You are on page 1of 128

Introduction to

Computer Network
Computer Network

• A computer network is a collection of interconnected


autonomous computing devices so as to exchange
information or share resources.
• Example : In home connection of smartphone, laptop
with Smart TV, gaming console and a printer
simultaneously either using cables or through WiFi, it
will termed as a Computer Network.
Advantages
1. Sharing Resources such as printers or scanners.
2. Share storage being able to access files from any
machines on the network can share data
3. Share software : software can be installed centrally
rather than on each machine. Metering software can
then be used to limit the number of copies being run
at any one time.
4. Improve communications- message can be sent
Disadvantages
1. The system are more sophisticated and complex to run. This can
add to costs and we may need specialist staff to run the network
2. If networks are badly managed, services can become unusable
and productivity falls.
3. If software and files are held centrally, it may be impossible to
carry out any work if the central server fails. People become
reliant on the communication if these fail, it can cause havoc.
4. File security is more important especially if connected to WANs
e.g protection from viruses.
Evolution of Networking
• The seeds of Internet were planted in 1969 when US Deparment of
Defense sponsored a project named ARPANET (Advance Research
Project Agency Network) In mid 1990s another federal agency, the
National Science Foundation created a new, high capacity network
called NSFnet. It was the Inter networking i.e the linking of these
two and some other networks was named Internet.
• The original ARPANET was shut down in 1990 and NSFnet in 1995,
but the commerical Internet services came into picture, which are
still running the Internet
Internet

• Internet is a computer based worldwide information


network. It is composed of a large number of smaller
interconnected networks.

Interspace :- It is a client/server software program that


allows multiple users to communicate online with real-time
audio, video and text chat in dynamic 3D environments. It
provides most advanced form of communication available
on the Internet today.
Switching Techniques
• Switching techniques are used for transmitting data
across networks. Three switching techniques are:-
• Circuit Switching
• Message Switching
• Packet Switching
Circuit Switching
• In this technique first the complete physical
connection between two computers is
established and then data are transmitted from
the source computer to the destination
computer.
Message Switching :-
• In this technique the source computer sends data or
the message to the switching office first, which
stores the data in its buffer. It then looks for a free
link to another switching office and then sends the
data to this office. This process continue until the
data are delivered to the destination computers. It
is also known as store and forward. There is no limit
on block size.
Packet Switching
• Packet switching places a tight upper limit to block size. A
fixed size of packet which can be transmitted across the
network is specified. In message switching, data packets
are stored on the disk in message switching whereas in
packet switching all the packet of fixed size are stored in
main memory.
Data Communication Terminologies

• Data Channel:- Channel is the medium used to carry


information or data from one point to another.
• Baud:- It is the unit of measurement for the
information carrying capacity of a communication
channel.
• Bit per Second (bps):- It refers to the speed at which
data transfer is measured. Small b for bit and capital B
for Byte
• Bandwidth :- It refers to the difference between the
highest and lowest frequencies of a transmission
channel. In digital system bandwidth is data speed in bps.
• Data Transfer Rate:- The data transfer rate represents the
amount of data transferred per second by a
communications channels or a computing device. It is
also measured in bps or baud.
Transmission Media or Communication Channel
• It is means the medium through which communication is
made. Types
Media

Guided/
Wired Unguided/
Wireless

Co axial Optical
Twisted Fibers Radio
Pair Cable Cable Micro Satellite
Cable Wave Wave
Twisted Pair Cable
• It consists of two identical wires wrapped together in a
double helix. The twisting of wires reduces crosstalk
( the bleeding of a signal from one wire to anther and
which can corrupt signal and cause network).
• Types
– Unshielded Twisted Pair (UTP) cable
– Shielded Twisted Pair (STP) cable
• Advantage
• It is simple
• It is easy to install and maintain
• It is physically flexible
• It has a low weight
• It can be easily connected
• It is very inexpensive
Disadvantages
• Because of high attenuation it is incapable carrying a
signal over long distance without the use of repeaters.
• Its low bandwidth capabilities make it unsuitable for
broadband applications.
• It supports maximum data rates 1 Mbps without
conditioning and 10 Mbps with conditioning
Co axial Cable
• It consists of solid wire core surrounded by one or more
foil or wire shields, each separated by some kind of
plastic insulator. The inner core carries the signal and the
shield provides the ground. It is suitable for high speed
communication. It is widely used in TV signals.
• Type :-
– Thicknet :- It segment can be upto 500 mtr long
– Thinnet :- It is thinner and can have maximum segment 185
mtrs.
Advantages
• The data transmission characteristics of coaxial cable are
considerably better than those of twisted pair cables.
• The coaxial cable can be used as the basis for a shared
cable network.
• The coaxial cables can be used for broadband
transmission
• Offer higher bandwidth upto 400 Mbps
Disadvantages

