Computer Network and Internet
Computer Network and Internet
Each computing device in a network is called a node or station. The nodes can
be routers, personal computers, and servers. Data transformation is done via the
network using rules known as protocols. The protocols are the set of rules which
every node of the network should follow for transferring information over the
wired or wireless network.
Computer networking is the branch of computer science that deals with the
ideation, architecture, creation, maintenance, and security of computer
networks. It is a combination of computer science, computer engineering, and
telecommunication.
Needs :-
To share computer files:- Networks enable users to share files with
others. For example, in a company, one file is to be shared by multiple
branches. When we locate this file on the network system, all the
branches can use this file.
To share computer equipment:-Laser printers and large hard-disk
drives can be expensive. Networks enable users to share such equipment
by networking microcomputers or workstations together.
To enable unlike computer equipment to communicate:- A company
with computers of multiple uses using several operating systems,
including MS-DOS, UNIX, WINDOWS 95, and Apple DOS, cannot
share files from one computer to another unless arranged using a
Networking operating system including Network 4.1 or Windows NT 4.0.
To improve communication speed and accuracy :- Sending messages
through networks is virtually instantaneous, and there is also less chance
of a message being lost.
To reduce the cost of data transfer:- The cost of transfers of files using
computers associated with networks is less expensive than other
traditional means like telegrams.
1
Verify Data Transfer:- Fluctuations of costs in foreign exchange and
shares can be broadcasted promptly using the channel of computer
communications. The transmission can be increased and checked at any
occurrence of time.
High Reliability:- All files can be recreated on a few machines, and
therefore if one of them is unavailable (because of hardware failure), the
different copies can be used.
Advantages
Increased storage capacity: You will be able to access files and
multimedia, suchas music and images, which are stored remotely on
another computer ornetwork-attached storage.
Higher information security: As a result of grantingauthorization to
computers, computer networks can provide a sense of security. Most of
the time, authorization is done using a user ID and password. Thus, it
ensures that someone can only log in if their information matches details
in the database.
Easy sharing of files: The data you store on other devices can be shared
with other users and accessed remotely if they are connected.
Faster resources sharing: You can also save money by using networked
resources like printers, scanners, copiers, etc. or by sharing software
among multiple users.
Enhanced data reliability: There is no question that the information
contained in the central server is more reliable. It is also possible to
access similar kinds of data by using another computer if the information
on one PC happens to be lost for any reason. Thus, there are no
disruptions in the office environment, leading to a smooth operation.
Improved communication: Customers, suppliers and the staff can easily
share information and contact one another via email, chat or calls made
over the network.
Better collaboration: Collaboration in the business world is made easier
with the use of computers and a computer network. All these tasks can be
performed comfortably, whether it’s connecting teams, arranging social
gatherings, or acquiring personal responses.
Higher connectivity: It allows individuals to stay connected no matter
where they are. With the advent of video calling apps and Google
documents, we can see live examples of how we can connect with our
friends and colleagues in these testing times.
2
Enhanced flexibility: Computer networks are flexible for several
reasons. They provide users with the opportunity to explore anything they
need to know.
Reliability: Computer networking ensures information backup for
uninterrupted functioning. So, you need not worry about device and
equipment crash anymore.
Disadvantages
Network Setup Costs: Setting up the network requires hardware like
routers, hubs and switches and cabling that can cost significantly. The
cost further varies based on the number of systems to be added to the
network.
Issues with Independent Usage: Because everything is centralized, the
network lacks independence. As a result, individual users cannot use the
computer as they wish.
Malware Infection: Viruses or Malware can propagate easily between
the connected computers in a network. It is quite likely that malware will
spread to the remaining computers if one of the systems gets infected.
However, this can be prevented by running regular malware scans.
Impact on Productivity: Computer networks have many applications
and advantages, which allow simultaneous use of many services.
However, multitasking impacts productivity overall, as your employees
end up managing multiple tasks in one go.
Expert Assistance is Required: Networks must be monitored
continuously to ensure their performance and functionality. Therefore, if
you want to maintain your computer network, you need a team of experts.
Security of Computer Networks is a Concern: From viruses to hackers,
there are many ways in which computer networks can be disrupted.
DDoS attacks, viruses, data corruption, and internet outages are just a few
examples of disruptions you might see on a day to day basis. Regardless
of whether a network is running online or offline, it will not be 100%
secure.
Health Issues: Since computer networks provide access to a variety of
content such as entertainment, games, and movies, this leads to an
addictive dependence on the services and overuse. The excessive amount
of screen time can cause fatigue, eye strain, and body pain as well as
make you feel lethargic.
Poor Internet Accessibility: Despite the fact that most computers
nowadays offer free access, some countries still have connectivity issues.
3
Connectivity challenges are particularly severe in countries that are
developing. It is impossible to guarantee a truly global network until
these challenges are overcome.
Not robust enough: In case a systems’ central linking server or bridging
device fails, or if its principal server detaches, the whole network is
affected. However, you can use a large system as a document server to
resolve this issue.
Light Policing Usage Leads to Negativity: With uninterrupted internet
connectivity, employees often tend to waste their time in gaming or
browsing through non-work-related sites.
Ques 2. What are the various types of networking. Discuss in detail with
proper diagrams.
According to the communication requirements, multiple types of network
connections are available. The most basic type of network classification
depends on the network's geographical coverage.
4
Characteristics of LAN
Benefits of LAN
1. Its main advantages are the local area network's rapid, simple setup and
low cost.
2. Keeping everything stored on the server safe and secure is done through
data protection.
Advantages
5
Disadvantages
1. Need constant administration of experienced engineers for functioning.
2. Probability of leak of sensitive data by LAN administration.
Characteristics of MAN
Benefits of MAN
6
Advantages
1. Provides Full-Duplex data transmission in the network channel for
devices.
2. The network connection area covers an entire city or some parts using the
optic cables.
