Ecom Unit2notes
Ecom Unit2notes
LAN or Local Area Network connects network devices in such a way that
personal computers and workstations can share data, tools, and programs. The
group of computers and devices are connected together by a switch, or stack of
switches, using a private addressing scheme as defined by the TCP/IP
protocol. Private addresses are unique in relation to other computers on the
local network. Routers are found at the boundary of a LAN, connecting them
to the larger WAN.
Data transmits at a very fast rate as the number of computers linked is limited.
By definition, the connections must be high-speed and relatively inexpensive
hardware (Such as hubs, network adapters, and Ethernet cables). LANs cover a
smaller geographical area (Size is limited to a few kilometres) and are
privately owned. One can use it for an office building, home, hospital, school,
etc. LAN is easy to design and maintain. A Communication medium used for
LAN has twisted-pair cables and coaxial cables. It covers a short distance, and
so the error and noise are minimized.
Early LANs had data rates in the 4 to 16 Mbps range. Today, speeds are
normally 100 or 1000 Mbps. Propagation delay is very short in a LAN. The
smallest LAN may only use two computers, while larger LANs can
accommodate thousands of computers. LAN has a range up to 2km. A LAN
typically relies mostly on wired connections for increased speed and security,
but wireless connections can also be part of a LAN. The fault tolerance of a
LAN is more and there is less congestion in this network. For example A
bunch of students playing Counter-Strike in the same room (without internet).
Advantages:
Provides fast data transfer rates and high-speed communication.
Easy to set up and manage.
Can be used to share peripheral devices such as printers and
scanners.
Provides increased security and fault tolerance compared to WANs.
Disadvantages:
Limited geographical coverage.
Limited scalability and may require significant infrastructure
upgrades to accommodate growth.
May experience congestion and network performance issues with
increased usage.
MAN or Metropolitan area Network covers a larger area than that covered by a
LAN and a smaller area as compared to WAN. MAN has a range of 5-50km. It
connects two or more computers that are apart but reside in the same or
different cities. It covers a large geographical area and may serve as an ISP
(Internet Service Provider). MAN is designed for customers who need high-
speed connectivity. Speeds of MAN range in terms of Mbps. It’s hard to
design and maintain a Metropolitan Area Network.
The fault tolerance of a MAN is less and also there is more congestion in the
network. It is costly and may or may not be owned by a single organization.
The data transfer rate and the propagation delay of MAN are moderate.
Devices used for transmission of data through MAN are Modem and
Wire/Cable. Examples of a MAN are part of the telephone company network
that can provide a high-speed DSL line to the customer or the cable TV
network in a city.
Advantages:
Provides high-speed connectivity over a larger geographical area
than LAN.
Can be used as an ISP for multiple customers.
Offers higher data transfer rates than WAN in some cases.
Disadvantages:
Can be expensive to set up and maintain.
May experience congestion and network performance issues with
increased usage.
May have limited fault tolerance and security compared to LANs.
WAN or Wide Area Network is a computer network that extends over a large
geographical area, although it might be confined within the bounds of a state
or country. WAN has a range of above 50 km. A WAN could be a connection
of LAN connecting to other LANs via telephone lines and radio waves and
may be limited to an enterprise (a corporation or an organization) or accessible
to the public. The technology is high-speed and relatively expensive.
There are two types of WAN: Switched WAN and Point-to-Point WAN. WAN
is difficult to design and maintain. Similar to a MAN, the fault tolerance of a
WAN is less and there is more congestion in the network. A Communication
medium used for WAN is PSTN or Satellite Link. Due to long-distance
transmission, the noise and error tend to be more in WAN.
WAN’s data rate is slow about a 10th LAN’s speed since it involves increased
distance and increased number of servers and terminals etc. The speed of
WAN ranges from a few kilobits per second (Kbps) to megabits per second
(Mbps). Propagation delay is one of the biggest problems faced here. Devices
used for the transmission of data through WAN are Optic wires, Microwaves,
and Satellites. An example of a Switched WAN is the asynchronous transfer
mode (ATM) network and Point-to-Point WAN is a dial-up line that connects
a home computer to the Internet.
Advantages:
Covers large geographical areas and can connect remote locations.
Provides connectivity to the internet.
