Communication and Network Concepts Abbreviations
Communication and Network Concepts Abbreviations
Abbreviations
ARPANET
NSFnet
TCP/IP
NIU
NIC
TAP
MAC
LAN
MAN
PAN
WAN
WWW
VGM
DGM
UTP
STP
PDA
bit
binary digit
bps
Bps
kbps
Kbps
mbps
Mbps
kHz
kilohertz
MHz
megahertz
GHz
gigahertz
THz
terahertz
MODEM
MOdulation DEModulation
AM
Amplitude Modulation
FM
Frequency Modulation
PM
Phase Modulation
A/F
Audio Frequency
DTE
DCE
TXD
Transmit
RXD
Receive
RTS
Request To Send
CTS
Clear To Send
CD
Carrier Detect
DTR
DSR
RJ-45
Registered Jack 45
BNC
Bayone-Neill-Concelman
AUI
SNA
VFIR
HTTP
URI
URL
URN
MIME
SMTP
NNTP
FTP
SLIP
PPP
IP
Internet Protocol
IPCP
IP Control Protocol
NCP
LCP
ISDN
ISP
GSM
SIM
TDMA
CDMA
WCDMA
TDM
IDEN
WLL / WiLL
PSTN
GPRS
CSD
UMTS
EDGE
SMS
SMSC
IRC
SIP
ITU
VoIP
Wi-Fi
Wireless Fidelity
BWA
HTML
DNS
POP
XML
DHTML
ASP
PHP
Hypertext Preprocessor
PERL
JSP
OSS
FLOSS
FOSS
GNU
FSF
W3C
MIT
GPL
UNCITRAL
Laws
IPR
Intellectual Property
FAT
WAIS
ASCII
OSI
Network
An interconnected collection of autonomous computers.
Network Goals
Resource Sharing
Reliability
Cost factor
Communication medium
Application of Networks
1. Sharing
Peripherals
Exchange of Information
Distributed control
2. Access to remote database
Reservation for airplanes, trains, hotels
3. Communication facilities
Communication Medium
Evolution of Networking
ARPANET (Advanced Research Projects Agency NETwork)
First network project by US Department of Defence in 1969 to connect
computers at different universities and US defense.
NSFnet (National Science Foundation network)
It is a high capacity network developed in mid 80s allowed only the
academic research.
Internet
-
Gateway
A Gateway is a device that connects dissimilar networks.
Backbone
A Backbone is a central interconnecting structure that connects one or
more networks just like the trunk of a tree or the spine of a human being.
Protocol
It is a set of rules for communication.
TCP (Transmission Control Protocol)
-
IP (Internet Protocol)
It is responsible for handling the address of the destination computer.
InterSpace
Circuit switching
Message Switching
Packet Switching
Circuit Switching
In this , first the complete physical connection between two computers is
established and then data are transmitted from the source computer to the
destination computer.
Its like Telephone call
Message Switching
In this, source computer sends data to switching office(Buffer). The data is
passed on as a free link to the next Switching office. This process continues
until the data reaches the destination computer.
This type of switching will work like Postal Service
Packet Switching
Tight upper limit on block size
Data packets are stored in
main memory. It improves the
performance
Guided Media
Unguided Media
Cables
Waves through air, water or vacuum
Guided Media
Thicknet
Optical Fibers
PAN
LAN
MAN
WAN
Network topologies
The pattern of interconnection of nodes in a network is called the topology
Factors of Network Topologies
Cost
Flexibility
Reliability
Point to point Link
Star topology
Bus / Linear topology
Ring or circular topology
Tree topology
Graph topology
Mesh topology
Fully connected topology
Network devices
Modem (Modulation / Demodulation)
Ethernet card
For coaxial/twisted
Hub
Function of a Hub
It transfers the data to all the connected ports in the same segment.
Hub is a multiport repeater, which causes unnecessary network traffic.
Hence it is called non-intelligent or dumb device.
A Hub would be like, in a hotel just one phone line available to all the
rooms
A hub can send or receive information, but it cant do both at a time.
The Peripherals are the devices are the devices that surround the system unit.
Ex. Keyboard, mouse, Speakers, printers, monitors etc.