Disadvantages
1. High probability of attack from hackers and cybercriminals due to large
networks.
2. The need for good quality hardware and the installation cost is very high.
The WAN network can be made up of multiple LAN and MAN networks.
Characteristics of WAN
7
Benefits of WAN
Advantages
1. This network covers a high geographical area and is used for large-
distance connections.
2. They also use radio towers and connect channels for users.
Disadvantages
1. High cost to set up the network and the Support of experienced
technicians is needed to maintain the network.
2. It is difficult to prevent hacking and debug a large network.
LAN is a network
that enables the Several computers
communication can be connected to
The WAN network
between many linked MAN in the same city
extends to a much
devices. It is in or separately. It
Meaning greater area. It can
charge of establishing encompasses a greater
link multiple
connections among region, including
countries together.
neighborhood units, minor towns and
including universities cities.
and schools.
8
LAN is a private and MAN can be either
A single company
secured network. public or private. A
Network may not own WAN. It
Hospitals, schools, lot of businesses and
Authority can be private or
offices, etc., can own telephone companies
public.
it. could own them.
MAN's maintenance
LAN maintenance is WAN maintenance is
Maintenance is easier compared to
very easy. very difficult.
LAN.
Congestion is more in
Congestion is less in the
Congestion It is more in MAN. WAN when compared to
LAN network.
LAN and MAN.
9
LAN network. MAN network. design WAN.
10
Simplex Mode
Communication in Simplex mode is unidirectional, similar to a one-way street.
On a channel, only one of the two devices can send and the other can only
receive. The simplex mode can utilize the entire channel capacity to transfer
data in only one direction.
As an example, consider the keyboard and standard monitors. The keyboard can
only provide input, whereas the monitor can only provide output.
Half-Duplex Mode
11
In half-duplex mode, each station can send and receive, but not at the same
time. When one device is sending the signal, the other can only receive it, and
vice versa. The half-duplex mode is used when communication is not required
in both directions at the same time. For either direction, the channel’s complete
capacity can be used.
12
1. It is slower than full-duplex mode since devices need to take turns to send
and receive data.
2. It is susceptible to collisions when multiple devices try to transmit data
simultaneously, which can lead to data loss and increased latency.
3. It is not suitable for real-time applications that require high-speed data
transfer.
Example: A telephone network connects two people via a phone line, allowing
both to talk and listen at the same time.
13
2. It requires more complex hardware than half duplex mode, making it
more expensive.
3. It may be more susceptible to signal interference since it requires
complex signal processing and error correction mechanisms.
Comparing Simplex, Half-Duplex, and Full-Duplex Modes of Data
Communication
Basis
Half Full
of Simplex
Duplex Duplex
Compa Mode
Mode Mode
rison
Bi-
Bi-
Directi direction
direction
on of al, but
One-way al,
Transm not
simultan
ission simultan
eous
eous
Simulta
Not Not
neous
applicabl applicabl Possible
Transm
e e
ission
Faster
Speed Slow than Fastest
Simplex
Efficie Moderat
Low High
ncy e
14
Basis
Half Full
of Simplex
Duplex Duplex
Compa Mode
Mode Mode
rison
bandwid
th
commun
ication
th of the
channels
commun
or
entire ication
divides
bandwidt channel
the
h of the is
dth entire
communi utilized
bandwid
cation in only
th
channel. one
channel
direction
into two
at a time.
parts for
data
transmis
sion.
Commun
ication
between Telepho
Exampl a Walkie- ne
e computer talkie conversa
and a tion
keyboard
.
Network devices
1.Repeater
15
A repeater is an electronic device that works at the physical layer of the OSI
model to amplify a received signal. It receives a signal and retransmits it at a
higher level or higher power. As a result, the signal covers longer distances,
sometimes more than 100 meters for standard LAN cables.
Repeaters are useful for anyone working in a large facility where the Wi-Fi
might be spotty in the outer reaches of the space. Large office buildings,
warehouses, laboratories and campuses are all locations that can benefit from
repeaters.
2.Hub
Types of Hub
Active Hub:- These are the hubs that have their power supply and can
clean, boost, and relay the signal along with the network. It serves both
as a repeater as well as a wiring center. These are used to extend the
maximum distance between nodes.
Passive Hub:- These are the hubs that collect wiring from nodes and
power supply from the active hub. These hubs relay signals onto the
network without cleaning and boosting them and can’t be used to
extend the distance between nodes.
Intelligent Hub:- It works like an active hub and includes remote
management capabilities. They also provide flexible data rates to
network devices. It also enables an administrator to monitor the traffic
passing through the hub and to configure each port in the hub.
3.Bridge
A bridge operates at the data link layer. A bridge is a repeater, with add on the
functionality of filtering content by reading the MAC addresses of the source
and destination. It is also used for interconnecting two LANs working on the
same protocol. It has a single input and single output port, thus making it a 2
port device.
Types of Bridges
16
Transparent Bridges:- These are the bridge in which the stations are
completely unaware of the bridge’s existence i.e. whether or not a
bridge is added or deleted from the network, reconfiguration of the
stations is unnecessary. These bridges make use of two processes i.e.
bridge forwarding and bridge learning.
Source Routing Bridges:- In these bridges, routing operation is
performed by the source station and the frame specifies which route to
follow. The host can discover the frame by sending a special frame
called the discovery frame, which spreads through the entire network
using all possible paths to the destination.
4.Routers
A router is a device like a switch that routes data packets based on their IP
addresses. The router is mainly a Network Layer device. Routers normally
connect LANs and WANs and have a dynamically updating routing table based
on which they make decisions on routing the data packets. The router divides
the broadcast domains of hosts connected through it
17
another is called a signal. Two basic types of signals are used for carrying data,
viz. analog signal and digital signal.
Analog and digital signals are different from each other in many aspects. One
major difference between the two signals is that an analog signal is a
continuous function of time, whereas a digital signal is a discrete function of
time.