• Expensive compared to twisted pair cables


• The coaxial cables are not compatible with twisted pair
cable.
Optical Fibers
• Optical fibers consist of thin strands of glass or glass like
material which are so connected that they carry light
from a source at one end of the fiber to a detector at
other end. The light source used are either LED( Light
Emitting Diode) or LD (Laser Diode).
• Types
– Single mode , it can support upto 2km with speed 100Mbps
– Mutimode, support upto 100kms and speed 2Gbps
Advantages

• It is immune to electrical and magnetic interference


• It is highly suitable for harsh industrial environments
• It guarantees secure transmission and has a very high
transmission capacity
• It can be used for broadband transmission, where
several channels are handled in parallel
Disadvantages
• Installation problem
• Connecting either two fibers together or a light source to a
fiber is difficult process
• Because of noise immunity , optical fibers are virtually
impossible to tap.
• Light can reach the receiver out of phase
• Connection losses are common problems
• Fiber optic cables are more difficult to solder.
• They are the most expensive of all the cables
Type Max Bandwidth Install Cost Interfac
Segment ation e
Length

Twisted Pair 100 meter 500Mpbs - Easy Cheapest High


Cable 40 Gps

Coaxial Cable 185-500 10 Mbps Hard Moderate Low


meter
Fiber Optical 2km -100 100 Mbps - Very Expensive None
Cable km 2Gbps Hard
Micro Wave (Terrestrial Microwave)
• Micro wave signal are used to transmit data without
the use of cables. It consists of transmitter, receiver
and atmosphere. It is line of sight transmission. A
parabolic antennas are mounted on the tower to
send signal to other antennas tens of km away.
Advantages
1. It provides cheaper than digging trenches for laying
cables and maintaining repeaters and cable if get broken
by a variety of causes.
2. It offers freedom from land acquisition rights that are
required for lying repairing the cables.
3. It offers ease of communication over difficult terrain.
4. Microwaves have the ability to communicate over
oceans.
Disadvantages

1. Microwave communication is an insecure communication.


2. Signals from a single antenna may split up and propagate by
slightly different paths to the receiving antenna.
3. Microwave propagation is susceptible to weather effects like
rains, thunder storms etc
4. Bandwidth allocation is extremely limited in case of microwave
5. The cost of design, implementation and maintenance of
microwave links is high.
Radio Wave

• The transmission making use of radio frequency is


termed as radio-wave transmission. Radio waves use
continuous sine waves to transmit information. Radio
wave can be classified by frequency i.e. frequency
higher than 3 GHz. Any radio setup has two parts:
• The transmitter
• The receiver
Advantages

• Radio wave transmission offers mobility


• It proves cheaper than digging trenches for lying cables
and maintain repeaters and cables if cables get broken
by a variety of causes.
• It offers freedom from land acquisition rights that are
required for lying, repairing the cables.
• It offers ease of communication over difficult terrain.
Disadvantages

• Radio wave communication is an insecure


communication
• Radio wave propagation is susceptible to weather
effects like rains, thunder storm etc.
Satellite (Satellite Microwave)

• Satellite communication is special case of microwave


relay system. It use synchronous satellite to relay the
radio signal transmitted from ground station. Most
communication satellite have multiple independent
and transmission devices known as transponder. The
security in satellite communication is usually provided
by the coding and decoding equipment.
Advantages
• The area coverage through satellite transmission is quite large.
• The lying and maintenance of intercontinental cable is difficult
and expensive and this is where the satellite proves to be the
best alternative
• The heavy usage of intercontinental traffic makes the satellite
commercial attractive.
• Satellite can cover large area of earth. This is particularly
useful for sparsely populated areas.
Disadvantages

• Technological limitations preventing the deployment of


large, high gain antennas on the satellite platform
• Over crowding of available bandwidth due to low
antenna gains
• The high investment cost and insurance cost associated
with significant probability of failure.
• High atmospheric losses above 30GHz limit carrier
frequencis.
Infrared

