Professional Documents
Culture Documents
Applications of Network
Some of the applications of network are discussed below:
Communication Media
Communication media of a network refer to the connecting media, through which
different computers in a network are interconnected together. The communication
media can also be referred to as communication channels. The communication
media can be grouped into two categories:
When the computers in a network are interconnected through a wire or cable, then
such a medium is categorised under wired technologies. Among wired technologies,
ethernet cable, coaxial cable, optical fibre, etc., are included.
1. Ethernet Cable It is also known as twisted pair cable. There are two identical
wires wrapped together and twisted around each other.
Advantages of Ethernet Cable
2. Coaxial Cable It consists of a solid core wire surrounded by foil shields, each
separated by some insulator. The inner solid core wire carries the signal through the
network and the shield is used to provide earthing or ground. Coaxial cable is
commonly used in transporting multi-channel television signals in cities.
● The data transmission quality in coaxial cable is better than twisted pair
cable, yet it is affordable.
● Co-axial cables can be used successfully in shared cable networks.
● It can be used effectively for broadband transmission.
It consists of thin strands of extruded glass silica or plastic, slightly thicker than
human hair, which are capable of carrying light signals from a source at one end to
another end. At the source, there is a Light Emitting Diode (LED) or a Laser Diode,
which modulates the data into a light beam using frequency modulation techniques.
At the receiving end, the data are demodulated into computer readable form.
An optical fibre cable contains following three parts:
Advantages of Bluetooth
1. It allows you to stay cord or cable free. So, you do not have to worry
about finding the correct place to connect that extra long cord.
2. Even though you are able to exchange data across your cell phones,
you still have the ability to keep your information private.
3. As it is already, but most likely it will be more dominant. You can use
bluetooth on laptops, cell phones, music players, headsets, printers and
many more other products.
Disadvantages of Bluetooth
1. You are using up more battery power, when you leave your bluetooth
enabled on your phone all day.
2. Throughout all devices, when using bluetooth Internet, the connection
can sometimes run very slow, so bluetooth Internet is not highly
suggested for that cases
2. Infrared In this type of transmission, infrared light signals are used. Infrared
signals are used in TV remotes, infrared wireless speakers, etc., as a mode of
transmission.
In infrared transmission, signals are transmitted through the air but these signals
cannot penetrate the walls.
Advantages of Infrared
Disadvantages of Infrared
3. In this type of transmission, signals are transmitted in the same way as the radio
and television transmission. The requirement for microwave transmission is
transmitter, receiver and the atmosphere. Under this mode of transmission parabolic
antennas are mounted on the towers. These antennas send the signals in the
atmospheric air. These signals are received by the receiver.
Advantages of Microwave
Disadvantages of Microwave
4. Radio Link When two terminals are connected by using radio frequencies, then
such type of communication is referred as radio wave transmission or radio link. Any
radio transmission set-up has two parts viz., the transmitter and the receiver. Both
the transmitter and the receiver use antennas to send and receive the radio signals.
Advantages of Satellite
Disadvantages of Satellite
Types of Network
1. Local Area Network (LAN) When the network of computers is confined to a small
or localised area such as school, office or building, it is known as Local Area
Network (LAN). Computers or users in a local area network can share data,
information, software and common hardware devices such as printers, modems,
hard disks, etc.
3. Wide Area Network (WAN) The network of computers which is spread across the
countries probably over the entire world is known as a Wide Area Network (WAN).
4. Personal Area Network (PAN) The PAN refers to a computer network, which is
used for communication among computer devices spread over a few metres. PAN
may be wired (i.e. with the use of computer buses such as USB) or wireless using
wireless network technologies such as bluetooth, wireless USB, Z-wave and ZigBee.
Bluetooth personal area network(PAN) is also called a piconet. It can be composed
of upto eight devices in a master slave relationship. The first bluetooth device is
master and other devices are acting as slaves. Normally, its range is upto 10 m.
Network Topologies
The network topology refers to the arrangement or pattern of computers (i.e. nodes
or workstations), which are interconnected in a network.