This article explains all the significant differences between analog and digital
signals along with a brief description of analog signal and digital signal.
Analog Signal
A signal which is a continuous function of time and used to carry the
information is known as an analog signal. An analog signal represents a
quantity analogous to another, for example, in case of an analog audio signal,
the instantaneous value of signal voltage represents the pressure of the sound
wave.
Analog signals utilize the properties of medium to convey the information. All
the natural signals are the examples of analog signals. However, the analog
signals are more susceptible to the electronic noise and distortion which can
degrade the quality of the signal.
Digital Signal
A signal that is discrete function of time, i.e. which is not a continuous signal,
is known as a digital signal. The digital signals are represented in the binary
form and consist of different values of voltage at discrete instants of time.
Basically, a digital signal represents the data and information as a sequence of
separate values at any given time. The digital signal can only take on one of a
finite number of values.
Difference between Analog and Digital Signal
18
Parameter Analog Signal Digital Signal
19
Parameter Analog Signal Digital Signal
The analog signals are used The digital signals are used
in land line phones, in computers, keyboards,
Applicatio thermometer, electric fan, digital watches,
ns volume knob of a radio, etc. smartphones, etc.
20
Ques 4. Define network topologyalso discuss its types with the
help of proper diagrams. Also mention two merits and demerits of
each topology.
Topology is derived from two Greek words topo and logy, where topo means
'place' and logy means 'study'. In computer networks, a topology is used to
explain how a network is physically connected and the logical flow of
information in the network. A topology mainly describes how devices are
connected and interact with each other using communication links.
In computer networks, there are mainly two types of topologies, they are:
Physical Topology: A physical topology describes the way in which the
computers or nodes are connected with each other in a computer network. It is
the arrangement of various elements(link, nodes, etc.), including the device
location and code installation of a computer network. In other words, we can
say that it is the physical layout of nodes, workstations, and cables in the
network.
Logical Topology: A logical topology describes the way, data flow from one
computer to another. It is bound to a network protocol and defines how data is
moved throughout the network and which path it takes. In other words, it is the
way in which the devices communicate internally.
Network topology defines the layout, virtual shape, or structure of the network,
not only physically but also logically. A network can have one physical
topology and multiple logical topologies at the same time.
In a computer network, there are mainly six types of physical topology, they
are:
Bus Topology
Ring Topology
Star Topology
Mesh Topology
Tree Topology
Hybrid Topology
Bus Topology
Bus topology is the simplest kind of topology in which a common bus or
channel is used for communication in the network. The bus is connected to
21
various taps and droplines. Taps are the connectors, while droplines are the
cables connecting the bus with the computer. In other words, there is only a
single transmission line for all nodes.
When a sender sends a message, all other computers can hear it, but only the
receiver accepts it(verifying the mac address attached with the data frame) and
others reject it. Bus technology is mainly suited for small networks like LAN,
etc.
In this topology, the bus acts as the backbone of the network, which joins
every computer and peripherals in the network. Both ends of the shared
channel have line terminators. The data is sent only in one direction and as
soon as it reaches the end, the terminator removes the data from the
communication line(to prevent signal bounce and data flow disruption).
Advantages
22
2. If the bus fails, the network will fail.
3. A limited number of nodes can connect to the bus due to limited bus
length.
Ring Topology
Ring topology is a topology in which each computer is connected to
exactly two other computers to form the ring. The message passing is
unidirectional and circular in nature.
In a ring topology, if a token is free then the node can capture the token and
attach the data and destination address to the token, and then leaves the token
for communication. When this token reaches the destination node, the data is
removed by the receiver and the token is made free to carry the next data.
Advantages
1. Easy Installation.
2. Less Cabling Required.
3. Reduces chances of data collision(unidirectional).
23
4. Easy to troubleshoot(the faulty node does not pass the token).
5. Each node gets the same access time.
Disadvantages
Star Topology
Star topology is a computer network topology in which all the nodes are
connected to a centralized hub. The hub or switch acts as a middleware
between the nodes. Any node requesting for service or providing service, first
contact the hub for communication.
The central device(hub or switch) has point to point communicationlink(the
dedicated link between the devices which can not be accessed by some other
computer) with the devices. The central device then broadcast or unicast the
message based on the central device used. The hub broadcasts the message,
while the switch unicasts the messages by maintaining a switch table.
Broadcasting increases unnecessary data traffic in the network.
In a star topology, hub and switch act as a server, and the other connected
devices act as clients. Only one input-output port and one cable are required to
24
connect a node to the central device. This topology is better in terms of
security because the data does not pass through every node.
Advantages
1. Centralized control.
2. Less Expensive.
3. Easy to troubleshoot(the faulty node does not give response).
4. Good fault tolerance due to centralized control on nodes.
5. Easy to scale(nodes can be added or removed to the network easily).
6. If a node fails, it will not affect other nodes.
7. Easy to reconfigure and upgrade(configured using a central device).
Disadvantages
Mesh Topology
Mesh topology is a computer network topology in which nodes are
interconnected with each other. In other words, direct
communicationtakesplace between the nodes in the network.
25
There are mainly two types of Mesh:
1. Full Mesh: In which each node is connected to every other node in the
network.
2. Partial Mesh: In which, some nodes are not connected to every node in
the network.
In a fully connected mesh topology, each device has a point to point link with
every other device in the network. If there are 'n' devices in the network, then
each device has exactly '(n-1)' input-output ports and communication links.
These links are simplex links, i.e., the data moves only in one direction. A
duplex link(in which data can travel in both the directions simultaneously) can
replace two simplex links.
If we are using simplex links, then the number of communication links will
be 'n(n-1)' for 'n' devices, while it is 'n(n-1)/2' if we are using duplex links in
the mesh topology.