• This type of transmission use IR light to send data. It is


used in TV remotes, automotive garage doors, wireless
speakers etc.
• The IR light transmit data through the air and can
propagate throughout a room but will not penetrate
walls.
• The IR transmission is considered to be a secure
Network Topology
• Topology :- The pattern of interconnections of nodes in the
network is called Topology.
• The selection of topology for a network depend on the following
factor:
– Cost :- It must be cost effective, one would try to minimize
installation cost.
– Flexibility :- Topology should allow for easy reconfiguration of the
network. This involves moving existing nodes and adding new ones.
– Reliability:- Topology chosen for network can help by allowing the
location of the fault to be detected and to provide some means of
isolating it.
Point to Point Link
• Point to Point link basically relies upon two functions –
transmit and receive. The main characteristic of P-P
network is that each station receive exactly from one
transmitter and each transmitter transmits to exactly one
receiver. This happen on separate line.
Transmit Receive
X Y

Receive Transmit
Star Topology
• This topology consists of a central node to which all other
nodes are connected by a single path. It is the topology
used in most existing information networks involving data
processing or voice communications.
Advantages
1. Ease of service:- The star topology has a number of concentration points (where
connection are joined). These provide easy access for service or reconfiguration of
the network.
2. One device per connection:- In star topology failure of one connection typically
involves disconnecting one node from an otherwise fully functional network.
3. Centralized control / problem diagnosis:- The fact that the central node is
connected directly to every other node in the network means that faults are easily
detected and isolated. It is simple matter to disconnect failing nodes from the
system.
4. Simple Access Protocols:- Any given connection in a star network involves only the
central node. In this situation contention for who has control of the medium for
the transmission purpose is easily solved. Thus in star topology access protocols
are very simple.
Disadvantages
1. Long Cable Length:- Because each node is directly connected to
the centre, the star topology necessitates a large quantity of
cable. Congestion in the cables ducts and maintenance and
installation problems can increase cost considerably.
2. Difficult to Expand:- The addition of new node to a star network
involves a connection all the way to the central node.
3. Central Node Dependency:- If the central node in a star network
fails, the entire network is rendered inoperable. This introduces
heavy reliability and redundancy constraints on this node.
Bus or Linear Topology

• This consists of a single length of the transmission


medium onto which the various nodes are attached. It
is used in traditional data communication network
where the host at one end of the bus communicates
with serval terminals along its length.
Advantages
1. Short Cable Length :- Because there is a single common data path
connecting all nodes, the linear topology allows a very short
cable length to be used. This decreases the installation cost.
2. Resilient Architecture:- The linear architecture has an inherent
simplicity that makes it very reliable from a hardware point of
view. There is a single cable through which all the data
propagates and to which all nodes are connected.
3. Easy to Extend:- Additional nodes can be connected to an existing
bus network at any point along its length. More extensive
additions can be achieved by adding extra segments connected
by a type of signal amplifier known as repeater.
Disadvantages
1. Fault diagnosis is difficult :- It is difficult to diagnosis fault because
control of the network is not centralized in any particular node. This
means the detection of a fault may have to be performed from many
points in the network.
2. Fault isolation is difficult:- If a node is faulty on the bus, it must be
rectified at the point where the node is connected to the network.
3. Repeater Configuration :- When Bus topology type network has its
backbone extended using repeaters, reconfiguration may be necessary.
4. Nodes must be intelligent:- Each node on the network is directly
connected to the central bus. This means that some way of deciding
who can use the network at any given time must be performed in each
node.
Tree Topology
A variation of bus topology is the tree topology. The shape
of the network is that of an inverted tree with the central
root branching and sub branching to the extremities of the
network.
Advantages

1. It is a point to point wiring for individual segments.


2. It is supported by several hardware and software venders.
Disadvantages:
3. Overall length of each segment is limited by the type of
cabling used.
4. If the backbone lines breaks, the entire segment goes down.
5. It is more difficult to configure and wire than other topologies.
Tree Topology
A variation of bus topology is the tree topology. The shape
of the network is that of an inverted tree with the central
root branching and sub branching to the extremities of the
network.
Advantages

1. It is a point to point wiring for individual segments.


2. It is supported by several hardware and software venders.
Disadvantages:
3. Overall length of each segment is limited by the type of
cabling used.
4. If the backbone lines breaks, the entire segment goes down.
5. It is more difficult to configure and wire than other topologies.
Factors to consider for Topology Selection

• Cost
• Length of cable needed
• Future growth
• Cruciality of work
• Communication Media
Types of Network based on Geographical Spread

PAN LAN MAN WAN


PAN (Personal Area Network)
It is the interconnection of information technology devices
within the range of an individual person, typically a range
within 10 meters. We can use PAN networks to transfer files
including email and calendar appointments, digital photos
and music etc from portable devices such phones and
tablets to PC and vice versa.
LAN- Local Area Network

