Computer Network
Computer Network
Two digital devices are said to be interconnected if they are capable of exchanging information or
data sharing or share resources.
Types of architecture:
i. Peer to Peer architecture: In this architecture, each and every computer acts as both
requestor and responder(Client and Server).
ii. Client-Server architecture: In this architecture, there is a dedicated machine that is
completely devoted as service provider(Server) and rest of the devices are the request
generator(Client).
Server: A server is service provider for the nodes who sends the request for providing services. A
network can have more than one server also. Each server has a unique name on the network and all
the users of network identify the server by its unique name.
Types of Servers:
a. Non-dedicated: These servers can act as both service requestor as well service provider
b. Dedicated: These servers are completely dedicated for service providing.
Types of Network:
On the basis geographical spread, the network is classified into four categories:
b. Co-axial cable: This type of cable consists of a solid wire core surrounded by one or
more foil or wire shields, each separated by some kind of plastic insulator. The inner
core carries the signal and the shield provides the ground. The coaxial cable has high
electrical properties and is suitable for high speed communication. It is widely used
for television signals. In the form of (CATV) cable, it provides a cheap means of
transporting multi-channel television signals around metropolitan areas. It is also
used by large corporations in building security systems.
c. Optical Fiber cable/Fiber optics: Optical fibers consists of thin strands of glass or
glass like material which are so constructed that they carry light from a source at
one end of the fiber to a detector at the other end. The light sources used are light
emitting diodes(LEDs) or laser diodes(LDs) The data to be transmitted is modulated
onto the light beam using frequency modulation techniques. The signals can then
picked up at the receiving end and demodulated. The bandwidth of the medium is
potentially very high.
1. Core: The glass or the plastic through which the light travels
2. Cladding: It is covering of the core that reflects light back to the core
3. Protecting Coating: It protects the fiber cable from hostile environment.
ii. Unguided media/wireless media: It includes waves through air, water or vaccum.
a. Microwave(Terrestrial Microwave): Microwave signals are used to transmit data
without the use of cables. It is very much similar to radio and television signals and
are used for long distance communication. The microwave transmission consists of a
transmitter, receiver and the atmosphere.
In microwave communication, a parabolic antennas are mounted on towers to send
a beam to other antenna placed at tens of kilometres away. The higher the tower,
the greater the range.
b. Radiowave: In this media radio frequency is used, that’s why it is termed as
radiowave transmission. It is preferably used in hilly areas where, wired media
cannot be installed because digging or hanging the cables is difficult. One more
reason is frequent occurrence of natural calamities that leads to repetitive
installation of wires, if used.
c. Satellite: Satellite communication is special case of microwave relay system. It uses
the synchronous to relay the radio signal transmitted from ground station.
In satellite communication the earth station consists of a satellite dish that functions
as an antenna and communication equipment to transmit and receive data from
satellite passing overhead.
d. Infrared: This type of transmission uses infrared light to send data. You can see the
use of this type of transmission in everyday life- TY remotes, automotive garage
doors, wireless speakers etc.
The infrared light transmits data through the air and can propagate throughout a
room.
e. Laser: The laser transmission requires direct line of sight. It is unidirectional like
microwave, but has much higher spend than microwave. It requires a laser
transmitter and photo-sensitive receiver at each end. This type of transmission is
point -to-point, typically between buildings.
But lasers have a certain disadvantage, which is: It can be adversely affected by
weather.
Network Topology:
The pattern of interconnection of nodes in a network is called the Topology.
The selection of topology for a network cannot be done in isolation as it affects the choice of media
and the access method used. There are a number of factors to consider in making this choice, the
most important of which are mentioned below:
i. Cost: For a network to be cost effective, one would try to minimize installation cost. This
may be achieved by using well understood media and also, to a lesser extent, by
minimizing the distances involved.
ii. Flexibility: Because the arrangement of furniture, internal walls etc in offices is often
subject to change, the topology should allow for easy reconfiguration of the network.
This involves moving existing nodes and adding new ones.
iii. Reliability: Failure in a network can take two forms. Firstly, an individual node can
malfunction. This is not nearly as serious as the second type of fault where the network
itself fails to operate. The topology chosen for the network can help by allowing the
location of the fault to be detected and to provide some means of isolating it.
a. Bus Topology or Linear topology: This topology consists of a single length of the
transmission medium (cables) onto which the various nodes are attached. The topology is
used in traditional communication network where the host at the one end of the bus
communicates with several terminals attached along its length.
The transmission from any station travels the length of the bus, in both directions and can
be received all other stations.