Advantages
Disadvantages
26
Tree Topology
Tree topology is a computer network topology in which all the nodes are
directly or indirectly connected to the main bus cable. Tree topology is a
In a tree topology, the whole network is divided into segments, which can be
easily managed and maintained. There is a main hub and all the other sub-hubs
are connected to each other in this topology.
Advantages
Disadvantages
27
Hybrid Topology
A Hybrid topology is a computer topology which is a combination of two
or more topologies. In practical use, they are the most widely used.
28
OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
Each layer is self-contained, so that task assigned to each layer can be
performed independently.
Characteristics
The OSI model is divided into two layers: upper layers and lower layers.
The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer is
closest to the end user. Both the end user and the application layer interact with
the software applications. An upper layer refers to the layer just above another
layer.
The lower layer of the OSI model deals with the data transport issues. The data
link layer and the physical layer are implemented in hardware and software. The
physical layer is the lowest layer of the OSI model and is closest to the physical
29
medium. The physical layer is mainly responsible for placing the information on
the physical medium.
7 layers
Physical Layer
Data-Link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Physical layer
30
It establishes, maintains and deactivates the physical connection.
It specifies the mechanical, electrical and procedural network interface
specifications.
Data-Link Layer
32
o Here, hierarchical means that each upper-layer protocol is supported by
two or more lower-level protocols.
CHARACTERISTICS
o Support for a flexible TCP/IP architecture
o Adding more system to a network is easy.
o In TCP IP protocols suite, the network remains intact until the source, and
destination machines were functioning properly.
o TCP is a connection-oriented protocol.
o TCP offers reliability and ensures that data which arrives out of sequence
should put back into order.
o TCP allows you to implement flow control, so sender never overpowers a
receiver with data.
Layers
Network Access Layer
A network layer is the lowest layer of the TCP/IP model.
A network layer is the combination of the Physical layer and Data Link layer
defined in the OSI reference model.
It defines how the data should be sent physically through the network.
This layer is mainly responsible for the transmission of the data between two
devices on the same network.
The functions carried out by this layer are encapsulating the IP datagram into
frames transmitted by the network and mapping of IP addresses into physical
addresses.
The protocols used by this layer are ethernet, token ring, FDDI, X.25, frame
relay.
Internet Layer
An internet layer is the second layer of the TCP/IP model.
An internet layer is also known as the network layer.
The main responsibility of the internet layer is to send the packets from any
network, and they arrive at the destination irrespective of the route they take.
Transport Layer
33
The transport layer is responsible for the reliability, flow control, and correction
of data which is being sent over the network.
The two protocols used in the transport layer are User Datagram protocol and
Transmission control protocol.
Application Layer
An application layer is the topmost layer in the TCP/IP model.
It is responsible for handling high-level protocols, issues of representation.
This layer allows the user to interact with the application.
When one application layer protocol wants to communicate with another
application layer, it forwards its data to the transport layer.
There is an ambiguity occurs in the application layer. Every application cannot
be placed inside the application layer except those who interact with the
communication system. For example: text editor cannot be considered in
application layer while web browser using HTTP protocol to interact with the
network where HTTP protocol is an application layer protocol.
Differences between OSI and TCP/IP models
34
OSI Model TCP/IP model
36
PRACTICAL-3
QUES 7 What is flow control in computer networks? Discuss its types with
suitable diagram.
In data communications, flow control is the process of managing the rate of
data transmission between two nodes to prevent a fast sender from
overwhelming a slow receiver. Flow control should be distinguished
from congestion control, which is used for controlling the flow of data when
congestion has actually occurred. Flow control mechanisms can be classified by
whether or not the receiving node sends feedback to the sending node.
Flow control is important because it is possible for a sending computer to
transmit information at a faster rate than the destination computer can receive
and process it. This can happen if the receiving computers have a heavy traffic
load in comparison to the sending computer, or if the receiving computer has
less processing power than the sending computer.
1.Stop-and-wait
Stop-and-wait flow control is the simplest form of flow control. In this method
the message is broken into multiple frames, and the receiver indicates its
readiness to receive a frame of data. The sender waits for a receipt
acknowledgement (ACK) after every frame for a specified time (called a time
out). The receiver sends the ACK to let the sender know that the frame of data
was received correctly. The sender will then send the next frame only after the
ACK.
Operations
37
Stop and wait can also create inefficiencies when sending longer
transmissions.When longer transmissions are sent there is more likely chance
for error in this protocol. If the messages are short the errors are more likely to
be detected early. More inefficiency is created when single messages are broken
into separate frames because it makes the transmission longer.
2.Sliding window
A method of flow control in which a receiver gives a transmitter permission to
transmit data until a window is full. When the window is full, the transmitter
must stop transmitting until the receiver advertises a larger window.[5]
Sliding-window flow control is best utilized when the buffer size is limited and
pre-established. During a typical communication between a sender and a
receiver the receiver allocates buffer space for n frames (n is the buffer size in
frames). The sender can send and the receiver can accept n frames without
having to wait for an acknowledgement. A sequence number is assigned to
frames in order to help keep track of those frames which did receive an
acknowledgement. The receiver acknowledges a frame by sending an
acknowledgement that includes the sequence number of the next frame
expected. This acknowledgement announces that the receiver is ready to receive
n frames, beginning with the number specified. Both the sender and receiver
maintain what is called a window. The size of the window is less than or equal
to the buffer size.
Sliding window flow control has far better performance than stop-and-wait flow
control. For example, in a wireless environment if data rates are low and noise
level is very high, waiting for an acknowledgement for every packet that is
transferred is not very feasible. Therefore, transferring data as a bulk would
yield a better performance in terms of higher throughput.
Sliding window flow control is a point to point protocol assuming that no other
entity tries to communicate until the current data transfer is complete. The
window maintained by the sender indicates which frames it can send. The
sender sends all the frames in the window and waits for an acknowledgement
(as opposed to acknowledging after every frame). The sender then shifts the
window to the corresponding sequence number, thus indicating that frames
within the window starting from the current sequence number can be sent.
