RezwanAhmed & His Team || Software Engineer

NeTWORK TeCHNOLOGY ::

5G : 5th Generation or 5G Technology Will Save Time


5th Generation or 5G Technology will deliver faster speeds and lower latency.
With 5G technology, movie downloads will decrease from 7 minutes to just 6 seconds. People will save 2 minutes and 20 seconds a day waiting for social media content to load, 7 minutes when downloading an HD movie, nearly 7 hours on large game downloads.

5G is like having high-powered Wi-Fi routers dispersed all over the city to function as the network nodes. So, your internet provider’s network will function more like your home network, but much faster.”

5G nodes can’t cover the same area as a cell tower but will transmit data at higher speeds. To make up for the reduced coverage area, companies will need to install more 5G nodes. 

 

Advertisements

Overview of the IPsec Protocol Suite


The IP security protocol, more commonly known as IPsec, provides security at the network layer. IPsec secures IP datagrams between any two network-layer entities, including hosts and routers. As we will soon describe, many institutions (corporations, government branches, non-profit organizations, and so on) use IPsec to create Virtual Private Networks (VPNs) that run over the public Internet. 

In the IPsec Protocol Suite, there are two principal protocols: the Authentication Header (AH) protocol and the Encapsulation Security Payload (ESP) protocol.

When a source IPsec entity (typically a host or a router) sends secure datagrams to a destination entity (also a host or a router), it does so with either the AH protocol or the ESP protocol.

The AH protocol provides source authentication and data integrity but does not provide confidentiality. The ESP protocol provides source authentication, data integrity, and confidentiality.

Because confidentiality is often critical for VPN and other IPsec applications, the ESP protocol is much more widely used than the AH protocol. In order to de-mystify IPsec and avoid much of its complication, we will henceforth focus exclusively on the ESP protocol. Readers wanting to learn also about the AH protocol are encouraged to explore the RFCs and other online resources.

IP Sec Protocol Sructure Diagram

 


VPN – Virtual Private Network


 

VPN, Virtual Private Network – the institution’s interoffice traffic is sent over the public Internet rather than over a physically independent network. But to provide confidentiality, the inter-office traffic is encrypted before it enters the public Internet.

When a user connects to a VPN, a “tunnel” is created. This tunnel acts as a secure line of communication. The information passed through it can’t be read if intercepted because it has been encrypted. The VPN client on your computer and the VPN Server know the key to the encryption so data is only encrypted in transit, but instantly decipherable at the source and destination.

There has some best VPN software people use, when facing trouble in Internet or block any application services. All of these solid VPN software are :
1. Betternet VPN,
2. Hotspot Shield
3. Opera
4. TunnelBear
5. PureVPN
6. CyberGhost VPN


History of TLS and SSL


Transport Layer Security (TLS)
A slightly modified version of Secure Sockets Layer SSL version 3, called Transport Layer Security (TLS), has been standardized by the IETF (Internet Engineering Task Force ) [RFC 2246]. TLS uses HMAC for MAC, additional alert codes, different digest functions and different set of encryption algorithm.

A simplified version of SSL, one that will allow us to get a big-picture understanding of the why and how of SSL. We will refer to this simplified version of SSL as “almost-SSL.”

Almost-SSL (and SSL) has three phases: handshake, key derivation, and data transfer.


TLS Transport Layer Security


Transport Layer Security (TLS)

A slightly modified version of Secure Sockets Layer SSL version 3, called Transport Layer Security (TLS), has been standardized by the IETF (Internet Engineering Task Force ) [RFC 2246]. TLS uses HMAC for MAC, additional alert codes, different digest functions and different set of encryption algorithm.

The SSL protocol was originally designed by Netscape, but the basic ideas behind securing TCP had predated Netscape’s work (for example, see Woo [Woo 1994]). Since its inception, SSL has enjoyed broad deployment. SSL is supported by all popular Web browsers and Web servers, and it is used by essentially all Internet commerce sites (including Amazon, eBay, Yahoo!, MSN, and so on).

Tens of billions of dollars are spent over SSL every year.

In fact, if you have ever purchased anything over the Internet with your credit card, the communication between your browser and the server for this purchase almost certainly went over SSL. (You can identify that SSL is being used by your browser when the URL begins with https: rather than http.)

SSL addresses these issues by enhancing TCP with confidentiality, data integrity, server authentication, and client authentication. SSL is often used to provide security to transactions that take place over HTTP. However, because SSL secures TCP, it can be employed by any application that runs over TCP.


File Transfer Technology on This Generation


Now, everything is technology based and we’re dependable on technology. No one can walk or go forward except technology. But, all technology jobs are so creative, large-scale size and so difficult that many people, non technical never understand that. And, this large-scale size file sometimes difficult to carry through website, when we don’t get any flash drive or tinny size flash disk.

On this time is technology generation and there have many file transfer base website that easily can share or send your big file in a few minutes.

” WeTransfer “ is a such type of  website that is the simplest way to send your big files around the world. you can easily upload your any big file that send to receiver email. The receiver can download that big file from the server of WeTransfer.

Weblink of WeTransfer |  https://wetransfer.com

 

https://wetransfer.com


Wide Area Wireless Access Technology : 3G and LTE


Telecommunications companies have made enormous investments in so-called third-generation (3G) wireless, which provides packet-switched wide-area wireless Internet access at speeds in excess of 1 Mbps.

But even higher-speed wide-area access technologies—a fourth-generation (4G) of wide-area wireless networks—are already being deployed. LTE ( for “Long-Term Evolution”—a candidate for Bad Acronym of the Year Award) has its roots in 3G technology, and can potentially achieve rates in excess of 10 Mbps.

LTE downstream rates of many 10s of Mbps have been reported in commercial deployments.


Digital Subscriber Line (DSL) and Cable


C7000_Channel_Bonding_Diagram_Transparent

Today, the two most prevalent types of broadband residential access are digital Subscriber line (DSL) and cable. A residence typically obtains DSL Internet access from the same local telephone company (telco) that provides its wired local phone access. Thus, when DSL is used, a customer’s telco is also its ISP, each customer’s DSL modem uses the existing telephone line (twisted Copper line) to exchange data with a digital subscriber line access multiplexer (DSLAM) located in the telco’s local central office (CO). The home’s DSL modem takes digital data and translates it to high frequency tones for transmission over telephone wires to the CO; the analog signals from many such houses are translated back into digital format at the DSLAM.

The residential telephone line carries both data and traditional telephone signals simultaneously, which are encoded at different frequencies:
• A high-speed downstream channel, in the 50 kHz to 1 MHz band
• A medium-speed upstream channel, in the 4 kHz to 50 kHz band
• An ordinary two-way telephone channel, in the 0 to 4 kHz band