Small computer networks that are confined to a localized


area (eg. an office, a building or factory) are known as
LAN. LAN users can share data, information, program,
printers, hard disks, modem etc. Traditionally LANs are
said to have geographical spread of upto 1 km.
MAN – Metropolitan Area Network

• MAN refers to a network that is spread over an area as


big as a city. But these days this term has become
redundant. It is geographical spread of upto 10 km
WAN- Wide Area Network

• The network spread across countries or on a very big


geographical area are known as WANs. It is group of
computers that are separated by large distances and tied
together. The WANs link computers to facilitate fast and
efficient exchange of information at lesser costs and higher
speeds. Some time they can be connected through leased
lines( It is a permanent telephone connection between two
points setup by a government regulated organization that
provide telecommunication service to the public.)
Network Devices
• Modem:- A modem is a computer peripheral that allows
us to connect and communicate with other computer via
telephone lines. It is convert analog signal to digital and
vice versa. Modem stand for Modulation Demodulation.
• Type :
– Internal Modem :- The modem that are fixed within the
computer
– External Modem:- The modem that are connected externally
to a computer as other peripherals are connected.
Hub
• A hub is a networking device having multiple ports that are used
for connecting multiple computers or segments of a LAN
together.
• Types
– Active Hubs :- It electrically amplify the signal as it moves from one
connected device to another. Active concentrators are used like
repeater to extend the length of a network.
– Passive Hubs :- It allows the signal to pass from one computer to
another without any changes.
• Concentrator :- It is a device that provides a central connection
point for cables from workstations, servers and peripherals.
Switch
• A switch is a device that is used to segment networks into
different subnetworks called subnets or LAN segment.
Segmenting the network into smaller subnets, prevents
traffic overloading in a network. A switch is responsible for
filtering transforming data in a specific way and for
forwarding packets between LAN segments.
• It is also known as intelligent t device because it transfer
the data to intended node only.
Repeater
• A repeater is a device that amplifies a signal being
transmitted on the network. It is used in long network lines
which exceed the maximum rated distance for a single run.
• Types
– Amplifier :- It only amplifies all incoming signals over the network.
However it amplifies both the signal and any concurrent noise.
– Signal Repeater:- It collect the inbound packet and then
retransmits the packet as if it were starting from the source.
Bridge

• A bridge is a device that lets to link two networks


together. It is smarter enough to know which computer
are on which side of the bridge, so they only allows
those messages that need to get to the other side to
cross the bridge. Bridges can handle networks that
follow same protocols.
Router
• A router is a network device that forwards data from one network to
another. A router works like a bridge but can handle different protocols.

• Gateway
• A gateway is a device that connects dissimilar networks. It establishes
an intelligent connection between a local network and external
networks with completely different structures. In homes gateway is the
ISP that connects the user to the Internet. In enterprises, the gateway
node often acts as a proxy server( a machine that is not actually a
server but appears as a server) and firewall (a system designed to
prevent unauthorized access to or from a private network.)
RJ 45 Connector

• RJ 45 is stand for Registered Jack 45. It is an eight wire


connector, which is commonly used to connect
computers on the LANs especially Ethernets.
• Ethernet is a LAN architecture developed by Xerox
Corp along with DEC and Intel. Ethernet uses either a
bus or star topology and support data transfer rates of
upto 10Mbps.
NIC (Network Interface Card)

• It is a device that is attached to each of the


workstations and the server, and helps the workstation
establish the all important connection with network. It
is also known as TAP(Terminal Access Point) or
NIU(Network Interface Unit)
• The NIC manufacturer assign a unique physical address
to each NIC card known as MAC(Media Access Control)
• MAC address is 6 byte address with each byte separated
by a colon : e.g 10:B5:03:36:2E:FC
• The first three bytes of MAC address are manufacturer id
and last three bytes are the card no.
• This address is permanent.
Wifi Card
• A Wifi Card is either an internal or external LAN adapter
with built in wireless radio and antenna. The most
common WiFi cards used in desktop computers are PCI
Express WiFi cards.
• Benefits
– It allows us to setup our workstation or home office without
considering the proximity or availability of hard line network
access.
Network Protocol
• Protocol means the rules that are applicable for a
network. Protocol defined standardized formats for data
packets, techniques for detecting and correcting errors.
• Or
• A protocol is a formal description of message formats and
the rules that two or more machines must follow to
exchange those message.
Hypertext Transfer Protocol (HTTP)

• It is the set of rules for transferring hypertext (i.e. text,

graphic, image, sound ,video etc) on WWW. It has


been use by the WWW initiative since 1990.  It was
designed for communication between web browsers
and web servers, but it can also be used for other
purposes.
The HTTP protocols consists of two fairly distinct
items:- the set of requests from browsers to servers
and set of responses going back to the other way.
File Transfer Protocol (FTP)

• It is a standard for the exchange of files across Internet.


