0% found this document useful (0 votes)
117 views117 pages

Netwoking

This document discusses different types of computer networks. It begins by defining key networking concepts like gateways, backbones, and protocols. It then covers specific protocols like SMTP, FTP, HTTP, VoIP, and TCP/IP. TCP/IP is described as the main internet protocol with TCP handling packetization and reassembly and IP handling addressing. The document categorizes networks based on geographical area into LAN, WAN, PAN, and MAN. It provides details on each including advantages and disadvantages. Wired networks using twisted pair cables, coaxial cables, and optical fibers are also outlined.

Uploaded by

jahanvi trivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
117 views117 pages

Netwoking

This document discusses different types of computer networks. It begins by defining key networking concepts like gateways, backbones, and protocols. It then covers specific protocols like SMTP, FTP, HTTP, VoIP, and TCP/IP. TCP/IP is described as the main internet protocol with TCP handling packetization and reassembly and IP handling addressing. The document categorizes networks based on geographical area into LAN, WAN, PAN, and MAN. It provides details on each including advantages and disadvantages. Wired networks using twisted pair cables, coaxial cables, and optical fibers are also outlined.

Uploaded by

jahanvi trivedi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 117

EVOLUTION OF NETWORKING

INTERNET WORKING
INTERNET WORKING
• GATEWAY is a device to connect dissimilar
networks.

• BACKBONE is a central networking structure


that connects one or more networks

• PROTOCOL means set of rules.


SOME PROTOCOLS
• SMTP – Simple Mail Transfer Protocol
• FTP – File Transfer Protocol
• HTTP – Hypertext Transfer Protocol
• VOIP – Voice Over Internet Protocol
• TELNET – Telecommunication Protocol
• TCP/IP – Transmission Control
Protocol/Intenet Protocol
TCP/IP
Transmission Control Protocol / Internet Protocol
TCP/IP is the communication protocol used by Internet.
TCP – The TCP(Transmission Control Protocol) part is
responsible for dividing the file/message into packets on the
source computer. It is also responsible for reassembling the
received packets at the destination or recipient computer.
IP – The IP (Internet Protocol) part is responsible for
handing the address of destination computer so that each
packet is routed (using appropriate Routing Algorithms) to its
destination computer.
TYPES OF NETWORK Types of
network On basis
On basis of Geographical Area of
Geographical Area

• LAN – Local Area Network


• WAN – Wide Area Network
• PAN – Personal Area Network
• MAN – Metropolitan Area
Network
LAN(Local Area Network)
A Local Area Network (LAN) is a group of
computer and peripheral devices which are
connected in a limited area such as school,
laboratory, home, and office building. It is a
widely useful network for sharing resources
like files, printers, games, and other
application. The simplest type of LANnetwork
is to connect computers and a printer in
someone'shomeor office. Ingeneral, LANwill
be used asone type of transmission medium.
It is a network which consists of less than
5000 interconnected devices across several
buildings.
Advantages of LAN
•Computer resources like hard-disks, DVD-ROM,and printers can share
local area networks. This significantly reduces the cost of hardware
purchases.

•You can use the same software over the network instead of purchasing the
licensed
software for each client in the network.

•Data of all network users can be stored on a single hard disk of the server
computer.

•You can easily transfer data and messages over networked computers.

•It will be easy to manage data at only one place, which makes data more
secure.

•Local Area Network offers the facility to share a single internet connection
among all the LANusers.
Disadvantages of LAN
•LAN will indeed save cost because of shared computer
resources, but the initial
cost of installing Local Area Networks is quite high.

•The LAN admin can check personal data files of every LAN
user, so it does not offer good privacy.

•Unauthorized users can access critical data of an


organization in case LAN admin
is not able to secure centralized data repository.

•Local Area Network requires a constant LAN administration


as there are issues related to software setup and hardware
failures
PAN(Personal Area Network)
PAN is a computer network
formed around a person. It
generally consists of a computer,
mobile, or personal digital
assistant. PAN can be used for
establishing communication
among these personal devices
for connecting to a digital network
and the internet.
Advantages of PAN

Here, are important pros/benefits of using PAN network:

PAN networks are relatively secure and safe

It offers only short-range solution up to ten meters

Strictly restricted to a small area


Disavantages
of PAN
Here are important cons/ drawback of using PAN network:

 It may establish a bad connection to other networks at the same radio


bands.