Offers remote access to resources and applications.
Can be used to support multiple users and applications
simultaneously.
Disadvantages:
Can be expensive to set up and maintain.
Offers slower data transfer rates than LAN or MAN.
May experience higher latency and longer propagation delays due to
longer distances and multiple network hops.
May have lower fault tolerance and security compared to LANs.
The Internet
1. The Internet is a public and global communication network that provides
direct connectivity to anyone over a local area network (LAN) or Internet
Service Provider (ISP).
2. The Internet is a public network that is connected and routed over gateways.
End users are connected to local access providers (LANs or ISPs), who are
connected to the Internet access providers, to network access providers, and
eventually to the Internet backbone.
3. Since access to the Internet is open to all, there is a lack of control that may
result in an unruly proliferation of information.
The Intranet:
3. Only authorized employees are able to use it. Intranets are limited to
information pertinent to the company and contain exclusive and often
proprietary and sensitive information. 2
4. The firewalls protect the intranets from unauthorized outside access; the
intranet can be used to enhance the communications and collaboration among
authorized employees, customers, suppliers, and other business partners.
5. Since the intranet allows access through the Internet, it does not require any
additional implementation of leased networks. This open and flexible
connectivity is a major capability and advantage of intranet. Intranets provide
the infrastructure for many intrabusiness commerce applications.
The Extranet
9. To increase security, many companies replicate the database they are willing
to share with their business partners and separate them physically from their
regular intranets.
The Open Systems Interconnection (OSI) model describes seven layers that
computer systems use to communicate over a network. It was the first standard
model for network communications, adopted by all major computer and
telecommunication companies in the early 1980s
The modern Internet is not based on OSI, but on the simpler TCP/IP model.
However, the OSI 7-layer model is still widely used, as it helps visualize and
communicate how networks operate, and helps isolate and troubleshoot
networking problems.
We’ll describe OSI layers “top down” from the application layer that directly
serves the end user, down to the physical layer.
7. Application Layer
The application layer is used by end-user software such as web browsers and
email clients. It provides protocols that allow software to send and receive
information and present meaningful data to users. A few examples of
application layer protocols are the Hypertext Transfer Protocol (HTTP), File
Transfer Protocol (FTP), Post Office Protocol (POP), Simple Mail Transfer
Protocol (SMTP), and Domain Name System (DNS).
6. Presentation Layer
The presentation layer prepares data for the application layer. It defines how
two devices should encode, encrypt, and compress data so it is received
correctly on the other end. The presentation layer takes any data transmitted by
the application layer and prepares it for transmission over the session layer.
5. Session Layer
4. Transport Layer
The transport layer takes data transferred in the session layer and breaks it into
“segments” on the transmitting end. It is responsible for reassembling the
segments on the receiving end, turning it back into data that can be used by the
session layer. The transport layer carries out flow control, sending data at a rate
that matches the connection speed of the receiving device, and error control,
checking if data was received incorrectly and if not, requesting it again.
3. Network Layer
The network layer has two main functions. One is breaking up segments into
network packets, and reassembling the packets on the receiving end. The other
is routing packets by discovering the best path across a physical network. The
network layer uses network addresses (typically Internet Protocol addresses) to
route packets to a destination node.
2. Data Link Layer
The data link layer establishes and terminates a connection between two
physically-connected nodes on a network. It breaks up packets into frames and
sends them from source to destination. This layer is composed of two parts—
Logical Link Control (LLC), which identifies network protocols, performs error
checking and synchronizes frames, and Media Access Control (MAC) which
uses MAC addresses to connect devices and define permissions to transmit and
receive data.
1. Physical Layer
The physical layer is responsible for the physical cable or wireless connection
between network nodes. It defines the connector, the electrical cable or wireless
technology connecting the devices, and is responsible for transmission of the
raw data, which is simply a series of 0s and 1s, while taking care of bit rate
control.
Create devices and software that can communicate with products from
any other vendor, allowing open interoperability
Define which parts of the network their products should work with.
Communicate to users at which network layers their product operates –
for example, only at the application layer, or across the stack.
The TCP/IP Reference Model
TCP/IP means Transmission Control Protocol and Internet Protocol. It is the
network model used in the current Internet architecture as well. Protocols are
set of rules which govern every possible communication over a network. These
protocols describe the movement of data between the source and destination or
the internet. They also offer simple naming and addressing schemes.