Types of hubs
Active Hubs It is used like repeaters since it amplifies the signal
electrically
Passive Hubs
It is used to pass the signal from one computer
to another without any change.
Switch
Function of Switch
Switch establishes a temporary connection between the source and
destination and then terminates the connection once the conversation is
done.
A switch would be like a phone with private lines.
Repeater
A repeater is a network device that amplifies and restore signals for long
distance transmission.
If the distance exceeds 100m a repeater needs to be added there.
Bridge
A bridge is a network device that establishes an intelligent connection
between two local networks with the same standard but with different types of
cables.
Router
A router is a network device that is used to separate different segments in
a network to improve performance and reliability. A router works like a
bridge but can handle different protocols.
It is used for WAN connections / shared internet access.
Function of a router
Compared to hubs and switches, routers are smarter still. Routers use a
more complete packet address to determine which router or workstation should
receive each packet next. Based on a network road map called a routing table,
routers can help ensure that packets are travelling the most efficient paths to
their destinations. If a link between two routers fails, the sending router can
determine an alternate route to keep traffic moving
Steps
Data is sent to the router
The router determines the destination address and forwards it to the next
step in the journey.
The data reaches its destination
Gateway
Proxy Server
A machine that is not actually a server but appears as a server.
Firewall
A system designed to prevent unauthorized access to or from a private
network
LAN Design
80 20 Rule
80 percent of the traffic on a given network segment is local whereas 20
percent of the network traffic should need to move across a backbone.
Hub/Switch
It must be placed in all the blocks which contains more than one computer
Repeater
If the distance between two blocks exceeds 100m then a repeater needs
to be added between those two blocks.
Bridges
Flooding
Flooding is a simple network routing algorithm in which every incoming
packet is sent through every outgoing link except the one it arrived on. It is used
in bridging.
Problem with hubs
Hubs share bandwidth among all attached devices. Hubs cannot filter
traffic. They sent data frames to all connected nodes or devices.
The Solution
The solution for the above problem is to use a smarter hub called a
BRIDGE. Bridges can filter network traffic based on MAC addresses.
Problem with a Switch
A switch cannot stop traffic( data packets) destined for a different LAN
segment travelling to all other LAN segments.
The Solution
The solution to above problem is a ROUTER. The Routers filter network
traffic based on IP address. The IP address tells the router which LAN segment of
the network traffic(data packets) belongs to.
Combining Hubs, Switches and Routers
Hubs are best used in small networks where there are few nodes on the
segment
When the number of nodes on the network grows, move to switches.
Replace hubs with switches if the utilization is over 40 percent on Ethernet
networks or above 70 percent on Token Ring and FDDI network
FDDI (Fiber Distributed Data Interface) is a standard for data transmission
on fiber optic lines in a LAN that can extend in range upto 200km.
Difference between Hub and Switch
Hub
Sends the incoming data
Packets to all connections
Switch
Sends the incoming data
Packets to appropriate
connections
Offers two-lane connection,
hence send and receives at
the same time
Doesnt share bandwidth,
each connection gets full
bandwidth
Expensive than hubs
Communication protocols
A protocol is a special set of rules to exchange information between the
communicating entities.
HTTP (Hyper Text Transfer Protocol)
Objectives of FTP
IP (Internet Protocol)
It is responsible for handling the address of the destination computer.
It provides the basic service of getting datagrams to their destination
Datagram
A Datagram is a collection of the data that is sent as a single message.
SLIP (Serial Line Internet Protocol)
It is used for delivering IP packets over dial-up lines.
PPP (Point to Point Protocol)
It is used for transmitting IP packets over serial lines.
It is a layered protocol with the following layers
Wireless communication
It is simply the data communication without the use of landlines(without a
physical connection)
Not all wireless communication technologies are mobile.
Mobile computing
SIM cards are small removable disks that slip in and out of GSM cell
phones
It gives a cellular device its unique phone number
It has memory, a processor and the ability to interact with the user.
1G networks
NMT, C-Nets, AMPS, TACS are considered to be the first analog cellular
systems
1G networks were conceived and designed purely for voice calls .
No consideration of data services.