 Distance limits.
MAN(Metropolitan Area Network)

A Metropolitan Area Network or


MAN is consisting of a computer
network across an entire city,
college campus, or a small
region. This type of network is
large than a LAN, which is mostly
limited to a single building or site.
Depending upon the type of
configuration, this type of network
allows you to cover an area from
several miles to tens of miles.
Advantages of MAN
Here are pros/benefits of using MAN system:
It offers fast communication using high-speed carriers, like
fiber optic cables.

It provides excellent support for an extensive size network and


greater access to WANs.

A MAN network mostly includes some areas of a city or an


entire city.
Disavantages of MAN
Here are drawbacks/ cons of using the MAN network:

You need more cable to establish MAN connection from one


place to another.

In MAN network it is tough to make the system secure from


hackers
WAN(Wide Area
Network)
WAN (Wide Area Network) is
another important computer
network that which is spread
across a large geographical area.
WAN network system could be a
connection of a LAN which
connects with other LAN's using
telephone lines and radio waves.
It is mostly limited to an enterprise
or an organization.
Advantages of WAN
Here are the benefits/ pros of using WAN:

WAN helps you to cover a larger geographical area. Therefore


business offices situated at longer distances can easily
communicate.

Contains devices like mobile phones, laptop, tablet,


computers, gaming consoles, etc.
Disavantages of WAN
Here are drawbacks/ cons of using the WAN network:
 The initial setup cost of investment is very high.
 It is difficult to maintain the WAN network. You need skilled technicians
and network administrators.
 There are more errors and issues because of the wide coverage and
the use of different technologies.
 It requires more time to resolve issues because of the involvement of
multiple wired and wireless technologies.
 Offers lower security compared to other types of networks.
Types of components by Network
Architecture

CLIENT
SERVER/DEDICATED
SERVER
The Client-Server network
model is widely used
network model.
Here, Server is a powerful
system that stores the data or
information in it. On the other
hands, the Client is the
machine which let the users
access the data on the remote
server.
Peer to Peer Architecture
PEER TO PEER/
NON-DEDICATED
SERVERS
Unlike Client-Server, the
Peer-to-Peer model does
not distinguish between
client and server instead
each node can either be a
client or a server
depending on the whether
the node is requesting or
providing the services.
Each node is considered as
a peer.
NETWORK BASED ON
COMMMUNICATION CHANNELS

1.Wired Networks
(Guided Media)
2.Wireless Networks
(Unguided Media)
WIRED COMPUTER NETWORK
Wired computer networks are mostly LANs. In
wired network, computers are connected to each
other through wires or cables.
Most commonly used cables in wired networks are
• Twisted Pair Cables
• Co-axial cables
• Optical Fibres
TWISTED PAIR CABLE

•These cables consist of two insulated copper wires twisted


around each other in a double helix.
Twisting of wires reduces crosstalk which is bleeding of a
signal from one wire to another.

TYPES
• Unshielded Twisted Pair (UTP)
• Shielded Twisted Pair (STP)
STP offers greater protection from interference and crosstalk due to
shielding,But it is heavier and costlier than UTP.

USE
1. In local telephone communication
2. For digital data transmission over short distances upto 1 km
ADVANTAGES AND DISADVANTAGES OF
TWISTED PAIR CABLE
Advantages:
•Easy to install and maintain
•Simple and physically flexible
•Very inexpensive
•Low weight
•Suitable for small (Local) networks
Disadvantages:
•Not suitable for long distance due to high attenuation.
•Low bandwidth support.
(unsuitable for broadband applications)
•Low Speed
Data rate is 1 Mbps without conditioning and 10 Mbps
with conditioning.
COAXIAL CABLE

 Coaxial cable consists of a solid copper wire core surrounded by a


plastic cladding shielded in a wire mesh.
 Shield prevents the noise by redirecting it to ground.