• Objective of FTP
– To promote sharing of files
– To exchange indirect or implicit (via program) use of remote
computer
– To shield a user from variations in file storage systems
among hosts
– To transfer data reliably and efficiently
advantages

• It is very useful to transfer files from one network in an


organization to another
• It is an effective way to get a geographically dispersed
group to co-operate on a project.
• It is a potent and popular way to share information
over the internet
TCP/IP (Transmission Control Protocol/ Internet Protocol)
• It is a layered set of protocol. (TCP and IP). It is the
base communication protocol of the Internet. IP
part of the protocol use numeric IP addresses to
join network segment and TCP part of TCP/IP
provides reliable delivery of message between
networked computers.
• Datagram is a collection of the data is sent as a
single message.
• TCP is responsible for dividing the file/message into packets on the
source computer. It is also responsible for reassembling the received
packets at the destination or recipient computer.
• IP part is responsible for handling the address of destination computer
so that each packet is routed (sent) to its proper destination.
• TCP/IP applications use four layers:
– An application protocol
– A protocol such as TCP that provides services need by many applications.
– IP which provides the basic service of getting datagrams to their destination
– The protocols needed to manage a specific physical medium such as
Ethernet or a point to point line.
• POP3:- Post Office Protocol 3 provide a simple
standardized way for users to access mailboxes and
download message to their computers.
• SMTP:- Simple Mail Transfer Protocol is used when we
send email to another email user(recipient). The SMTP is
used by the Mail Transfer Agent(MTA) to deliver the sent
Email to the recipient’s mail server
Telnet

• Telnet is an Internet utility that lets you log onto


remote computer system. Telnet program gives a
character based terminal window on another system.
We got a login prompt on the system.
Advantages

1. Accessing Remote Computers


2. Saves Time: Telnet saves time because instead of
physically traveling to another person's home, you can
perform any task on his or her computer almost
immediately from your computer.
3. Universal: Telnet can be used on any computer. Even
older systems can connect to newer machines with
different operating system versions.
Disadvantages

1. It's not secure - everything is sent in plain text be it over a local


network or over the InternetThis means that anyone ‘'sniffing''
on the connection anywhere between you and the remote
machine can read anything you type, including your
passwords.
2. It is old: It is text based only, there are no graphics or colours
which makes it boring.
3. It may difficult to use: it is command driven therefore there is
no mouse so this may make it difficult for some persons to use.
Protocol used in Email
• IMAP : Internet Message Access Protocol is a standard
protocol for accessing email from local server. It is a
client/ server protocol in which email is received and held
for the user by Internet server. It work with slow
connection also.
• POP3:- Post Office Protocol 3 provide a simple
standardized way for users to access mailboxes and
download message to their computers.
• SMTP:- Simple Mail Transfer Protocol is used when we
send email to another email user(recipient). The SMTP
is used by the Mail Transfer Agent(MTA) to deliver the
sent Email to the recipient’s mail server
• SMS (Short Message Service) :- It is the
transmission of short text messages to and
from a mobile phone, fax machine.
• Chat:- Online textual talk in real time is called
chatting.
• Video Conferencing:- A two way videophone
conversation among multiple participants is
called Video conferencing.
Protocol for Chat and Video Conferencing

For chat- IRC (Internet Relay Chat)

Video – H.323 , SIP


IRC
• It is a simple text based conferencing protocol
involving a no. of users spread across a no. of
interconnected severs. In it a single process (the
server) forming a central point for clients to connect
to, performing the required message delivery and
other functions. The only server is that of a
spanning tree where each server acts as a central
node for the rest of the net is sees.
H.323
• It is a standard that specifies the components, protocols and
procedures that provides multimedia communication services-
real time audio, video and data communications over packet
based network. It is part of ITU-T( International
Telecommunication Union). It can applied in a variety of
mechanisms
– Audio only (IP Telephony)
– Audio and Video (Video telephony)
– Audio and Data
– Audio, video and data
– Multipoint multimedia communicaitons
SIP (Session Initiation Protocol)

• It is an telephony signaling protocol used to establish,


modify and terminate VoIP telephone calls. It work in
both IPv4 and IPv6.
• It has taken the VoIP world by storm. The protocol
resembles the HTTP , is text based and very open and
flexible . It has the therefore largely replaced the H.323
VoIP