3.SOFTWARE FLOW CONTROL
Conversely, XON/XOFF is usually referred to as software flow control.
4.CLOSED LOOP FLOW CONTROL
38
The closed-loop flow control mechanism is characterized by the ability of the network to
report pending network congestion back to the transmitter. This information is then used by
the transmitter in various ways to adapt its activity to existing network conditions. Closed-
loop flow control is used by ABR (see traffic contract and congestion control).[1] Transmit
flow control described above is a form of closed-loop flow control.
QUES 8 What is cryptography? Discuss its various types and also explain the process of
cryptography with diagram.
39
but is commonly only used on at-rest data, as sending the secret to the recipient
of the message can lead to compromise.
Examples:
AES
DES
Caesar Cipher
Public Key Cryptography, or asymmetric cryptography, uses two keys to encrypt data. One is
used for encryption, while the other key can decrypts the message. Unlike symmetric
cryptography, if one key is used to encrypt, that same key cannot decrypt the message,
rather the other key shall be used.
One key is kept private, and is called the “private key”, while the other is shared
publicly and can be used by anyone, hence it is known as the “public key”. The
mathematical relation of the keys is such that the private key cannot be derived
from the public key, but the public key can be derived from the private. The
private key should not be distributed and should remain with the owner only.
The public key can be given to any other entity.
Examples:
ECC
Diffie-Hellman
DSS
PROCESS
40
Plaintext: You start with your regular message, which is called "plaintext." This is the information you
want to protect.
Encryption: You use a mathematical algorithm and a secret key to transform the plaintext into a
scrambled and unreadable form called "ciphertext." This step is like putting your message in a locked
box.
Transmission: You send or store the ciphertext securely, knowing that even if it's intercepted, it's
nearly impossible for anyone without the right key to understand it.
Decryption: When the intended recipient receives the ciphertext, they use the same secret key to
reverse the process. They turn the ciphertext back into the original plaintext, making it readable
again.
Ques 9 Define internet. Explain the application of internet and also discuss the merits
and demerits of internet.
The Internet is a technology that is considered to be a global system of interconnected computer networks. The
Internet protocol suite (TCP/IP) enables communication among devices and networks. One can connect with
anyone worldwide and access any information through the internet
Application
1. World Wide Web: A global collection of documents, applications, and other resources interlinked
through hyperlinks and referenced with URLs. The main access protocol of WWW is HTTP. Through
HTTP, communication between software systems for information transfer, sharing, and exchanging
business data is possible. Currently, Web 1.0, Web 2.0, and Web 3.0 are the three versions of WWW.
2. Connectivity: There are several ways of communicating through the internet with anyone worldwide.
To connect with anyone worldwide, users can connect through email, social media, and video
conferencing applications.
3. Data transfer: One of the most important applications of the internet is Data transfer. You can share
unlimited data with anyone worldwide through the internet. File sharing is a way to share data across
the internet.
41
just by sitting at home. High-class faculties are teaching online on
digital platforms and providing quality education to students with the
help of the Internet.
Connectivity − As we know we are connected to the internet to stay connected with our
family, friends, colleagues, services, etc.
Information − We can search and get many search results for our questions and the
information can increase knowledge.
Online Payment − Using payment modes such as Paytm, GPay, and Bhim UPI are many
payment methods to pay online.
Digital Marketing − We are making our websites and making business online.
Net Banking Services − Banking services such as payment, debit, credit, changing our
details, and scheduling payment are an integral part of secure payment.
Productive Collaboration − As we experienced, after the Covid pandemic, we have
worked from home and made things work better than ever before by connecting through
video conferencing and saving mobility.
DISADVANTAGES
42
Wastage of time − Considering today’s lifestyle, one prominent advantage of the Internet
is addiction. People are getting addicted to the internet, watching videos and reels without
realizing they are wasting so much of their time.
Cybercrime − It is increasing rapidly as more information is shared and getting leaked.
Accessibility of pornographic content − It is accessible to even children since there is
complex information shared every day and it is hard to figure out the source of these
images and videos. This is a big concern regarding children and their minds, parental
security is necessary on mobile phones being used by children.
Identity theft − It is one major concern on a bigger level such as higher organizations,
government, and private sectors.
Increase in cyber attacks in the banking sector and corporate sector − Information is
getting leaked, shared, and misused for harm, theft, privacy violation, and harassment.
Fake Information or Misleading − People nowadays can easily manipulate any
information and reclaim it to be true this could mislead people and their reliability
towards information shared.
QUES 10. What is a search engine? Discuss its working, process and components along
with suitable diagram.
Google, Yahoo!, Bing, YouTube, and DuckDuckGo are some popular examples of
search engines.
COMPONENTS
1. Web Crawler
Web Crawler is also known as a search engine bot, web robot, or web spider. It
plays an essential role in search engine optimization (SEO) strategy. It is mainly a
software component that traverses on the web, then downloads and collects all the
information over the Internet.
There are the following web crawler features that can affect the search results -
o Included Pages
o Excluded Pages
43
o Document Types
o Frequency of Crawling
2. Database
The search engine database is a type of Non-relational database. It is the place
where all the web information is stored. It has a large number of web resources.
Some most popular search engine databases are Amazon Elastic Search
Service and Splunk.
There are the following two database variable features that can affect the search
results:
3. Search Interfaces
Search Interface is one of the most important components of Search Engine. It is an
interface between the user and the database. It basically helps users to search for
queries using the database.
There are the following features Search Interfaces that affect the search results -
o Operators
o Phrase Searching
o Truncation
4. Ranking Algorithms
The ranking algorithm is used by Google to rank web pages according to the Google
search algorithm.
There are the following ranking features that affect the search results -
WORKINGS
44
There are the following tasks done by every search engines -
1. Crawling
Crawling is the first stage in which a search engine uses web crawlers to find, visit,
and download the web pages on the WWW (World Wide Web). Crawling is
performed by software robots, known as "spiders" or "crawlers." These robots are
used to review the website content.
