Professional Documents
Culture Documents
NEED/ADVANTAGE/APPLICATION OF NETWORK :
1. Sharing of resources : Network provide an easy and flexible sharing of
peripherals like printer, scanner etc. which reduce the cost.
2. Sharing of software : Software can be installed centrally on one machine and
can be used by number of machines.
3. Access to remote database : Database can be stored on one machine and can
be shared by many users at a time.
4. Improve communication : Data like pictures, files, voice data etc. can be sent
through email.
DISADVANTAGE OF NETWORK :
1. The systems are more complex to run that requires technical staff to maintain
the network.
2. If networks are badly managed services can become unusable.
3. It is impossible to work if server fails due to any reason.
COMPONENTS OF NETWORKS :
The major components of a computer networks are :
(i) Hosts/Nodes/Workstations : A computer becomes a workstation of a network
as soon as it is attached to a network.
(ii) Server : A computer that provide the sharing of data, software and hardware
resources on the network is called server. Servers can be of two types :
(a) Non-Dedicated server : In small network a computer which can works as
workstation as well as a server is called non-dedicated server.
(b) Dedicated server : In bigger network a computer is dedicated for some specific job
like printing, providing software /hardware resources etc. is called dedicated server.
(iii)Clients : A client computer is a host computer that requests for some services
from a server.
(iv) Network Hardware :
NIC (Network Interface Card): It is a device that is attached to each of the
workstations and the server which helps in communication between the server and
workstations.
Hub, Switch, router : These are the connectivity devices.
(v) Communication channel : Hosts in a network interact with other hosts and
server(s) through a communication channel or communication medium. It
may be either wired or wireless.
i. Wired communication channels : when hosts and server(s)
are connected with one another through guided media. Ex-
twisted-pair cables, coaxial cables, fiber-optic cables.
ii. Wireless communication channels : when hosts and server(s)
are connected with one another through unguided media. Ex-
radio waves, Microwaves, satellites etc.
(vi) Software : The software layer of network make networking possible. It
includes network protocols, network operating system etc.
(vii) Network services : It refers to the applications that provide different
functionalities over a network such as DNS(Domain Name System), File
sharing, VoIP(Voice over IP) etc.
TYPES OF NETWORKS :
(A) Types of networks based on Geographical spread :
(1) LAN (Local Area Network) :- Small computer networks that are confined to a
local area such as office, school, building etc. are known as LANs. The
purpose of LAN is the sharing of hardware and software resources among its
users. It works properly aprox. upto 10 km.
(2) WAN (Wide Area Network) :- This type of networks spread across countries.
It is a group of computers that are separated by large distances and tied
together. It can be a group of various LANs that are spread across the world.
The largest WAN in existence is the internet.
(1) Wired computer networks : In wired computer network, the hosts and other
devices are interconnected through wiring or cable. Most commonly used
cables are one of the following three types :
(a) Twisted Pair Cable :-It is the most common form of wiring in data
communication. It consists of two identical wires wrapped together in
a double helix. Ex- CAT-1, CAT-2, CAT-3, CAT-4,CAT-5 & CAT-
6.There are two types of twisted pair cables : (i) UTP (Unshielded
Twisted Pair) Cable (ii) STP (Shielded Twisted Pair) Cable
(b) Coaxial Cable :-This type of cable consists of a solid wire core
surrounded by one or more foil or wire shields, each separated by some
kind of plastic insulator. The inner core carries the signal, and the
shield provided the ground. There are two types of coaxial cables : (i)
Thicknet (ii) Thinnet
(c) Optical Fibers Cable :- The fiber cable consists of three pieces
(i) the core : the glass or plastic through which the light travels.
(ii) the cladding : which is covering of the core that reflects light back to
the core.
(iii) Protective coating : which protects the fiber cable from hostile
environment.
Fiber optical cable can be either single node or multi-node.
Advantages : It is highly suitable for harsh industrial environments. It has
secure transmission and very high transmission capacity.
Disadvantages : Installation problem. More difficult to solder. Most
expensive. Connection looses are common problem.
(2) Wireless computer networks : The computer networks that use environment
or air as the media, through which information is transmitted without requiring
any cable, are wireless computer networks. Most commonly wireless networks
are :
a. Microwave : Microwave waves are high frequency waves that can be
used to transmit data wirelessly over long distances. It consists of a
transmitter, receiver and the atmosphere. It can be used to transmit
signals such as mobile phone calls.
b. Radio waves : Radio waves are used to transmit television and radio
programmes. It can be classified by frequency and wavelength. When
the frequency is higher than 3HGz, it is named microwave. WiFi used
radio wave to transmit data.
c. Satellite (Satellite Microwave): It uses the synchronous satellite to
relay the radio signal transmitted from ground station.
