Professional Documents
Culture Documents
When two or more computers are connected together then the connected computers are known as
a computer network.
The number of possible connections on a network is N(N–1) or N2 –N
N = Number of nodes (points of connection). Example: 10 computers on a network = 10(10–1) =
10x9= 90 possible connections.
MAN (Metropolitan Area Network)- Its coverage 60 Km area. WiMAX is one kind of MAN.
WAN (Wide Area Network)- Internet is an example of a Wide Area Network. It is coverage
of a large geographical region from one country to another country.
Intranet
Network with an organization. Like Shwapno, they have varieties of products through their
suppliers, they have a computer network, so their employees and staff using an Intranet. Intranet
for sales reps to access customer records for CRM (customer relationship management)
The Role of Intranets
Many companies have sophisticated and widespread intranets, offering detailed data
retrieval, collaboration, personalized customer profiles, links to the Internet
Intranets use Internet technologies like web browsers and servers, TCP/IP network
protocols, HTML publishing, and databases
Intranets are protected by Passwords, Encryption, Firewalls
Customers, suppliers, and other business partners can access an intranet via extranet
links
Business Value of Intranets
Intranets support communications and collaboration
Business operations and management
Web publishing
Intranet portal managementcabe
Extranet
When one company's intranet is allowed to access by the third-party trusted partner or
collaborator then it is known as the Extranet. Extranet access to customer’s inventory database.
Unsecured Extranet
The link between a company and others via the Internet, relying on encryption of sensitive data
and firewall security systems.
Virtual Private Networks (VPN)
It used to establish secure intranets and extranets and relies on network firewalls, encryption, and
other security features to build a pipe through the Internet. It also creates a private network
without the high cost of a separate proprietary connection.
Business Value of Extranets
Web browser technology makes customer and supplier access to intranets easier and
faster
Another way to build and strengthen strategic relationships
Enables and improves collaboration between a business, customers, and partners
Facilitates online, interactive product development and marketing
Internet
Intranet+Extranet; Network of network.
# Function of MODEM
Portable internet access
Converts digital to analog and analog to digital
Modulate and demodulate
Compressing the Data
Error Correction
2. Receiver
# Protocol Model
Open System Interconnection (OSI)
Transmission Control Protocol/Internet Protocol (TCP/IP)
5. Message or Data
# Transmitter Media Receiver
# Transmitter (Digital)………Media (Analog)………...Receiver (Digital)
Mode of Transmission
i. Simplex- The direction of data flow at all time (simultaneously). Example: T………R,
Radio, TV transmission, Keyboard, Mouse.
ii. Half-duplex- Transmission lines can carry data in both directions, but the data can be
sent only in one direction at a time (not simultaneously). The direction of data flow at a
time (t1) T........R; The direction of data flow at a time (t2) R........T Example: Walkie-
Talkie, Internet Browsers.
Metcalfe's Law
By this law, if 'n' number of a user then the network utility will be n2 (square form)
Middleware
A general term for any programming that mediates between two separate programs. It takes
middle place and interfaces between client and server. It routes data and information between
back-end data sources and end-user applications. An essential component of any IT
infrastructure.
Wireless Technologies
o Fiber-Optic
Uses pulses of laser-generated light
Reduced size and installation effort
Vastly greater communication capacity
Faster transmission speeds
Freedom from electrical interference
o Satellite Transmission
Can move massive quantities of data, audio, and video over global networks
Especially useful in isolated areas
Internet1
It is a cable-connected network
It is used by normal cable
Its speed is less than the next generation of the internet
Internet2
High-performance
Different infrastructure than the current Internet
Will not replace the current Internet
In use at over 200 universities, scientific institutions, communications corporations
May never become totally open
Users are connected via Abilene, a backbone that supports a throughput of 10 Gbps
Infinite bandwidth
Circuit Switching
The switch opens a circuit to establish a link between a sender and a receiver. It remains open
until the communication session is completed.
Packet Switching
It breaks messages into groups called packets. It transmits packets separately.
Switch
It makes connections between telecommunications circuits in a network
Router
It is an intelligent communications processor that interconnects networks based on different
protocols.
Gateway
It connects networks with different communications architectures
Encryption
It is the process by which the original message will be converted to a coded format, this format is
known as the encrypted message, and this process is called encryption.
Decryption
It is the process of converting a coding message into an original message, and this process is
called decryption.
Clients
End-user personal computers or networked computers. It is a service requester.
Servers
Used to manage the networks. It is a service provider.
Two-Tier Architecture
If it is only shared between the clients and servers then it is called two-tier architecture
Multiplexer
It allows a single communications channel to carry simultaneous data transmissions from many
terminals. In time-division multiplexing (TDM), the multiplexer divides the time each terminal
can use the high-speed into short time slots. Multiplexers increase the number of transmissions
possible.
Network Topologies
Topology means it is the structure of a network
Star Network- Ties end user computers to a central computer
Ring Network- Ties local computer processors together in a ring on a relatively equal
basis
Bus Network- Local processors share the same communications channel
Mesh Network- Uses direct communications lines to connect some or all of the
computers in the ring to each other
Application or Process Layer Application Layer Provides communications services for end-
user applications