1. Bus Topology Bus topology is also referred to as linear topology. Under this
arrangement, all nodes in the network are connected by a single length of
transmission medium, which is normally a coaxial cable. Both ends of the cable are
terminated by terminators. Data transmission from any workstation can travel in both
directions.
1. When there is any problem in data communication with any node, the
whole network stops functioning.
2. In case of any fault in data transmission, fault isolation is very difficult.
We have to check the entire network to find the fault.
2. Ring Topology In ring or circular topology, the nodes are connected in a circular
way. In such an arrangement, each node is connected exactly with its two
neighbouring nodes. In other words, when the last node in a bus network is
connected with the first node and the entire network becomes circular, the network is
known as a network using ring topology.
1. Since every node is directly connected with the central node or the
server, a large quantity of the cable is required.
2. There is dependency on the central node. If there are some problems
with the central node, the entire network stops functioning.
4. Mesh Topology A network set-up where each computer and network device is
interconnected with one another to provide an alternative route in case the host is
down or busy.
5. Tree Topology The tree topology is an extension and variation in bus topology.
Here, the shape of a network is like an inverted tree, where the central node is at the
root which is branching out as the network extends. Tree topology is suitable for the
applications which have a hierarchical flow of data and control. Since, it is a modified
form of bus topology, hence it is a hybrid topology.
1. The tree topology simulates hierarchical flow of data. So, it is suitable for
applications, where hierarchical flow of data and control is required.
2. We can easily extend the network whenever required.
Network Devices
Network devices are the components used to connect computers and other
electronic devices together, so that they can share files or resources like printers or
fax machines. The most common type of network devices used by the public to
set-up a Local Area Network (LAN) are hub, switch, repeater and if online access is
desired, a high-speed modem.
● Active Hub It amplifies the signals and passes from one connected
device to another. These hubs are working as repeaters to boost up the
signals.
● Passive Hub It simply passes signals from one connected device to
another without making any changes.
3. Switch The switch is a hardware device used to divide or segment the network
into smaller subnets or LAN segments. The main purpose of segmenting a large
network into smaller segments is to prevent the traffic overloading in a network.
A switch forwards the data packet in a specific way over the network. It means the
switch filters the data packet, when the same is passed to it and for the packet to the
desired LAN segment.
Functions of a Switch
The switch is responsible for forwarding a data packet to a specific route or segment.
For this purpose, the switch establishes a temporary connection between the source
and the destination, when the data packet is transported the connection is
terminated.
Functions of a Repeater
It receives an incoming signal from one device and retransmits it, forwarding it on to
another.
There are two types of repeaters:
Infact, the gateway is a node that routes the traffic from a workstation to an outside
network. The gateway also acts as a proxy server and a firewall, which prevents
unauthorised access.
Network Protocols
Protocol refers to the set of rules and regulations applicable for a network. The
protocol defines standardised format for the data packet to be transmitted through
the network, techniques for detecting the errors whenever they arise and methods to
correct these errors and so on.
HTTP consists of a set of requests from the browser of a local computer to the web
server and a set of responses going back the other way.
Though HTTP is designed for the use in the web application, it has scope to be used
in future object oriented applications.
2. FTP (File Transfer Protocol) FTP is designed to transfer files from one system to
another. Using FTP, different people located in different geographical locations can
cooperate and work on a common project. FTP is designed to promote sharing of
files and to encourage the indirect use of remote computers. Using FTP, any type of
file can be transferred from one computer to another. Though for transferring files,
we have to specify whether the file is in ASCII format or in binary format.
4. PPP (Point-to-Point Protocol) The PPP is used with dial-up Internet connections
including ISDN. It is a layered protocol, which is used for transmitting the data over
usual telephone lines. It can provide connection authentication, transmission,
encryption and compression.
In remote access software firstly we have to know about the term “remote access”.