Advantages:
Short Cable Length
Resilient Architecture
Easy to extend
Disadvantages:
b. Ring Topology: In this topology, each node is connected to two and only two neighbouring
nodes. Data is accepted from one of the neighbouring nodes and is transmitted onwards to
another. Thus data travels in one direction only, from node to node around the ring.
Advantages:
Short length
No wiring closet space is required
Suitable for Optical fiber cable
Disadvantages:
c. Star Topology: This topology consists of a central node to which all of the other nodes are
connected by a single path. It is the topology used in most existing information networks
involving data processing or voice communication.
Advantages of Star topology:
Ease of service
One device per connection.
Centralized Control/Problem Diagnosis
Simple access protocols
Transmission in this topology takes place in the same way as in the bus topology. In both
cases, there is no need to remove packets from the medium because when a signal
reaches the end of the medium, it is absorbed by the terminators
v. Mesh Topology: In this topology, each node is connected to more than one node to
provide an alternative route in the case the host is either down or too busy.
The mesh topology is excellent for long distance networking because it provides
extensive back-up, rerouting and pass-through capabilities. Communication is possible
between any two nodes on the network either directly or by passing through. The mesh
topology is commonly used in large internetworking environments with star, ring and
buses attached to each node. This is also ideal for distributed networks.
Network Devices:
i. Modem: A modem is a computer peripheral device that allows you to connect and
communicate with other computers via telephone lines.
Modem converts digital signals to A/F(Audio Frequency) tones which are in the
frequency range that the telephone lines can transmit and also it can convert
transmitted tones back to digital information.
ii. Rj-45: it stands for Registered Jack-45. Rj-45 is an eight-wire connector, which is
commonly used to connect computers on the local area networks I,e LANs especially
Ethernets. Ethernet uses either bus or star topology and supports data transfer rates up
to 10Mbps.
iii. Ethernet Card: An Ethernet card contains connection for either coaxial or twisted pair
cables(or both), If it is designed for coaxial cable, the connection will be BNC(Bayone-
Neill-Concelman). If it is designed for twisted pair, it will have a RJ-45 connection.
Ethernet card is inserted in its on the motherboard. Usually Ethernet Cards are
purchased separately from a computer, but these days many computers include an
option for pre-installed Ethernet card.
iv. Hub: It is a hardware device to connect several computers together. A hub that contains
multiple independent but connected modules of network and inter-networked
equipment. It is also known as Concentrator. In star topology, twisted pair wire is run
from each workstation to a central concentrator.
A switch is responsible for filtering i.e transforming data in a specific way and forwarding
packets between LAN and segments. Switch supports Packet Protocol.
vi. Repeater: It is a device that amplifies a signal being transmitted on the network. It is
used in long network lines (distance more than 100 mtrs). which exceeds the maximum
rated distance for a single run.
Over distance, the cables connecting a network loses the signal transmitted. If the signal
degrades too much, it fails to reach the destination. Or if it does arrive, the degradation
of the message makes it useless. Repeaters can be installed along the way to ensure that
viii. Router: A router is a network device that is used to separate different segments in a
network to improve performance and reliability. A router works like a bridge but can
handle different protocols. A Router differs from a bridge in a way that former uses
logical addresses and the latter uses physical addresses.
IP(Internet Protocol): 192.168.0.1
MAC(media access control): 26:A6:56:12:B4:32
Manufacturer’s Id Custormer’s ID
ix. Gateway: A Gateway is a network device that connects dissimilar network. It establishes
an intelligent connection between a local area network and external networks with
completely different structures.
x. Wifi-Card: A WIFI card is either an internal or external local area network adapter built-
in wireless radio and antenna. The most common WIFI cards are used in desktop
computers are PCI -Express WIFI cards made to fit the PCI-Express card slots on the
motherboard.
The benefit of using WIFI card in a desktop computer is that it allows you to setup your
workstation or home office without considering the proximity or availability of hard line
network access.
Hub Switch
It repeats the incoming traffic to all connections It sends only to appropriate connections
It offers single lane connection, hence either It establishes two-lane communication,
send or receive at a time facilitating send and receive at the same time
It shares the bandwidth among its connections It does not share bandwidth, each connection
gets full bandwidth.
It is an inexpensive choice It is expensive than hub
ARPANET:- Short for Advanced Research Projects Agency Network, ARPANET or ARPAnet began
development in 1966 by the United States ARPA. ARPANET was created to make it easier for people
to access computers, improve computer equipment, and to have a more effective communication
method for the military. Between 1969 and 1977, ARPANET grew from a network of four computer
sites to one with 111 computers belonging to universities, research facilities and the military. Using
satellite links, ARPANET connected computer systems in the continental United States to computers
in Hawaii and Europe.