NETWORK DEVICES/HARDWARE :
(1) NIC (Network Interface Card) / TAP (Terminal Access Point)/ NIU (Network
Interface Unit): It is a device that is attached to each of the workstations and
the server. It helps the workstation to establish the all important connection
with the network. Each NIC attached with workstation has a unique number
identifying it, which is known as node address.
(2) MAC Address (Media Access Control Address) : The NIC manufacturer
assigns a unique physical address to each NIC card, it is known as MAC
address. It is a 6-byte address with each byte separated by a colon. Ex :
The first three bytes are the
The last three bytes are the card-
manufacturer-id, assigned by an
no, assigned by manufacture
international organization IEEE
10 : B5 : 03 : 63 : 2E : FC
(3) WiFi Card : A WiFi card is either an internal or external LAN adapter with a
built-in-wireless radio and antenna. PCI-Express WiFi cards are made to fit
the PCI-Express slots on the motherboard. It can be install on desktop also.
(4) Hub : It is a hardware device having multiple ports that are used for
connecting multiple computers or segments of a LAN together. Hubs can be
either passive or active.
a. Active Hub : it electically amplify the signal as it moves from one
connected device to another. It works like repeaters to extend the
length of a network.
b. Passive Hub : it allow the signal to pass from one computer to another
without any change.
(5) Switch : It is a device that is used to segment networks into different sub
networks. It is responsible for filtering i.e. transforming data in a specific way
and for forwarding packets between LAN segments only to the requesting
port. It can support any packet protocol.
(6) Bridge : It is a device that lets us link two networks together. Bridges are
smart enough to know which computers are on which side of the bridge, so
they only allow those messages that need to get to the other side to cross the
bridge. It can handle networks that follow same protocols.
(7) Router :- It is a network device that is used to separate different segments in a
network to improve performance and reliability. It works like a bridge but can
handle different protocols. It works on physical addresses. Based on a network
road map called a routing table, routers can help ensure that packets are
travelling the most efficient paths to their destinations. If a link between two
routers fails, the sending router can determine an alternate route to keep traffic
moving.
(8) Gateway :- It is a network device that connects dissimilar networks. It
established an intelligent connection between a local network and external
networks with completely different structures.
(9) Access Points(AP)/ Wireless Access Point(WAP) : It is a hardware device that
establishes connection(s) of computing devices on wireless LAN with a fixed
wire network. It has range upto 150 feet. It can work as an router.
THE CLOUD :
The term cloud refer to the collection of servers. It is a generic term used for
internet. Cloud computing is the use of internet for the tasks we perform on our
computer for storage, retrieval and access.
There are Four types of clouds :
1. Private Clouds : these are the clouds for exclusive use by a single organization
and typically controlled, managed and hosted in private data centers.
2. Public Clouds : these are the clouds for use by multiple organizations on a
shared basis and hosted and managed by a third party service provider.
3. Community clouds : these are the clouds for use by a group of related
organizations who wish to make use of a common cloud computing
environment.
4. Hybrid clouds : when a single organization adopts both private and public
clouds for a single application in order to take advantage of the benefits of
both.
MODULATION TECHNIQUES :
Modulation is the process of changing the characteristics of the carrier wave by
superimposing the message signal on a high frequency signal.
Modulation alters the shape of a carrier wave to encode somehow the speech or data
information that is to be carried. Now this encode form of wave will be transmitted.
The main function of carrier wave is to carry the audio or video signal from
transmitter to the receiver. The new wave is called modulated wave.
Once the transmission ends, the receiver nodes send ACK signal to all nodes :
1. The sender node takes ACK as confirmation of successful transmission.
2. Other nodes take ACK signal as end of transmission. Now they can
transmit.
To avoid such error in transmission, some error deduction or error checking methods
are used in computer network that ensure if the received packet is error free or not.
Some common error checking methods in networks are :
1. Single Dimensional Parity Checking : Parity refers to an additional bit added
to the actual data.
Steps :
(A) Before transmission, at sender node : Number of 1’s is counted in the actual
data unit and an extra bit (either 0 or 1), called parity bit, will be added to
actual data so that the number of 1’s along with the extra bit, become even or
remain even.