Remote access refers to the ability to access a computer or a network from a remote
distance. Remote access can be established via a line that runs between a computer
and Local Area Network. This type of line provides faster speeds but has the
drawback of being more expensive. Another suitable method for performing remote
access is establishing a Virtual Private Network, which usually uses the Internet to
connect remote sites and users together.
Internet
The Internet has gained popularity and emerged as an important and efficient means
of communication. The Internet is a world wide network of networks.
Through the Internet, computers become able to exchange information with each
other and find diverse perspectives on issues from a global audience.
Here, we are discussing some basic yet essential components of a network which
are very much required for the proper functioning of the Internet.
IP Address
Domain Name
Domain name is a unique name or identification that helps to create the path to open
a particular website. All the domain names have IP addresses. IP addresses can be
remembered by the computer, but it is difficult to remember for a human being. If you
know the URL (Uniform Resource Locator) of a website, you can access it. The URL
is actually the domain name of the website, so the domain name is the unique name
of a website. Every time we enter a domain name it will be converted into an IP
address and the website will be opened, e.g. www.Mybook.com A domain name
contains three parts:
Thereafter, the operating system searches the host file in which IP addresses of
some domains are stored. If the corresponding domain name was not found there,
then the request is forwarded to Domain Name Servers (DNS). The DNS maintains a
directory of all domain names and corresponding IP addresses registered on the
Internet. When the IP address is required, it is provided to the browser. The browser
can access the information from the respective website using the IP address.
Internet Applications
1. E-Mail
E-mail stands for Electronic Mail. It is a text message that may contain files, images
or other attachments sent through a network to a specified individual or group of
individuals. Some early email systems required that the sender and the recipient
both be online at the same time, in common with instant messaging. Today’s email
systems are based on a store and forward model. E-mail servers accept, forward,
deliver and store messages. Neither the user nor their computers are required to be
online simultaneously; they need to connect an e-mail server, for as long as it takes
to send or receive messages. Interaction between e-mail server and clients are
governed by e-mail protocol. The two most common e-mail protocols are POP3 and
SMTP.
2. SMS
SMS stands for Short Message Service. Short text messages are transmitted to and
from a mobile phone, fax machine, etc. Messages must not be longer than 160
alpha-numeric characters and may also contain images or graphics. Once a
message is sent, it is received by a Short Message Service Centre (SMSC), which
must get to the appropriate mobile device. To do this, the SMSC sends a SMS
request to Home Location Register (HLR) to find the roaming customer. Once the
HLR receives the request, it will respond to the SMSC with the subscriber’s status
● Inactive or active.
● Where the subscriber is roaming.
If the response is ‘inactive’, then the SMSC will hold on to the message for a period
of time. When the subscriber accesses his device, the HLR sends a SMS notification
to the SMSC and the SMSC will attempt delivery. The system pages the device and
if it responds, the message gets delivered. The SMSC receives a verification, that
the message was received by the end user, then it is categorised as, send message
and will not attempt to send again.
3. Video Conferencing
By the name itself it is clear that it is the process of conferencing through video talk.
Basically, video conferencing is a type of conference, which takes place between two
or more participants by using computer networks to transmit audio and video data.
For such type of video conferencing each participant should have a video camera,
microphone and speakers in his computer set-up.
● Point to Point
● Multipoint.
4. Voice Mail
Voice mail is basically a voice message that stores messages electronically which
can be retrieved by the intended recipients according to their convenience. Voice
mail was developed by telephony to prevent missed calls and to facilitate call
screening. Now-a-days, voice mails are getting integrated with the Internet, which
allows users to receive incoming voice messages on their computers.
5. Chat
Wireless/Mobile Communication
By the name itself, it can be defined that it is a communication which does not use
any wires for the transmission of data. In this type of communication, waves are
used as the transmission medium, instead of wires. Mobile communication uses
electromagnetic waves for sharing and transferring of data. Some of the mobile
communication such as GSM, CDMA, WLL, 3G and 4G are discussed below:
CDMA stands for Code Division Multiple Access. It is a digital cellular technology
that uses spread spectrum techniques. CDMA consistently provides better capacity
for voice and data communications than other commercial mobile technologies,
allowing more subscribers to connect at any given time and it is the common
platform on which 3G technologies are built. CDMA is a military technology first used
during world war II by english allies to foil german attempts at jamming transmission.