• Voice over Internet Protocol is a technology that makes


audio and video calls possible from any internet
connected device having a microphone and speakers.
app like Whatsapp, Telegram, Facebook Messenger,
Skype etc. VoIP allows for the transmission of voice
along with other data being communicated over IP
hence the name VoIP
Wi Fi

• It stand for Wireless Fidelity, which lets us connect to


Internet wirelessly. It covered an area of 30-100 m.
For Wi Fi work we need
– A broadband Internet Connection
– A Wireless router
– A laptop or desktop/ tablet/smartphone
• If you are using WiFi at home be sure that the network
you setup is security enabled.
WiFi Hotspot
• A hotspot is a venue that offers Wi Fi access. The public
can use a laptop WiFi phone or other suitable portable
device to access the Internet through a WiFi hotspot.
WiMax

• It is a wireless digital communications system. It can


provide broadband wireless access upto 30 miles for
fixed stations and 3-10 miles for mobile stations. It
requires a tower called WiMax Base Station.
World Wide Web

• WWW is a set of programs, standards and protocols


that allows the multimedia and hypertext files to be
created, displayed and linked on the Internet.It was
first proposed by Tim Berner Lee. It was introduced in
1989-1991.

Prepared by: Balwan Singh, PGT(C.S.)


History of WWW
1989 On March 12, Tim BernerLee, a British Scientist submit a
proposal for a “ distributed information system'.

1990 On Decebmer 20, world first website goes lives at


Info.cern.ch.
The first web page is
http://info.cern.ch/hypertext/WWW/TheProject.html
1991 On August 6, The WWW is launched publicly as Berners Lee
publishes details of the Project on the Internet

1993 On April 30, CERN releases the WWW source code adn
announces it will be available free of charages.
Prepared by: Balwan Singh, PGT(C.S.)
Difference between WWW and Internet

• The WWW is an Internet system i.e. a set of program,


standards and protocols that allows the multimedia
files to be created, displayed and linked on the
Internet.

Prepared by: Balwan Singh, PGT(C.S.)


Difference between WWW and Internet
• Internet isn't just web pages that we use daily. It consists
of :
– Forums where people can seek help and advice about a
topic.
– Research databases used by universities and large
companies.
– USENET discussion group about a specific subject/topic.
– Email and Instant Messaging (IM system)

Prepared by: Balwan Singh, PGT(C.S.)


Advantages

• Greater access to information reduces research times.


• useful communications links
• Global reach enables one to connect to anyone on the
Internet.
• Easy communication with other people.
• Pusblishing documents on the Internet saves paper.
• A valuable resouces for companies to advertise and
condcut business.
Prepared by: Balwan Singh, PGT(C.S.)
Disadvantages
1. Cyber frauds may take place involving Credit/Debit Card numbers and details.
2. Unsuitable and undersirable material available that somtimes are used by
notorious people such as terrorists.
3. Computer viruses get downloaded and spread across machines connected to
networks and have detrimental effects.
4. Much of the information isn't checked and may be incorrect or irrelevent.
5. Message sent across the Internet can easily intercepted and are open to abuse
by others.
6. Too much time spent on the Internet could result in a lack of face to face
interaction with others and loss of social skills.
7. Going on line runs the risks of hackers or viruses being able to damage our
computer. Prepared by: Balwan Singh, PGT(C.S.)
WWW Attributes
• User Friendly
• Multimedia Documents
• Hypertext and Hyperlinks
• Interactive
• Frames
Note:- It is display of more than one independently
controllable section on single web page.
Basic Internet Terminology
• Client :- Any computer on the networks that requests
services from another computer on the Internet.
• Server:- Any Computer that receives requests from client
computers, processes adn send the output.
• Web Server :-It is a computer that stores websites on the
Internet and delivers web pages to viwers upon request.

Prepared by: Balwan Singh, PGT(C.S.)


• Webpage :- Any digital page/document hosted on the
Internet.
• Web Site:- A collection of interconnected webpages,
designed with a certain goal in mind.
• Web Portal :- A web site or service that offers a broad
array of resources such as e-mail, forums, search -engines
among others e.g site like MSN,yahoo, google etc

Prepared by: Balwan Singh, PGT(C.S.)


• Web Browser :- A program or software on a client
computer, that retrives information from the web.
example Internet Explorer, Google Chrome, Mozilla
FireFox, Netscape, Mosaic, Opera, Safari,Lynx etc
• URL :- Uniform Resource Locator is the unique address of
a web page on Internet. Example
http://encycle.msn.com/getinfo

Prepared by: Balwan Singh, PGT(C.S.)