TYPES
Coaxial cable comes in two sizes which are called thinnet and
thicknet.
 Thicknet : segment length upto 500 m
 Thinnet : segment length upto 185 m
USE:
In TV channel communication (CATV)
ADVANTAGES AND DISADVANTAGES OF
COAXIAL CABLE

Advantages:
 Data transmission characteristics are better than
twisted wire cable.
 Popular for TV networks(basis for a shared cable
network)
 Offers higher bandwidth upto 400 MBPS & higher
speed
Disadvantages:
 Expensive than twisted wires.
 Not compatible with twisted wire cable.
OPTICAL FIBRES

 Thin strands of glass or glass like material designed to carry


light from one source to another.
 Source converts (Modulates) the data signal into light using
LED (Light Emitting Diodes) or LASER diodes and send it
over the Optical fiber.
It consists of three parts:
1. The core: glass or plastic through which the
light travels.
2. The cladding : covers the core and reflects light back to the core
3. Protective coating : protects the fiber cable
ADVANTAGES AND DISADVANTAGES OF
FIBRE OPTIC CABLE
Advantages
 Immune to electrical and magnetic interference
Not affected by any kind of noise.
 High transmission capacity
 Speed of Light
 Suitable for broadband communication

Disadvantages
 Installation requires care.
 Connecting two Optical fibers is difficult.
 Optical fibers are more difficult to solder
 Most expensive
FACTOR TWISTED CO-AXIAL OPTICAL FIBER
PAIR CABLE CABLE
Cost Low Moderate High
Higher than
Low Highest
Noise immunity twisted pair
Low Moderate Very high
Data rate
Low Moderate Very high
Bandwidth
High Low Very low
Attenuation
Available Reduced due to Not present
Electromagnet shield
Interference
Easy Fairly easy Difficult
Installation
2 30 to 100 2
Node capacity per
segment
Short circuit Possible Possible Not possible
between the
two conductor
Light
Weight Heavy Light
WIRELESS NETWORKS/ UNGUIDED MEDIA
Wireless Networks – It uses high-frequency radio waves rather
than wires to communicate. Wireless allows for devices to be
shared without networking cable which increases mobility but
decreases range.

Most commonly used WIRELESS media are


• MICROWAVES
• RADIOWAVES
• SATELLITE TRANSMISSION
• INFRARED
• BLUETOOTH
• WIFI
MICROWAVE TRANSMISSION
Microwaves travel in straight lines and
cannot penetrate any solid object.
Therefore for long distance microwave
communication, high towers are built and
microwave antennas are put on their top.
The higher the tower, the greater the
range.

In the big cities where land is very costly


and a lot of formalities have to be
completed to get permission to dig land
for cabling, microwave antennas can be
put on top of high rise buildings and
communication can be started in a short
time.
ADVANTAGES AND DISADVANTAGES OF
MICROWAVE
ADVANTAGES
•Free from land acquisition rights.
•Ability to communicate over long distances.
•Offers ease of communication over difficult terrain.

DISADVANTAGES
• Insecure communication.
• The transmission is in straight lines so the transmitting and
receiving antennas need to be properly aligned ( line of sight
transmission).
• Signals are susceptible to weather effects.
• Cost of design, implementation and maintenance is quite high.
RADIOWAVE
TRANSMISSION

Radio communication uses radio frequencies in the range of 3KHz to


3GHz. Radio waves are omnidirectional(all round propagation) and
may cover entire city and can penetrate through buildings.

Cordless phones, Radios are the best examples of Radio Commucation.


ADVANTAGES AND DISADVANTAGES OF
RADIOWAVE
ADVANTAGES
•Relatively inexpensive than wired media.
•It offers ease of communication over difficult terrain.
•These waves are omni-directional, so the transmitting and receiving
antennas need not be aligned.
•It covers a large span of area and offers mobility.
•It can penetrate solid walls/buildings easily.

DISADVANTAGES
•Permission from concerned authorities is required for use of radio
wave transmission.
•Less secure mode of transmission.
•Signals are susceptible to weather effects.
SATELLITE
TRANSMISSION

Geostationary satellites are placed around 36000 KM away from the


earth’s surface. In satellite communication, transmitting station
transmits the signals to the satellite (UP-LINKING). After receiving
the signals (microwaves) it amplifies them and transmit back to earth
in whole visibility area.
Receiving stations at different places can receive these signals
(DOWN- LINKING).
ADVANTAGES AND DISADVANTAGES OF
SATELLITE
ADVANTAGES
•Satellites cover large area of earth and particularly used for sparsely
populated areas.
•Since communication over very long distances is possible and the
usage of intercontinental traffic makes it a commercially attractive
option.