The features that stood out during the research, which led to making the TCP/IP
reference model were:
The network was robust, and connections remained intact untill the
source and destination machines were functioning.
The overall idea was to allow one application on one computer to talk to(send
data packets) another application running on different computer.
Below we have discussed the 4 layers that form the TCP/IP reference model:
The TCP/IP specifications described a lot of applications that were at the top of
the protocol stack. Some of them were TELNET, FTP, SMTP, DNS etc.
1. It operated independently.
2. It is scalable.
3. Client/server architecture.
4. Supports a number of routing protocols.
5. Can be used to establish a connection between two computers.
Demerits of TCP/IP
FTP works by opening two connections that link the computers trying to
communicate with each other. One connection is designated for the commands
and replies that get sent between the two clients, and the other channel handles
the transfer of data. During an FTP transmission, there are four commands used
by the computers, servers, or proxy servers that are communicating. These are
“send,” “get,” “change directory,” and “transfer.”
While transferring files, FTP uses three different modes: block, stream, and
compressed. The stream mode enables FTP to manage information in a string of
data without any boundaries between them. The block mode separates the data
into blocks, and in the compress mode, FTP uses an algorithm called the
Lempel-Ziv to compress the data.
One of the main reasons why modern businesses and individuals need FTP is its
ability to perform large file size transfers. When sending a relatively small file,
like a Word document, most methods will do, but with FTP, you can send
hundreds of gigabytes at once and still get a smooth transmission.
The ability to send larger amounts of data, in turn, improves workflow. Because
FTP allows you to send multiple files at once, you can select several and then
send them all at the same time. Without FTP services, you may have to send
them one by one, when you could be accomplishing other work.
Features of HTTP:
o Connectionless protocol: HTTP is a connectionless protocol. HTTP
client initiates a request and waits for a response from the server. When
the server receives the request, the server processes the request and sends
back the response to the HTTP client after which the client disconnects
the connection. The connection between client and server exist only
during the current request and response time only.
o Media independent: HTTP protocol is a media independent as data can
be sent as long as both the client and server know how to handle the data
content. It is required for both the client and server to specify the content
type in MIME-type header.
o Stateless: HTTP is a stateless protocol as both the client and server know
each other only during the current request. Due to this nature of the
protocol, both the client and server do not retain the information between
various requests of the web pages.
Small websites store all of their WebPages on a single server, but big websites
or organizations place their WebPages on different servers in different countries
so that when users of a country search their site they could get the information
quickly from the nearest server.
So, the web provides a communication platform for users to retrieve and
exchange information over the internet. Unlike a book, where we move from
one page to another in a sequence, on World Wide Web we follow a web of
hypertext links to visit a web page and from that web page to move to other web
pages. You need a browser, which is installed on your computer, to access the
Web.
What is an E-mail?
E-mail stands for Electronic Mail or Electronic Mailer. The most commonly
used feature of the networks in the field of communication is e-mail. It is the
transmission of messages from one computer to another. Communication can
take place between two to many users. It not only sends the message in text
format, but also we can add images, and documents in the form of PDFs,
videos, or other attachments.
The person who has to send a certain message is called the sender and the one
who receives it is called the receiver. In order to have successful
communication, each user should have a unique email address (it is just like
posts, where each post is sent to persons with a unique home address). The e-
mail address may look something like this
Mailing Format
The E-mail can be divided into three main components:
Message Envelope
Message Header
Message Body
E-mail Format
Structure of Email
Types of Email
Emails are broadly classified into three categories:
Web Servers
Web pages are a collection of data, including images, text files, hyperlinks,
database files etc., all located on some computer (also known as server space)
on the Internet.
When any user requests their web browser to run any web page, the webserver
places all the data materials together into an organized web page and forwards
them back to the web browser with the help of the Internet.
However, web servers can serve static as well as dynamic contents. Web
Servers also assists in emailing services and storing files.
Therefore it also uses SMTP (Simple Mail Transfer Protocol) and FTP (File
Transfer Protocol) protocols to support the respective services.
Web servers are mainly used in web hosting or hosting the website's data and
running web-based applications.