Difference between Server and Web Server
Server Web Server
* A server is a computer or device on * Web servers are computers that
a network that manages network deliver (serves up) web pages. In
resources. A server serves requests technical terms, it handle HTTP
mainly related to resources on the requests. For example if we enter URL
network such as for sharing a http://edupillar.com/index.html
resouces like printer or sharing this send a request to the web server
storages. whose domain name is edupillar.com
* There are many different types of The server then fetches the page named
servers such as a file server or a mail index.html adn send it to your browser.
server or a webserver etc.

Prepared by: Balwan Singh, PGT(C.S.)


Service Provided by Server
1. Equipment / Resource Sharing :- High quality printers
and photocopiers are often designed to connect
directly to a network and all authorized users can share
the equipment.
2. Centralized File Saving for Data Sharing:- Server help
the user save files to their home directories on the file
server, worker can load their documents on any
networked computer.
3. Centralised Virus Scanning : Most of the servers run virus
scanners constantly to detect and take care of viruses
introduced by the any user on any computer.
4. Centralized Backups : High capacity tape devices in the
file server backup all user’s work, usually every night.
Server Protocol Information It provides
ftp File transfer protocol Text and binary files that are organized in a
hierarchical structure much like a family tree.
Gopher Transfer Control Text and binary files that are organized in a
Protocol/ Internet menu structure
Protocol(TCP/IP)
http Hyper Text Transfer Hypertext/ hypermedia files(i.e. multimedia
Protocol document that contain links to images, sounds
or other multi-media documents on the www
Server Protocol Information It provides
mail POP(Post Office Message send via electronic mail
Protocol) Version 3
and SMTP(Simple
Mail Transfer
Protocol)
News Network News Newsgroup that are organized in a hierarchical
Transfer Protocol structure
• Domain Name : A URL specifies the distinct address for
each resource on the Internet. An Internet address
which is character based is called a Domain Name.
• Domain Name System:- The characters based naming
system by which servers are identified is also known as
domain name system (DNS)
Common Domain Names
S.No. DomainI D Affiliation Remarks
1. com Commercial For commercial firms
2. edu Educational For educational firms
3. gov Government For government organizations/
bodies
4. mil Military For Military
5. net Network Resources For ISPs/ networks
6. org Usually non-profit For NGOs and other non-profit
organizations organization
7. co Company For listed companies
8. tv Television For TV Channels and companies
For Country
• au Australia
• ca Canada
• dk Denmark
• fr France
• in India
• jp Japan
• nz New Zealand
• uk United Kingdom
URL Types

Absolute Relative URLs


URLs
Absolute URLs
• It gives complete location information. It begins with a protocol like
• Protocol://domain//path
• Relative URLs
• These are URLs with just the path excluding the domain
name. It is used for the files/documents being used as
content in the webpage e.g. image files, doc file or pdf file.
Relative path is used to reference a given link of a file that
exists within the same domain. For example
• /category/file.html
Components of a Web Site

• Web Host:- Hosting is where a website is physically


located. Group of linked webpages qualify to be called a
website only when hosted on a webserver.
• Address:- This is the address of the website.
• Homepage:- Every website has a home page. It is the
first web page that appears when viewers go to a
website.
• Design :- It is the overall look and feet the website has as
a result of proper use and integration elements like
navigation menus, graphics, layout etc.
• Content :- All the webpages contained in the website
together makeup the content of the website.
Types of Web Page

Static Web
Page Dynamic
Web Page
Static Web Page
• A static web page is the one which contains
only the static content i.e fixed content. The
content which once written and published
through a webpage, remain the same every time a user
view it. It is written HTML code
Advantages

• It is the fasted and most efficient way to deliver content.


• It takes minimum of resources ie. It does not require any
code to execute or any database to be accessed.
• Since it uses minimum of resources, it the most secure
way to deliver content.
• It is compatible with every type of web server
technology.
Disadvantages

• It must be republished when it changes or the viewers


will not see the updates.
• It cannot display differently to different viewers,
depending on their login status or other factors.
Dynamic Web Page

• A dynamic web page is a web page which displays


different content (generated through some scripts)
everytime it is loaded. It also written in HTML but also
contains dynamic code( like PHP, Javascript etc)
Advantages

• Pages whose content changes too quickly to easily


republish.
• Pages that display viewer specific content
• Page that display content conditionally.
Disadvantages

• Consume more resources


• Slower loading than static pages
• Require more security features than static pages.
Static Vs Dynamic
Static Dynamic
• The content on the • The content on the server is the same
server is served upto but displays different data depending
any visitor the same, on information such as the time of day,
every time the user who is logged in, the date, the
search term it has been given to look
for.