DISADVANTAGES
•This system is highly expensive (high investment and insurance with
significant probability of failure).
•Requires legal permissions.
•High atmospheric losses.
INFRARED

These waves are used for short range communication (approx.


5m) in a variety of wireless communications, monitoring, and
control applications. Home-entertainment remote- control devices,
Cordless mouse, and Intrusion detectors are some of the devices
that utilize infrared communication.
ADVANTAGES AND DISADVANTAGES OF
INFRARED
ADVANTAGES
•It is a line of sight transmission; therefore information passed to one
device is not leaked to another device.
•No government license is required for its use.

DISADVANTAGES

•It is a line of sight transmission, therefore at a time only two devices


can communicate.
•The waves do not cross any solid object in between.
•Performance drops with longer distances.
SWITCHING TECHNIQUES
(How the data is transmitted )
1. CIRCUIT SWITCHING - Complete physical connection (circuit) is
established between source computer and destination computer
before the transmission takes place. Eg - Telephone System

2. MESSAGE SWITCHING - Source computer sends data (OF ANY


SIZE) all in one jump to switching office which then looks for free
link to send it to another switching office. It is known also known as
store and forward technique. It was a precursor to Packet switching
and hard disk was used to store data.

3. PACKET SWITCHING - Data is divided into fixed size packets and


transmitted on to subnet. They reach destination computer
following different paths. Main memory is used to store packets
resulting in improved performance of network. Eg - Internet
Circuit Switching

Packet Switching
3 KHz = 3000 Hz
3 GHz = 3 X 109
NETWORK TOPOLOGY
The arrangement of a network which comprises of nodes and connecting lines via
sender and receiver is referred as network topology. The various network topologies
are :

 Bus Topology
 Star Topology
 Ring Topology
 Tree Topology
 Mesh Topology
 Hybrid Topology
BUS TOPOLOGY

Alternatively referred to as a
line topology, a bus topology
is a network setup where each
computer and network device is
connected to a single cable
or backbone.
ADVANTAGES AND DISADVANTAGES OF
BUS TOPOLOGY
Advantages
•It works well when you have a small network.
•It's the easiest network topology for connecting
computers in linear fashion.
•It requires less cable length.
Disadvantages

•It can be difficult to identify the problems if the whole network


goes down.
•Bus topology is not great for large networks.
•Terminators are required for both ends of the main cable.
•Additional devices slow the network down.
•If a main cable is damaged, the network fails or splits into two.
STAR TOPOLOGY
Alternatively referred to as a star network,
star topology is one of the most common
network setups. In this configuration,
every node connects to a
central network device, like a hub, switch,
or computer. The central network device
acts as a server and the peripheral devices
act as clients. Depending on the type of
network card used in each computer of the
star topology, a coaxial cable or an RJ-
45 network cable is used to connect
computers together. The image shows
how this network setup gets its name, as
it is shaped like a star.
ADVANTAGES AND DISADVANTAGES OF
STAR TOPOLOGY
Advantages
•Centralized management of the network, through the use of central
computer, hub or switch.
• Easy to add another computer to the network.
• If one computer on the network fails, the rest of the network continues to
function normally.
• Fault detection is easy.

Disadvantages
•May have a higher cost to implement, especially when using a switch or
router as the
central network device.
•The central network device determines the performance and number of
nodes the network can handle.
•If the central computer, hub, or switch fails, the entire network goes down and
all computers are disconnected from the network.
RING TOPOLOGY
Ring topology is a network configuration
in which device connections create a
circular data path. Each networked device is
connected to two others, like points on a
circle. Together, devices in a ring topology
are referred to as a ring network.
In a ring network, packets of data travel
from one device to the next until they reach
their destination. Most ring topologies allow
packets to travel only in one direction,
called a unidirectional ring network.
Others permit data to move in either
direction, called bidirectional.
ADVANTAGES AND DISADVANTAGES OF
RING TOPOLOGY
Advantages
•All data flows in one direction, reducing the chance of packet collisions.
•A network server is not needed to control network connectivity between
each workstation.
•Data can transfer between workstations at high speeds.
•Additional workstations can be added without impacting performance of the
network.