2. Indexing
Indexing is an online library of websites, which is used to sort, store, and organize the
content that we found during the crawling. Once a page is indexed, it appears as a
result of the most valuable and most relevant query.
PROCESS
1. Indexing process
Indexing is the process of building a structure that enables searching.
i. Text acquisition
Index creation takes the output from text transformation and creates the indexes or
data searches that enable fast searching.
45
2. Query process
The query is the process of producing the list of documents based on a user's search
query.
i. User interaction
User interaction provides an interface between the users who search the content and
the search engine.
ii. Ranking
The ranking is the core component of the search engine. It takes query data from the
user interaction and generates a ranked list of data based on the retrieval model.
iii. Evaluation
Evaluation is used to measure and monitor the effectiveness and efficiency. The
evaluation result helps us to improve the ranking of the search engine.
46
Practical-4
QUES 11 Write short note on:-
(a)Uniform resource labour:- A URL (Uniform Resource Locator) is a unique
identifier used to locate a resource on the Internet. It is also referred to as a web
address. URLs consist of multiple parts -- including a protocol and domain
name -- that tell a web browser how and where to retrieve a resource.
End users use URLs by typing them directly into the address bar of a browser or
by clicking a hyperlink found on a webpage, bookmark list, in an email or from
another application.
(b) Dial up internet:- Dial-up Internet access is a form of Internet access that
uses the facilities of the public switched telephone network (PSTN) to establish
a connection to an Internet service provider (ISP) by dialing a telephone number
on a conventional telephone line.
(d) Domain name system:- A Domain Name System (DNS) turns domain
names into IP addresses, which allow browsers to get to websites and other
internet resources. Every device on the internet has an IP address, which other
devices can use to locate the device. Instead of memorizing a long list of IP
addresses, people can simply enter the name of the website, and the DNS gets
the IP address for them.
47
(e) firewalls:-A Firewall is a network security device that monitors and filters
incoming and outgoing network traffic based on an organization’s previously
established security policies. At its most basic, a firewall is essentially the
barrier that sits between a private internal network and the public Internet. A
firewall’s main purpose is to allow non-threatening traffic in and to keep
dangerous traffic out.
(f) world wide web:-The World Wide Web is basically a system that allows us
to access and share information through the internet. It's made up of websites,
which are like digital pages that contain text, images, videos, and other cool
stuff. You can think of it as a huge web of interconnected pages, where you can
click on links to navigate from one page to another. So when you use a web
browser, like Chrome or Safari, you're able to explore this vast network of
information and connect with people from all over the world.
(g) audio on internet:- Audio on the internet refers to any sound or music that
is transmitted or streamed over the internet. It includes things like music
streaming services, podcasts, online radio, and even voice and video calls. It's a
way to listen to or communicate with others using sound through internet-
connected devices.
(h) internet service provider:- An Internet Service Provider (ISP) is a
company that provides you with access to the internet. They connect your
devices to the internet through various technologies like DSL, cable, or fiber
optic. ISPs offer different plans with varying speeds and data limits. They play a
crucial role in ensuring you have a reliable and fast internet connection.
QUES 12 Discuss the following in detail
(a)Hypertext transfer protocol:- Hypertext Transfer Protocol (HTTP) is the
foundation of any data exchange on the web. It's an application layer protocol
that facilitates the transfer of hypertext, typically in the form of HTML
documents. HTTP operates over a client-server model, where a client (like a
web browser) requests resources, and a server responds with the requested
data.
The communication is stateless, meaning each request from a client to a server
is independent and not reliant on previous requests. HTTP functions through a
set of methods, such as GET for retrieving data, POST for submitting data to be
processed, and others.
HTTP operates on top of a reliable transport layer protocol, usually
Transmission Control Protocol (TCP). It uses Uniform Resource Identifiers
48
(URIs) to identify resources and is often seen in URLs. The protocol has
evolved over time, with HTTP/1.1 being widely used and the more recent
HTTP/2 introducing improvements in performance.
Security considerations led to the development of HTTPS (HTTP Secure), an
extension of HTTP that uses encryption protocols like TLS to provide a secure
communication channel. This is crucial for protecting sensitive data during
transit, such as login credentials or financial information.
In summary, HTTP is the backbone of communication on the World Wide Web,
enabling the seamless exchange of hypertext and other resources between
clients and servers.
(b)user datagram protocol:- User Datagram Protocol (UDP) is another
transport protocol like TCP (Transmission Control Protocol) that operates on
the Internet Protocol (IP) layer. UDP is a simple, connectionless protocol that
provides a way to send datagrams (packets) over an IP network.
Unlike TCP, UDP does not establish a connection before sending data. It is a
"fire and forget" protocol, meaning that it sends packets without any guarantee
of delivery or order. This makes UDP faster and more efficient for certain types
of applications where speed is prioritized over reliability.
UDP is often used for real-time applications like video streaming, online
gaming, and VoIP (Voice over IP) services. These applications can tolerate
some packet loss or delay, and the speed of UDP makes them more responsive.
However, since UDP does not have built-in error checking or flow control
mechanisms like TCP, it is the responsibility of the application layer to handle
these aspects. This means that the application using UDP needs to implement its
own error detection and recovery mechanisms if necessary.
In summary, UDP is a lightweight and fast protocol that is suitable for
applications where speed is crucial and some loss or delay can be tolerated. It's
a valuable tool for real-time communication and streaming applications on the
internet.
(c) file transfer protocol:-File Transfer Protocol (FTP)! FTP is a standard
network protocol used for transferring files between a client and a server on a
computer network. It provides a simple and reliable way to upload and
download files.
With FTP, you can connect to a remote server, browse its directory structure,
and transfer files back and forth. You can upload files from your local computer
to the server or download files from the server to your computer.