• Contains simple HTML • Along with HTML code also contains


dynamic code ( in form of script)
• Requires no additional • Special software must be installed on
special software the server to create a dynamic web
page.
Web browser

• A web browser is a program that lets us visit differnet


sites on the Net and display their offerings on our own
computer
• Commonly used web browsers:
• Mozilla FireFox, Google Chrome, Opera, Safari, Internet
Explorer, Torch, Maxthon, Sea Monkey, Avant Browser,
Deepnet Browser
Web Hosting

• Web Hosting is a means of hosting web server


application on a computer system through which
electronic content on the Internet is readily available to
any web browser client. The computer system
providing the web hosting is known as web server or
web host.
Type of Web Hosting

• Free Hosting:- This type of hosting is available with many


prominent sites that offer to host some web pages for
no cost. Example geocities, tripod, homestead etc
• Virtual or Shared Hosting :- This type of hosting is
provided under one’s own domain name. With hosting
plan with the web hosting company one can present
oneself as a fully independent identity to his/her web
audience
• With virtual hosting is where one’s web site domain is
hosted on the web server of hosting company along with
other web sites.
• Dedicated Hosting :- In this type of hosting the company
wishing to go online, rents an entire web server from a
hosting company. This is suitable for companies hosting
larger web sites, maintaining other’s sites or managing a
big online mall exc.
4. Co location Hosting

• For those who do not fit the dedicated server mold,


hosting companies offer a similar but less restrictive
hosting known as co-location hosting. In this company
actually owns the server on which its site is hosted.
The company owning the site rather than the web
hosting company.
Web 2.0

• Web 2.0 refers to added features and applications that


make the web more interactive, support easy online-
information exchange and interoperability . Some
noticeable features of Web 2.0 are blog, wikis, video
sharing , web sites social networking websites.
• Web 2.0 tools are available free and are widely used by
the people; some of the most noticeable etc:
• Facebook, Myspace, WordPress, Twitter, YouTube etc
HTML
• HTML stands for Hyper Text Markup Language.
Everything that we see on the Web is documents
written in a special language called HTML. This language
tells the browsers how to display text, pictures and links
on the screen.
• HTML is just a page layout and hyperlink specification
language. It does not supports multimedia. It provides
many layout commands called tags that lets to control
the presentation of information on a web pages.
XML
• It stands for eXtensible Markup Language. It is
markup language for documents containing
structured information. It contains both content
(words, picture etc) and some indication of what
role that content plays.
• The XML specification defines a standard way to
add markup to documents.
HTML Vs XML
HTML XML
Tags are predefined Tags are not predefined i.e. user
can create their own tag
Tag are semantic Tag are not semantic
Tag may be open as well as No open tag
close.
HTML is focused on XML mainly focuses on transfer
presentation of the data of data
DHTML (Dynamic HTML)

• It refers to Web content that changes each time it is


viewed. For example same URL could result in a
different page depending on any number of
parameters, such as :
– Geographical location
– Time of day
– Previous pages viewed by the reader
– Profile of the reader.
Web Scripting

• The process of creating and embedding scripts in a


web page is known as web scripting. A script or
computer script is a list of commands that are
embedded in a web page normally and are interpreted
and executed by a certain program or scripting engine.
• The programming language in which scripts are written
are called scripting language. Most common are
VBScript, JavaScript, ASP, PHP, PERL , JSP etc
Types
Client Side
• It supports interaction within a webpage. It is browser
independent i.e the client side browser must be
scripting enable in order to run it. VBScript, JavaScript,
PHP(Hypertext Preprocessor)

Server

Side
It supports execution at server end i.e. it enables the
completion or carrying out a task at the server end and then
sending the result to the client end. ASP(Active Server page),
JSP(Java Server Page), Perl, PHP(Hypertext Preprocessor)
Client Side Vs Server Side
Client Side Scripting Server Side Scripting
Script code is downloaded The script is downloaded at
and executed at client end. the server end and the result
is sent to the client end
Response to interaction is Complex processes are more
more immediate once the efficient as the program and
program code has been associated resources are not
downloaded downloaded to the browser
Client Side Scripting Server Side Scripting
Services are secure as they Have access to files and data
do not have access to files bases but have security
and databases. consideration when sending
sensitive information.

Browser dependent Does not depend on browser

Affected by the processing Affected by the processing


speed of user’s computer speed of the host server.

You might also like