2G networks
2.5G networks
3G networks
UMTS FDD and TDD, CDMA2000 1x EVDO, CDMA2000 3x, TD-SCDMA, Arib
WCDMA, EDGE, IMT-2000 DECT are newer cellular networks that have data
rates of 384 bit/s and more
It is a radio based high speed mobile data standard with 384 kbps speed.
It is formerly called GSM384
Video Conferencing
Wi-Fi Hotspots
A hotspot is a venue that offers Wi-Fi access.
WiMax
WiMax can provide Broadband Wireless Access(BWA) upto 50 km for fixed
stations and 5 15 kms for mobile stations.
Internetworking Terms ad Concepts
WWW(World Wide Web)
It is a set of protocols that allows you to access any document on the net
through URLs
WWW Attributes
User friendly
Multimedia Documents
Hypertext and Hyperlinks (Dynamic link to files or documents on net is
called hyperlink)
Interactive
Frames
Telnet
It is an Internet utility that lets you log onto remote computer systems.
Web Browser
A web browser is a WWW client that navigates through the WWW and
displays the web pages.
Ex. Internet Explorer, Google Chrome, Netscape Navigator
Web Server
A web server is a WWW server that responds to the requests made by web
browsers.
Website
A location on a net server is called a website.
Ex. microsoft.com
Web Address
Each website has a unique address called Web address/URL.
Ex. http://www.microsoft.com
Web page
Each page/document of a website is called as web page.
URL (Uniform Resource Locator)
The internet structure of the WWW built on a set of rules called HTTP and a
page description language called HTML. HTTP uses Internet addresses in a
special format called a URL.
Domain Names
A URL specifies the distinct address for each resource on the Internet. An
Internet address which is character based is called a Domain Name
DNS (Domain Name System)
The character based naming system by which servers are identified is also
known as DNS
Web hosting
It is a means of hosting web-server application on a computer system
through which electronic content on the internet is readily available to any
web-browser client.
The various types of web hosting services
Free hosting
This type of hosting is available with many prominent sites that offer to
host some web pages for no cost. Ex: geocities, tripod, homestead etc.
Virtual or shared hosting
This type of hosting is provided under ones own domain name,
www.yourname.com.
Dedicated hosting
In this type of hosting, the company wishing to go online, rents an entire
web server from a hosting company.
Colocation hosting
For those who do not fit the dedicated sever mold, hosting companies
offer a similar, but less-restrictive hosting, known as colocation hosting.
Web 2.0
Refers to added features and applications that make the web more
interactive, support easy online-information exchange and interoperability.
Some noticeable features of this are blogs, wikis, video-sharing websites,
social networking sites, RSS etc.
Web 2.0 tools are available free and are widely used by people.
Ex.
Facebook
WordPress
Myspace
Twitter
Digg
YouTube
Del.icio.us
Blogger
Flickr
HTML
XML
client-side scripts
server-side scripts
Client-side scripts
Client-side scripting supports interaction within a webpage. Ex. VBScript,
JavaScript,
Hypertext Preprocessor (PHP)
Server-side scripts
It supports execution at server-end. Ex. PHP, Perl, ASP (Active Server Pages), JSP
(Java Server Pages) etc.
Difference between client side scripting and server side scripting
Client-side scripting
Script code is downloaded and
executed at client end
Response to interaction is more
immediate once the program code has
been downloaded
Services are secured as they do not
have access to files and databases
Browser dependent
Affected by the processing speed of
users computer
Server-side scripting
The script is executed at the server
end and the result is sent to the client
end
Complex processes are more efficient
as the program and associated
resources are not downloaded to the
browser
Have access to files and databases
but has security considerations when
sending sensitive information
Doesnt depend on browsers
Affected by the processing speed of
host server
free software
open source software
Free software
Means the software is freely accessible and can be freely used, changes,
improved, copied and distributed by all who wish to do so. No payments
are needed to be made.
Definition of free software is published by Richard Stallmans Free Software
Foundation
The distribution term of open-source software must comply with the following
criteria:
1. Free redistribution.
2. Source code.
3. Derived works.
4. Integrity of the authors source code.
5. No discrimination against persons or groups.
6. No discrimination against fields or endeavour.
7. Distribution of license.
8. License must not be specific to a product.
9. The license must not restrict other software.
10.License must be technology neutral.