49
FTP operates on the client-server model, where the client initiates the
connection and sends commands to the server. The server responds to these
commands and performs the requested actions, such as listing directories or
transferring files.
FTP supports two modes of data transfer: active and passive. In active mode,
the client opens a port for data transfer, while in passive mode, the server opens
a port. The choice of mode depends on the network configuration and firewall
settings.
While FTP is widely used, it has some security concerns. The data transferred
through FTP is not encrypted, which means that usernames, passwords, and
files can be intercepted. To address this, secure alternatives like FTPS (FTP
over SSL/TLS) and SFTP (SSH File Transfer Protocol) have been developed.
Overall, FTP is a versatile protocol for file transfer, but it's important to
consider security measures when using it.
(d) simple mail transfer protocol:- Simple Mail Transfer Protocol (SMTP)
SMTP is the standard protocol used for sending and receiving emails over the
internet.
SMTP works on a client-server model, similar to FTP. When you send an email,
your email client acts as the client and connects to the server responsible for
handling outgoing mail. The client then communicates with the server using
SMTP commands to send the email.
SMTP is responsible for the reliable delivery of emails. It ensures that the email
is properly formatted, addresses are valid, and the message is transmitted to the
recipient's mail server. The recipient's mail server then uses SMTP to deliver the
email to the recipient's inbox.
SMTP operates on port 25, but there are also secure alternatives like SMTPS
(SMTP over SSL/TLS) that use encryption to protect the email's content during
transmission.
It's important to note that SMTP is used for sending emails and not for
retrieving them. To retrieve emails, you would typically use protocols like
POP3 or IMAP.
Overall, SMTP is a crucial protocol for email communication, allowing us to
send messages across the internet reliably.
(e) Transmission Control Protocol:-TCP, or Transmission Control Protocol, is
a fundamental protocol in computer networking. It provides a reliable and
50
ordered delivery of data between devices connected over the internet. Imagine
TCP as a trustworthy courier service that ensures your messages reach their
destination intact.
When two devices want to communicate, TCP establishes a connection through
a three-way handshake. It's like a virtual introduction, where both devices agree
to start exchanging data. Once the connection is established, TCP breaks the
data into smaller packets and sends them across the network.
TCP is responsible for making sure these packets arrive in the correct order and
without errors. It uses sequence numbers and acknowledgments to keep track of
the packets. If a packet gets lost or damaged during transmission, TCP will
request retransmission to ensure data integrity.
TCP also incorporates flow control mechanisms to prevent overwhelming the
receiver with too much data. It adjusts the transmission rate based on the
receiver's capacity, ensuring a smooth and efficient data transfer.
Furthermore, TCP includes congestion control mechanisms to prevent network
congestion. It monitors the network's condition and adjusts the transmission rate
accordingly, preventing data loss and maintaining network stability.
Overall, TCP plays a crucial role in reliable data transmission over the internet.
It guarantees the integrity, order, and efficient delivery of data packets, making
it an essential protocol for various applications and services we use every day.
(f) internet protocol:-Internet Protocol (IP) IP is the foundation of
communication on the internet. It's like the language that devices use to
communicate with each other.
IP assigns a unique address to each device connected to a network, called an IP
address. This allows devices to send and receive data packets across the
internet. IP addresses come in two versions: IPv4 and IPv6. IPv4 addresses are
made up of four sets of numbers, while IPv6 addresses are longer and more
complex.
IP also defines how data packets are routed from the source device to the
destination device. When you send a request to a website, for example, the data
packets containing your request are broken down into smaller pieces and travel
through various routers on the internet until they reach the destination.
IP is a connectionless protocol, which means that each data packet is treated
independently and can take different routes to reach its destination. This makes
IP flexible and efficient for transmitting data across networks.
51
In addition to IP, there are other protocols like TCP (Transmission Control
Protocol) that work together with IP to ensure reliable and ordered delivery of
data packets.
Overall, IP is the backbone of the internet, enabling devices to communicate
and exchange data globally.
QUES 13 Define newsgroup. how do you read newsgroups. Discuss how
our news groups different from mailing list?
It is an Internet based discussion around an individual entity, organisation or
our topic.
It enables remotely connected users to share, discuss and learn about their topic
of interest and by exchanging text messages, images, videos and other form of
digital content.
Users can subscribe for free by submitting an e-mail address and the group
generally consist of several topics all categories based around us particular
theme.
10 key points to read newsgroups:
1. Find a newsreader application or web-based platform that suits your needs.
2. Create an account or sign in to access newsgroups.
3. Browse through different categories or topics to find newsgroups of interest.
4. Subscribe to the newsgroups you want to follow regularly.
5. Read through the posts and discussions to stay updated on the latest
information.
6. Use search features to find specific topics or keywords within newsgroups.
7. Engage in discussions by replying to posts or starting your own threads.
8. Be respectful and follow the rules and guidelines of the newsgroup
community.
9. Take advantage of the knowledge and expertise shared by other participants.
10. Stay active and contribute regularly to build connections and expand your
network.
Newsgroups and mailing lists are different in several ways:
52
1. Access: Newsgroups are accessed through newsreader applications or web-
based platforms, while mailing lists involve subscribing to an email-based
discussion group.
2. Organization: Newsgroups are organized into categories or topics called
newsgroups, whereas mailing lists consist of centralized email addresses where
messages are distributed to subscribers.
3. Message Storage: Newsgroup posts are stored on servers and can be accessed
even after they were originally posted. On the other hand, mailing list messages
are not centrally stored and are only visible to subscribers.
4. Communication Style: Newsgroups allow for asynchronous communication,
as participants can read and respond to posts at different times. Mailing lists, on
the other hand, involve synchronous communication, as messages are sent and
received in real-time.
5. Visibility: Newsgroup posts can be read by anyone who has access to the
newsgroup, while mailing list messages are only visible to subscribers of the
mailing list.