Disadvantages
•All data being transferred over the network must pass through each
workstation on the network, which can make it slower than a star topology.
•The entire network will be impacted if one workstation shuts down.
•The hardware needed to connect each workstation to the network is more
expensive than Ethernet cards and hubs/switches.
TREE TOPOLOGY
A tree topology is a special type of
structure in which many connected
elements are arranged like the
branches of a tree. For example, tree
topologies are frequently used to
organize the computers in a
corporate network, or the information
in a database.
In a tree topology, there can be only
one connection between any two
connected nodes. Because any two
nodes can have only one mutual
connection, tree topologies create a
natural parent and child hierarchy.
ADVANTAGES AND DISADVANTAGES OF
TREE TOPOLOGY
Advantages
•Scalable as leaf nodes can accommodate more nodes in the hierarchical
chain.
•A point to point wiring to the central hub at each intermediate node of a tree
topology represents a node in the bus topology
•Other hierarchical networks are not affected if one of them gets damaged
•Easier maintenance and fault finding

Disadvantages
•Huge cabling is needed
•A lot of maintenance is needed.
•Backbone forms the point of failure.
MESH TOPOLOGY
A network setup where each
computer and network device
is interconnected with one
another, allowing for most
transmissions to be distributed
even if one of the connections
go down. It is a topology
commonly used for peer to
peer networks.
ADVANTAGES AND DISADVANTAGES OF
MESH TOPOLOGY
Advantages
•Manages high amounts of traffic, because multiple devices can transmit data
simultaneously.
•A failure of one device does not cause a break in the network or transmission
of data.
•Adding additional devices does not disrupt data transmission between other
devices.
Disadvantages
•The cost to implement is higher than other network topologies, making it a
less desirable option.
•Building and maintaining the topology is difficult and time consuming.
•The chance of redundant connections is high, which adds to the high costs
and potential for reduced efficiency.
HYBRID TOPOLOGY

A hybrid topology is a type of


network topology that uses two
or more differing network
topologies. These topologies
can include a mix of bus
topology, mesh topology, ring
topology, star topology, and
tree topology.
ADVANTAGES AND DISADVANTAGES OF
HYBRID TOPOLOGY

Advantages
1.Hybrid network combines the benefits of different types of
topologies
2.Can be modified as per requirement
3.It is extremely flexible.
4.It is very reliable.
5.It is easily scalable

Disadvantages
1.It is expensive
2.The design of a hybrid network is complex.
3.Hardware changes are required in order to connect one topology to
another topology.`
NETWORK DEVICES
Computer hardware devices which are used to connect computers, printers, or any
other electronic device to a computer network are called network devices. These
devices transfer data in a fast, secure and correct way with some specific
functionality over same or different networks. Some devices are installed on the
device, like Internal modem, NIC card or RJ45 connector, whereas some are part of
the network, like router, switch, etc.
NETWORK INTERFACE CARD
NIC
This is at top among other networking devices
and mostly used networking device. This is also
known as network adapter card, Ethernet Card
and LAN card. It allows our PC to
communicate with other PCs. A PC uses
parallel data transmission to transmit data
between its internal parts where as the media
that connects this PC with other device/PCs
uses serial data transmission. A NIC converts
parallel data stream into serial data stream and
vice versa.
NETWORK INTERFACE CARD
NIC – Usually all modern PCs have inbuilt NICs in
motherboard. NICs are also available separately in adapter
format which can be plugged into the available slots of
motherboard. For laptop or other small size devices they
available in PCMCIA (Personal Computer Memory Card
International Association) card format which can be inserted in
PCMCIA slots. Types of NICs
•Media Specific :- Different types of NICs are available for
establishing connection with different types of media. For e.g.
we cannot connect wireless media with wired NIC card or vice
versa. similarly we can’t connect coaxial cable with Ethernet
LAN card. So we have to use specific NIC, which is best
suited for particular media .
MAC Addresses are unique 48-bits(6 bytes) hardware number of a computer, which is
embedded into network card (known as Network Interface Card) during the time of
manufacturing. MAC Address is also known as Physical Address of a network device.
WI-FI CARD
Wi-Fi cards are small and portable cards that allow your
computer to connect to the internet through a wireless
network. Wi-Fi transmission is through the radio waves,
these signals are picked up by Wi-Fi receivers such as
computers and cell phones equipped with Wi-Fi cards.
The devices need to be within the range of a Wi-Fi
network to receive the signals and produces a wireless
internet connection. Once a connection is established
between user and the network, the user is prompted with a
login screen and password for establishing is a secure
connection. Wi-Fi cards can be external or internal. If a
Wi-Fi card is not installed inside your computer, you may
purchase an external USB antenna attachment and
connect it to your device. Many computers and mobile
devices are now a days equipped with wireless
networking capability and do not require a Wi-Fi card.
HUB
A hub is the most basic
networking device that
connects multiple computers or
other network devices together.
Unlike a network switch or
router, a network hub has no
routing tables or intelligence on
where to send information and
broadcasts all network data
across each connection.
1. ACTIVE HUB
2. PASSIVE HUB
SWITCH