GSM is developed to describe protocols for second generation (2G) digital cellular
networks used by mobile phones. It is developed by the European
Telecommunications Standards Institute (ETSI) for the replacement of first
generation (1G) analog cellular networks and originally described a digital circuit
switched network optimised for full duplex voice telephony. Full duplex means
receiving and sending the data at a time. ‘GSM’ is a trademark owned by the GSM
Association.
The system used in WLL is based on a full-duplex radio network whose capacity is
very high to access the data from the network. The cost of installing a WELL system
for subscriber access lines is now virtually the same as that of copper cable, though
it can vary depending on the subscriber line length and local conditions, e.g.
AFS-WALL system has already been commercialised and is scheduled to be
implemented for commercial service in several countries.
4. 3G (Third Generation)
5. 4G (Fourth Generation)
Network Security
Network security refers to the provisions and policies adopted by the network
administrator to prevent and monitor unauthorised access, misuse, modification or
denial of the computer network and network accessible resources. For network
security, there is a provision of assigning an ID and a password or other
authenticating information that allows the user to access the information and
program within their authority. Network security covers a variety of networks; both
public and private. Network security is important because people, organisations,
corporates across the world are using the Internet to store the data, for
communicating and transmitting critical information. That is why network security
breaches are there.
2. Intrusion Problem
The intrusion problem refers to the malicious activities or policy violation performed
on a computer system. The main motive of intrusion is to store vital information and
essential data. Such types of activities are performed by people with a malicious
mentality.
3. Authentication
Network security refers to the security of the network resources which are used and
guided by the Internet as they are very much unwanted viruses and many other
problems which can damage the active files over the network. Some of the network
security concepts are described below:
1. Cookies
It is also known as browser cookies or tracking cookies. Cookies are small, often
encrypted text files, located in browser directories. They are used by web developers
to help users navigate their websites efficiently and perform certain functions. Due to
their core role of enhancing usability or site processes, disabling cookies may
prevent users from using certain websites. Cookies are created when a user’s
browser loads a particular website. The website sends information to the browser
which then creates a text file. Computer cookies are created not just by the website
the user is browsing, but also by other websites that run ads, widgets and other
elements on the page being loaded. These cookies regulate how the ads appear or
how the widgets and other elements function on the page.
2. Firewall
1. Packet filter Looks at each packet entering or leaving the network and
accepts or rejects it based on user defined rules. Packet filtering is fairly
effective and transparent to users, but it is difficult to configure. In
addition, it is susceptible to IP spoofing.
2. Application gateway Applies security mechanisms to specific
applications, such as FTP and Telnet servers. This is very effective, but
can impose a performance degradation.
3. Circuit-level gateway Applies security mechanism when a TCP or UDP
connection is established. Once the connection has been made, packets
can flow between the hosts without further checking.
4. Proxy server Intercepts all messages entering and leaving the network.
The proxy server effectively hides the true network addresses.
3. Cyber Law
Cyber law is a term that encapsulates legal issues related to the use of the Internet.
It is less a distinct field of law than intellectual property or contract law, as it is a
domain covering many areas of rules and regulations. Some leading topics include
Internet access and usage, privacy, freedom of expression and jurisdiction.
4. Hacker
5. Cracker
A cracker is also called black hat hacker. A cracker is an individual with extensive
computer knowledge whose purpose is to breach or bypass Internet security or gain
access to the software without paying royalties. The general view is that, while
hackers build things, crackers break things. Cracker is the name given to hackers
who break into computers for criminal gain. Crackers’ motivations can range from
profit, a cause they believe in, general maliciousness or just because they like the
challenge. They may steal credit card numbers, leave viruses, destroy files, etc.
6. Trojan