1 0 1 1 0 1 1 1 0
1 1 0 0 1 0 1 1 1
1 0 1 0 0 1 1 1 0
Calculated parity bit is 1 so ERROR
1 1 0 0 1 0 1 1 1
Calculated parity bit is 1 so NO
ERROR
Advantage :
1. It is a simple and easy to implements.
2. It is inexpensive technique for deducting the errors.
Disadvantage :
1. It can detect only single-bit errors which occur rarely.
2. If, in the data transmitted, two bits get interchanged, then even though data
gets affected, but the parity bit will remain correct. In such cases, this
technique cannot detect the errors.
2. Two Dimensional Parity Checking : This technique works with multiple data
units simultaneously.
Steps :
(A) Before transmission, at sender node : Organize all data units one below
another so that it appears as table of bits. Now calculate parity bits for each
data unit row-wise and colomn-wise.
1 1 0 1 0 0 0 1 0
0 0 1 0 0 0 0 0 1
0 0 1 1 1 1 0 0 0
1 0 0 1 0 0 0 1 1
0 1 0 1 1 1 0 0
1 1 0 0 1 0 0 1 0 0
0 0 1 0 0 0 0 0 1 1
0 0 1 1 1 1 0 0 0 0
1 0 0 1 0 0 0 1 1 1
0 1 0 0 0 1 0 0
0 1 0 1 1 1 0 0
On comparison row and column wise parity bits it is found that there
is an ERROR.
Advantage :
1. It is more efficient than single dimensional parity technique.
2. It can deduct multiple bit errors also.
Disadvantage :
1. It cannot deduct compensating multiple bit errors.
2. It cannot deduct 4 or more bit errors in some cases.
3. Checksum : The checksum refers to a sum of data bits calculated from digital
data that is used to ensure the data integrity at the receiver’s end.
The checksum is calculated as per a specific scheme and is used for error
checking in computer network.
Steps :
(A) At the sender node, before transmission :
1. The data being transmitted is divided into equal sized k number of
segments, where each segment contains m number of bits.
2. The divided k segments are added using 1’s complement arithmetic
and extra bits, more than m bits, are added back to the sum (wrap
around).
3. The final sum’s complement is calculated. This is the checksum.
4. Now the data will be transmitted along with the checksum.
(B) At the receiver node, after transmission :
5. Step 2 is repeated at receiver end to get new sum.
6. The new sum is added with the received checksum and then
complemented. Now if the result is all 0’s then there is no error, accept
data and if result is not all 0’s then reject the data.
Example :
Suppose k=4 data segments with m=8 bits
TCP/IP :
It is a collection of protocols that includes Transmission Control Protocol, Internet
Protocol, User Datagram Protocol and many others. Each of these protocol has a
specific function:
TCP: It ensures reliable communication. It is a connection-oriented protocol. TCP
follows handshake process.
Handshake process means establishing a direct connection between sender and
receiver with start signal, acknowledgement signals etc.
UDP : It is a connectionless protocol. It allows information to be sent without using a
handshake process.
IP : It is connectionless protocol responsible for providing addresses of each computer
and performing routing.
ADDRESSES ON A NETWORK:
(A) Web Address (URL) : A location on a net server is called a web site. Each web
site has a unique address called URL (Uniform Resource Locator).
HTTP uses Internet addresses in a special format called URL.
URL is also referred as Web Address i.e an address of a file on internet. It is
determined by the following
type:// address / path
where type: specifies the type of server in which the file is located,
address is the address of server, and
path tells the location of file on the server.
Ex:
http://www.yahoo.com
http://www.yahoo.com/index,asp
ftp://ftp.prenhall.com
http://www.cbse.nic.in/academics.html
DNS (Domain Name System) : The character based naming system by which
servers are identified is known as DNS.
,gov - government .in – India
.com - commercial .au - Australia
.edu - school or university .jp – Japan
.org - nonprofit organization .pk – Pakistan
.mil - milatrary .us – United states of America
.net - Networker organization
(B) IP Address :
Each network device on a TCP/IP network needs to have a unique address on a
network. This unique address is called IP address. Through IP address different
networks can communicate with each other.
Each IP address is a series containing four numbers separately by dots or periods.
Ex. 192.168.1.1,10.127.1.1 etc
IPv6 :
It has two formats :
(i) Normal – Pure IPv6 formats
(ii) Dual – Ipv6 plus IPv4 formats
Wi-Fi Hotspot :
A hotspot is a venue that offers Wi-Fi access. We can use a laptop, mobile or any
portable device to access the internet through Wi-Fi hotspot.