6. Moderation: Newsgroups may have moderation and filtering options
depending on the platform, while mailing lists often have moderators who
oversee discussions and enforce rules.
7. Threaded Discussions: Newsgroups enable participants to engage in threaded
discussions by replying to specific posts, while replies to mailing list messages
are typically sent to the entire mailing list.
8. Popularity: Newsgroups were more common in the early days of the internet
but are less prevalent today. Mailing lists, on the other hand, remain widely
used in various communities and organizations.
Ques 14 What do you understand by the term intranet. Differentiate
between internet and intranet in a tabular form. Also discuss its
architecture in detail.
53
hold office. In contrast, a company may also set up an extranet, a private
network for exchanging information securely through the Internet with a select
group of clients, suppliers, and customers
54
Intranet architecture refers to the structure and components that make up an
organization's private internal network. It is designed to facilitate
communication, collaboration, and information sharing among employees
within the organization.
2. Servers: Intranets typically have multiple servers that host different services
and applications. These servers can include web servers, file servers, email
servers, and database servers.
3. Client Devices: These are the devices used by employees to access the
intranet, such as desktop computers, laptops, tablets, or smartphones.
4. Intranet Portal: The intranet portal serves as the main entry point for
employees to access information and resources. It provides a centralized hub for
news, announcements, employee directories, and other important company
information.
55
and instant messaging platforms. These tools facilitate teamwork and improve
productivity within the organization.
8. Integration with Other Systems: Intranets may need to integrate with other
internal systems such as HR systems, CRM systems, or enterprise resource
planning (ERP) systems. This integration allows for seamless data sharing and
improved efficiency.
56
Keyloggers log the keystrokes of infected devices. Generally created to steal
login credentials and personal information, they usually spread via email
attachments or downloadable files on malicious websites.
2. Trojans
Trojans take their name from the "Trojan Horse" which enabled ancient Greek
soldiers to conquer Troy while the residents slept.
Trojan agents are engineered to appear legitimate, just like the horse. Trojan
victims download apps as usual. When opened, infected apps automatically seed
malware, leading to various worrying consequences.
3. Ransomware
Ransomware holds users to ransom, freezing devices or apps and demanding a
specific action before restoring system functionality. The ransom tends to
involve payment in standard currency or crypto-currency.
4. Adware
Adware forces victims to see pop-up ads whether they want to or not. Relatively
harmless compared to other threats, Adware can still be a considerable drain on
system resources and a sign that systems are insecure.
5. Spyware
Unlike ransomware, spyware leaves few traces. It keeps a low profile, hiding
from anti-malware scanners while gathering potentially useful information.
6. Logic bombs
Logic bombs trigger at a specific time or when a target has been met. This target
could be something completely arbitrary such as sending 500 emails. Or it could
be targeted at business operations.
When the trigger point arrives, the logic bomb "explodes". The result could be
the release of a worm or virus, with unpredictable consequences
57
7. Viruses
Viruses are similar to malware, but with one difference: they are created
specifically to propagate and spread as widely as possible.
Viruses are the most common form of digital threat and can spread in numerous
ways. Infected emails, messaging services, website downloads, and even
infected USB sticks are all potential vectors.
8. Worms
Worms are similar to computer viruses but do not require a host file to replicate
themselves. They can often infiltrate devices without being detected, and when
worms infest networks, they are difficult to remove.
Worms generally also spread more quickly than viruses. For instance, they may
be designed to exploit a specific security vulnerability in a Windows release. In
that case, the worm could replicate automatically from system to system if that
vulnerability is present.
9. Botnets
Botnets are groups of devices infected with malicious agents. These devices are
linked together, allowing attackers to control them remotely. Affected devices
may not show any noticeable changes. But when used in tandem, thousands of
bots can cause havoc on internal networks and the wider internet.
Botnets are closely associated with IoT devices that are often poorly configured,
leaving them wide open for attackers.
58
11. SQL injection attacks
Network security strategies also need to take into account physical threats. For
instance, attackers could employ "shoulder-surfing" techniques, looking over
the shoulder of employees in public wifi locations to glean valuable
information.
There have also been examples of tailgating, where attackers gain access to
offices and server hubs by following credentialed staff through security gates.
Dumpster diving to obtain personal information is even a possibility.
A network security policy is a set of rules and guidelines that help protect your
network from unauthorized access and potential threats. It outlines the measures
and procedures that need to be followed to ensure the security of your network
and data. It's like a playbook that helps keep your network safe and secure.
Measures
59
Be sure the server is physically securefrom theft and damage.Servers are
usually kept in locked room all cabinets after all people should even need
access to the server itself.
To keeping the server in a physically secure area, you may want to keep it
on a separate network with restricted access to enhance the server’s
security.
Take advantage of RAID and choose the level that makes most sense for
your operations.
Today Internet are the central part of any organisation stop cannot do anything
without linking through it. The Internet is now too important.
1. General communication
60
ii) improved supplier communication and coordination
2. Enhanced quality
2.Productivity
3. Effectiveness
i) improved coordination
i) empowerment of feedback
4. Cost reduction
i) easy to use
ii) immediate
6. Company benefits
62
1. Server: This is where all the intranet content and files are stored. It can be a
physical server or a cloud-based server.
4. Software: You'll need intranet software that allows you to create and manage
the content, as well as provide features like document sharing, communication
tools, and collaboration capabilities.
These are just some of the key technical requirements, but the specific needs
may vary depending on the size and requirements of your company.
6. `<li>` - List item tag used within `<ul>` or `<ol>` to define individual list
items.
63
7. `<div>` - Division tag used to group and style sections of a webpage.
8. `<span>` - Inline tag used to apply styles or manipulate specific parts of text.
9. `<table>` - Table tag for creating structured data in rows and columns.
10. `<form>` - Form tag for creating interactive input fields and submitting data.
These are just a few examples, but there are many more HTML tags to explore!
64