Switching techniques:-
switching techniques are:-
packet switching and message switching
communication channel:-
A communication channel refers either to a physical transmission medium such as a wire, or to a
logical connection over a multiplexed medium such as a radio channel in telecommunications and
computer networking.
NETWORK PROTOCOL
FTP:- The File Transfer Protocol is a standard network protocol used for the transfer of computer
files between a client and server on a computer network. FTP is built on a client-server model
architecture using separate control and data connections between the client and the server.
HTTP:- As a request-response protocol, HTTP gives users a way to interact with web
resources such as HTML files by transmitting hypertext messages between clients and
servers. HTTP clients generally use Transmission Control Protocol (TCP) connections to
communicate with servers.
SMTP:- SMTP stands for Simple Mail Transfer Protocol. SMTP is a set of communication
guidelines that allow software to transmit an electronic mail over the internet is called Simple
Mail Transfer Protocol. It is a program used for sending messages to other computer users
based on e-mail addresses.
POP3:- POP3 is a client/server protocol in which e-mail is received and held for you by your
Internet server. Periodically, you (or your client e-mail receiver) check your mail-box on the
server and download any mail, probably using POP3.
Remote Login (Telnet):- A remote login facility permits a user who is using one computer to
interact with a program on another computer. ... The Internet's remote login service is
called TELNET. To use the service, one must invoke a local application program and specify
a remote machine.
1. VoIP:- VOIP is an acronym for Voice Over Internet Protocol, or in more common
terms phone service over the Internet. If you have a reasonable quality Internet
connection you can get phone service delivered through your Internet connection
instead of from your local phone company.
2. Wireless technologies such as Wi-Fi and WiMax.
India IT Act:- The IT Act was introduced to grant impetus to the rise of digital
technologies in the country and establish a legal system to foster e-commerce.
Some of the purported aims of the Act have, indeed, been realised as may be
evinced by the proliferation of smartphones and digital businesses.
Cyber Law:- Cyber law, also known as cyber crime law, is legislation focused on
the acceptable behavioral use of technology including computer hardware and
software, the internet, and networks. Cyber law helps protect users from harm by
enabling the investigation and prosecution of online criminal activity.
IPR issues:- Intellectual property rights are legal rights that provide creators protection for
original works, inventions, or the appearance of products, artistic works, scientific
developments, and so on. There are four types of intellectual property rights (IP): patents,
trademarks, copyrights, and trade secrets.
Hacking. Hacking is an attempt to exploit a computer system or a private network inside a
computer. Simply put, it is the unauthorised access to or control over computer network
security systems for some illicit purpose. Description: To better describe hacking, one
needs to first understand hackers.
Introduction to Internet, URL, WWW, and its applications- Web, email, Chat, VoIP.
Web Browser: A web browser is an application that navigates through World Wide Web and
displays web pages.
Web Address: Each website has a unique address called URL (Uniform Resource Locator).
The Internet structure of World Wide Web is built on a set of rules called Hypertext Transfer
Protocol(HTTP) and a page description language called Hypertext Markup Language(HTML) . HTTp
uses internet addresses in a special format called a Uniform Resource Locator(URL).
type://address/path
e..g http://www.chinmayabokaro.org/student/login.aspx
Here, http: specifies the type of server, www.chinmayabokaro.org is the address of the server and
student/login.aspx is the path of the file login.aspx
Domain Name: A URl specifies the distinct address for each resource on the Internet. An Internet
address is character based is called Domain Name. The naming scheme by which servers are
identified is also known as the Domain Name System.
In addition to it, a two-letter abbreviation indicating the country name may be used
e.g.
Au Australia In India
Dk Denmark Fr France
Ca Canada Jp Japan
Nz New Zealand Uk United Kingdom
HTML:- Hypertext Markup Language is the standard markup language for documents designed to
be displayed in a web browser. It can be assisted by technologies such as Cascading Style
Sheets and scripting languages such as JavaScript. The markup tells web browsers how to
display a web page's words and images.
XML:- Extensible Markup Language (XML) is a markup language that defines a set of rules
for encoding documents in a format that is both human-readable and machine-
readable. XML is designed to store and transport data.
WWW and its Applications:
WWW stands for World Wide Web: It is a set protocols that allows us to access any type of
documents on the internet through a naming system based on URLs. WWW also specifies a way- the
hypertext transfer protocol (HTTP)- to read, receive and send the documents over the internet. With
these standard protocols of WWW in place, one can setup a server and construct hypertext
documents with links in them that point to the documents on the server.