FOSS
A software which is free as well as open belongs to category FOSS(Free
and open source software).
1. OSS and FLOSS
OSS refers to open source software, which refers to
software whose source code is available to customers and it can be
modified and redistributed without any limitation. FLOSS refers to free
libre and open source software or to free livre and open source software.
The term FLOSS is used to refer to a software which is both free software
as well as open source software. Here the words libre and livre mean
freedom.
2. GNU
GNU refers to GNUs Not Unix.
3. FSF
FSF is free software foundation. FSF is a non-profit organization created
for the purpose of supporting free software movement. Richard Stallman
founded FSF in 1985 to support GNU project and GNU licenses.
4. OSI
OSI is open source initiative. It is an organization dedicated to cause of
promoting open source software. Bruce Perens and Erics Raymond were
the founders of OSI, which was founded in February 1998.
5. W3C
W3C is acronym for World Wide Web consortium. W3C is responsible
for producing the software standards for World Wide Web.
6. Proprietary Software
It is the software that is neither open nr freely
available.
7. Freeware
It is generally used for software, which is available free of cost and
which allows copying and further distribution, but not modification and
whose source code is not available. Example is Microsoft internet explorer.
8. Shareware
It is available with the right to redistribute copies.
Shareware is not the same thing as free and open source software for 2
main reasons:
a) The source code is not available and
b) Modifications to the software are not allowed.
NETWORK SECURITY
Protection methods:
Authorisation
Determines whether the service provider has granted access to the web
service to the requester. Ex. user name
Authentication
It involves accepting credentials from the entity and validating them
against an authority.
Ex. password
Encrypted smart cards
Passwords in a remote log-in session generally pass over the network is
unencrypted form.
Biometric systems
They form the most secure level of authorisation. They involve some
unique aspect of a persons body such as finger prints, retinal patterns
etc, to establish his/her identity.
Firewall
A system designed to prevent unauthorised access to or from a private
network is called firewall. Can be implemented in both hardware or
software or a combination of both. They are frequently used to prevent
unauthorised internet users from accessing private networks connected to
the internet, especially intranets.
Types of firewalls
Packet filter
Looks as each packet entering or leaving the network and accepts or
rejects it based on user defined rules
Application gateway
Applies security mechanism to specific applications such as FTP and Telnet
servers
Circuit level gateway
Applies security mechanisms when a connection is established
Proxy server
Intercepts all messages entering and leaving the network. It effectively
hides the true network addresses
Cookies
Cookies are messages that a web server transmits to a web browser so
that the web server can keep track of the users activity on a specific
website.
They have 6 parameters:
Name
Value
Expiration date
Path the cookies valid for
Domain the cookies valid for
Need for a secure connection
Hackers and crackers
Crackers are the malicious programmers who break into secure systems
whereas hackers are more interested in gaining knowledge about
computer systems and possibly using this knowledge for playful pranks
CyberLaw
Is a generic term, which refers to the legal and regulatory aspects of
internet and WWW
Indias IT act
In India, the cyber laws are contained in the IT Act 2000 (Oct 17). It is
based on the united nations commission for international trade related
laws (UNCITRAL) model law
Cyber crimes
Crimes committed with the use of computers or relating to computers
especially through internet
Classification of cyber crimes
IPR Issues
Intellectual Property is the product of the intellect that has commercial
value, including copyrighted property such as literary or artistic works and
ideational property
Viruses
It is a malicious program that requires a host and is designed to make a
system sick, just like a real virus
Three types of viruses
Able to replicate
Requires a host program as a carrier
Activated by external action
Replication ability is limited to the virtual system
Trojan Horses
Worms
A program designed to replicate
Characteristics of a worm
Able to replicate
Self-contained
Does not require a host
Activated by creating process
Network worm replicate across communication links
Spam
Refers to electronic junk mail or junk newsgroup postings
Virus Preventions
Procedural programming
Here emphasis is on doing things
(functions)
Follows Top-Down approach in
program design
Presence of global variables increase
chances of accidental change in data
Features like data encapsulation,
polymorphism, inheritance are not
available