4. IPCONFIG COMMAND :
It displays detailed information about the network we are connected to. The
ipconfig/all command gives more detailed information such as DNS servers,
DHCP enabled or not, MAC address along with more helpful information.
5. WHOIS COMMAND :
It is a query command that is used to get some information on a specific
domain name, such as who registered it, when was it registered, and when the
domain will expire etc.
whois –h <domain name>
6. SPEED TEST :
To check download and upload speed of network connections, we can use
speed-test utility. There are many speed-test utilities are available online.
Ex. speedtest.net, pingtest.net etc.
HTTP is a stateless protocol. In other words, the current request does not know
what has been done in the previous requests.
WORKING OF EMAIL
1. When we compose and send an email from email client then it has the
recipient’s email address along the email message.
2. Now, email client connects to the outgoing SMTP server and hands over the
email message in the required format i.e. in MIME(Multipurpose Internet
Mail Extension).
3. The outgoing SMTP fist validates the sender details and if valid, processes the
message for sending and place it in outgoing queue.
4. The SMTP server, based on the domain details in the recipient address, look
up the DNS server of the domain and retrieves the recipient server
information ( MX records) of the recipient domain. [MX (Mail Exchange)
are DNS records that are necessary for delivering email to the recipient’s
address]
5. Then the SMTP server connects with the recipient email server and sends the
email through SMTP protocol.
6. The recipient server in turn validates the recipient account and delivers the
email to the users mail account.
7. The user logs into own email account and views the received email using
email client that will use POP3/IMAP protocols.
SECURE COMMUNICATION
Secure communication is when two entities are communicating and do not want a
third party to listen in,
To ensure the safety of the information being transmitted over the web, amny
internet security measures are employed.
1. Encryption :
It is a technique that translates the original data into a form which is not a
usable form of data. The encrypted data must be decoded or decrypted to
bring it back to the original form.
2. Decryption :
To decrypt the data, a specific code called the decryption key is required.
Only the people that have access to this secret code (the key) can decode and
read the actual data.
The working of SSL requires that the website has SSL certificate installed
which ensures its authenticity. Once installed, the sensitive information is
obtained from the user through a secure connection over internet.
HTTPS tells the connection between the server and browser must be secured
using SSL.
The activated padlock shows that browser connection to the server is now
secure. If there is no padlock or the padlock shows a broken symbol, the page
is does not use SSL.
6. SSH Protocol
Secure Shell(SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network.
The SSH protocol is a method for secure remote login from one computer to
another.
It provides several alternative options for strong authentication, and protects
the communication security and integrity with strong encryption.
NETWORK APPLICATIONS
1. Remote Desktop :
The remote desktop is a type of network application through which a person
can work on the desktop of another computer (which is at a different location)
in the same manner as if that computer is right in from of the person.
The person connects to the remote computer (called host computer) via own
computer (called client computer) on which he is working.
2. Remote Login :
The remote login is a network application that permits a user sitting at a
different location to work on a specific program on another computer.
The work access to a program is granted by login concept wherein users
having authorized login and password to work on that program are allowed
access.
There are two programs TELNET and SSH that facilitate remote login on the
Internet.
-----------------------***************--------------------
LAN DESIGN :
Cable layout /Possible layout: It must use less length of wire.
Kind of network [LAN/MAN/WAN] : According to distance it must be used.
LAN- upto 10 Kms
MAN- In a city [upto 100 Kms]
WAN – world wide
Server Position : According to 80-20 rule server must be place where most of the computer resides.
Placement of Devices :
Server : Large number of computers in building [According to 80-20 rules]
Modem : In the server room.
HUB/Switch : in each building.
Repeater : Use it if distance between two segment is greater than 50m.
Hub: Share bandwidth among all attached devices.
Switch : Provides dedicated bandwidth to all devices.
Bridge : It filter network traffic based on MAC addresses. It ensures that traffic goes only to requited
segment and not to all segments.
Router : It filter network traffic based on IP addresses.
Type of cable/transmission media is used for connection
Type of cable Max. segment length
Twisted Pair cable 100 mts.
500 mts.
100 kms
Radio wave Used for long distance specially for hilly region where cable connection is
not feasible, transmission in all direction(omni direction), easy to install
Microwave Use for directional transmission, required repeaters at every 30 miles.
Satellite Used over a very large area of earth.
Type of internet connection : Broad band.