WWW attributes:
i. user-friendly
ii. Multi-media documents
iii. Hypertext and Hyperlinks
c:\\sudha\abc.docx
Applications of WWW:
Website: Introduction, difference between a website and webpage, static vs dynamic web page,
web server and hosting of a website.
Commonly used browsers: Internet Explorer, Microsoft Edge, Google Chrome, Mozilla Firefox,
Safari, Opera.
Browser settings:
Enable Javascript: Tools > Internet Options > Security Tab > Internet > Custom Level > Scroll
down to Scripting and enable "Active Scripting," "Allow Programmatic clipboard access," "Allow
status bar updates via script," "Allow websites to prompt for information ...," and "Scripting of
Java applets".
OK back browser.
Enable Status bar: View > Toolbars > Check "Status Bar".
Get New Page Each Visit: Tools > Internet Options > General Tab > in Browsing history
section, click the Settings button > select "Every time I visit the webpage." OK and OK back to
browser.
Pop-up Blocker Settings: Tools > Pop-up Blocker > Pop-up Blocker Settings ... > Add
ucmo.edu and ucmo.blackboard.com > Close back to browser.
Trusted Sites: Tools > Internet Options > Security > Trusted sites > Sites > Uncheck "Require
server verification for all sites in this zone"
Discussion Board Issues: Tools > Internet Options > Security Settings > Custom Level > scroll
down to Miscellaneous and set “Launching programs and files in an IFRAME” to Prompt. OK
and OK back to browser.
NOTE: for Mac OS X browsers, access preferences via the Application Menu (ex.
Firefox>Preferences).
Enable Cookies: Tools > Options > Privacy > History pane: Use custom settings for history >
Cookies > select “Accept cookies from sites” and "Accept third-party cookies." OK back to
browser.
Mozilla
Firefox Enable Javascript: Tools > Options > Content > check the “Enable Javascript” box. OK back to
(PC and browser.
Mac)
Get new page each visit: Tools > Options > Privacy > History pane: Use custom settings for
history > select "Clear history when Firefox closes.“ Click Settings and select "Cache.” OK and
OK back to browser.
Popup Blocker Settings: Tools > Options > Content > Click the “Exceptions” button next to
Block Pop-up Windows > Add ucmo.edu and ucmo.blackboard.com > Click Allow and Close.
OK back to browser.
Clear Browser Cache: Tools > Clear Recent History > Select Cache. OK back to browser.
Google NOTE: for Mac OS X browsers, access preferences via the Application Menu (ex.
Chrome Chrome>Preferences).
(PC and Enable Cookies: Settings > Show advanced settings > Privacy > Content Settings... > Cookies
Mac) > check "Allow local data to be set.." OK and close Settings tab back to browser.
Enable Javascript: Settings > Show advanced settings > Privacy > Content Settings... >
Javascript > check “Allow sites to run Javascript”. OK and close Settings tab back to browser.
Get new page each visit: Settings > Show advanced settings > Privacy > Content Settings... >
Cookies > Select "Keep local data only unitl I quit my browser” OK. Close Settings tab back to
browser.
NOTE: This will also clear your cookie each time the browser is closed. Unfortunately, Chrome
doesn't have a mechanism to automatically clear only the cache. You could alternatively just
routinely clear the browser cache (instructions provided below).
Popup Blocker Settings: Settings > Show advanced settings > Privacy > Content Settings... >
Pop-ups > Click the “Manage exceptions” button > Add ucmo.edu and ucmo.blackboard.com >
set behavior to "Allow." OK and close Settings tab back to browser.
Clear Browser Cache: History > Clear browsing data: Select "the beginning of time" from the
"Obliterate..." drop down, Select "Emtpy the cache" and click the Clear brwosing data button.
Close Settings tab back to browser.
All Settings: Safari Menu > Preferences > click Security icon > Check: Enable Plugins, Java, &
Safari Javascript.
(Mac
Only) Clear checkbox on "Block Popup Windows."
Add-ons and plug-ins: In computing, a plug-in (or plugin, add-in, addin, add-on, or addon) is a
software component that adds a specific feature to an existing computer program. When a program
supports plug-ins, it enables customization.
Applications support plug-ins for many reasons. Some of the main reasons include:
Cookies: Cookies are text files with small pieces of data — like a username and password — that are
used to identify your computer as you use a computer network. The purpose of the computer cookie
is to help the website keep track of your visits and activity. This isn’t always a bad thing. For
example, many online retailers use cookies to keep track of the items in a user’s shopping cart as
they explore the site. Without cookies, your shopping cart would reset to zero every time you clicked
a new link on the site. That would make it difficult to buy anything online!