A network switch also connects computers to


each other, like a hub. Where the switch differs
from a hub is in the way it handles packets of
data. When a switch receives a packet of data,
it determines what computer or device the
packet is intended for and sends it to that
computer only. It does not broadcast the
packet to all computers as a hub does
which means bandwidth is not shared
and makes the network much more
efficient. For this reason alone, switches are
usually preferred over a hub.
RJ-45 or REGISTERED JACK-45

RJ45 is a type of connector commonly


used for Ethernet networking. It looks
similar to a telephone jack, but is slightly
wider. Since Ethernet cables have an RJ45
connector on each end, Ethernet cables
are sometimes also called RJ45 cables.
The "RJ" in RJ45 stands for "registered
jack," since it is a standardized networking
interface. The "45" simply refers to the
number of the interface standard. Each
RJ45 connector has eight pins, which
means an RJ45 cable contains eight
separate wires.
BRIDGE

A network bridge connects multiple


network segments using same
protocol. Bridges do not
promiscuously copy traffic to all ports,
as hubs do, but learn which MAC
addresses are reachable through
specific ports. Once the bridge
associates a port and an address, it will
send traffic for that address only to
that port. Bridges do send broadcasts
to all ports except the one on which
the broadcast was received.
.
ROUTER

Router is a network device used to


establish connection between two
similar networks, but with
different protocols. They can
connect networks with different
architectures such as Token Ring
and Ethernet. It uses IP address to
communicate.
GATEWAY

Gateway is a device, which is


used to connect dissimilar
networks and perform the
necessary translation so that the
connected networks can
communicate properly. A gateway
can translate information
between different network data
formats and network
architectures. It can translate
TCP/IP to AppleTalk so computers
supporting TCP/IP can
communicate with Apple brand
computers.
Eg. ISP
A wireless access point (WAP) is a
hardware device or configured node on a
local area network (LAN) that allows
wireless capable devices and wired
networks to connect through a wireless
standard, including Wi-Fi or Bluetooth.
WAPs feature radio transmitters and
antennae, which facilitate connectivity
between devices and the Internet or a
network.
A WAP is also known as a hotspot.
80-20 Thumb Rule says that 80 % traffic in a network should
be local

TIPS TO SOLVE NETWORKING PROBLEMS

SERVER : Large no of computers in a


building HUB/SWITCH: Each Building
MODEM: Server Room
REPEATER: If distance is more than 100
metres BEST CABLE
• Twisted Pair/Coaxial when distance is in metres
• Optical fibre for long distance / high speed communication
• Hilly Regions: Radio waves
• State to State or City : Satellite Links
Internet World Wide Web
Estimated year of Origin 1969, though opening of the network 1993
to commercial interests began only
in 1988

Name of the first version ARPANET NSFnet

Comprises Network of Computers, copper wires, Files, folders & documents stored in
fibre- optic cables & wireless networks various computers

