardware and software products. Some of these do not
interoperate due to the immaturity of some VPN standards.

Also Known As: virtual private network

VPN is pronounced as separate letters and is short for virtual private network.

VPN is a network that is constructed by using public wires usually the Internet to connect
to a private network, such as a company's internal network. There are a number of systems that
enable you to create networks using the Internet as the medium for transporting data. These
systems use encryption and other security mechanisms to ensure that only authorized users can
access the network and that the data cannot be intercepted.

S-ar putea să vă placă și