Governed by Internet Protocol Hyper Text Transfer Protocol

Dependency This is the base, independent of the It depends on Internet to work


World Wide Web
NETWORK
PROTOCOLS
A protocol is the special set of rules that two or more machines on a network
follow to communicate with each other. Some of the important protocols used are :
1. TCP/IP
2. HTTP
3. FTP
4. TELNET
5. VOIP
6. POP3
7. SMTP
8. PPP
TCP/IP
Transmission Control Protocol / Internet Protocol
TCP/IP is the communication protocol used by Internet.
TCP – The TCP(Transmission Control Protocol) part is
responsible for dividing the file/message into packets on the
source computer. It is also responsible for reassembling the
received packets at the destination or recipient computer.
IP – The IP (Internet Protocol) part is responsible for
handing the address of destination computer so that each
packet is routed (using appropriate Routing Algorithms) to its
destination computer.
WORKING OF TCP/IP
HTTP
HYPERTEXT TRANSFER PROTOCOL
HTTP is the protocol that is used for transferring hypertext (text, graphic,
image, sound, video etc.) between two computers and is particularly used
on the World Wide Web. Communication between the host and the client
occurs through a request/response pair. A connection is established
between two computers - out of which one is client (generally the
browser) that initiates the request and the other is the server that
responds to the request. The server accepts the request and then uses
HTTP to respond to perform the action.

It deals with formatting and displaying the text.


SMTP
SIMPLE MAIL PROTOCOL
Simple Mail Transfer Protocol, a protocol for sending e-mail messages
between servers. Most e-mail systems that send mail over the Internet
use SMTP to send messages from one server to another.

In addition, SMTP is generally used to send messages from a mail client


to a mail server. The messages can then be retrieved with an e-mail
client using either POP (Post Office Protocol) or IMAP (Internet
Message Access Protocol).

MIME (Multi-Purpose Internet Mail Extensions) specifies extensions


to the original SMTP protocol for sending e-mail that supports
graphics, audio and video files, executable files and text in various
national languages.
POP3
POST OFFICE PROTOCOL3
POP3 is a client/server protocol used for opening the remote
e-mail boxes, the POP3 mail server receives e-mails, filters
and holds them into the appropriate user folders. When a user
connects to the mail server to retrieve his mail, the messages
are downloaded from mail server to the user's hard disk.
VOIP
VOICE OVER INTERNET PROTOCOL
VOIP: (Voice over IP, and IP telephony) is a group of technologies
for the delivery of voice communications and multimedia sessions
over Internet. The terms Internet telephony, broadband telephony,
and broadband phone service specifically refer to the provisioning
of communications services (voice, fax, SMS, voice-messaging)
over the public Internet. This method of making phone calls is
much cheaper than conventional way because the service of
Telecommunication Company is not used.
PPP
POINT TO POINT PROTOCOL
In computer networking, Point-to-Point Protocol (PPP) is a
protocol used to establish a direct connection between two
nodes. The Point-to-Point Protocol (PPP) is an encapsulation
protocol for transporting IP traffic across point-to-point links.
PPP is used over many types of physical networks including
serial cable, phone line, trunk line, cellular telephone, radio
links, and fiber optic links etc.
FTP
FILE TRANSFER PROTOCOL
The File Transfer Protocol (FTP) is a standard network protocol used
for the transfer of computer files from a server to a client using the
Client–server model on a computer network. The objectives of FTP
are:
1. To promote sharing of files (computer programs and/or data).
2. To encourage indirect or implicit use of remote computers.
3. To shield a user from variations in file storage systems among
different hosts.
4. To transfer data reliably, and efficiently.
ksh$ /usr/bin/ftp
ftp> open ftp.acmemail.example.com
Connected to ftp.acmemail.example.com (172.16.62.36).
220 Hello, this is the Acme Mail Service.
Name (ftp.acmemail.example.com:root): MB1234
331 Password required to access user account MB1234.
Password: QXJ4Z2AF
230 Logged in.
ftp> cd Bills
250 "/home/MB1234/Bills" is new working directory.
ftp> ls
200 PORT command successful.
150 Opening ASCII mode data connection for /bin/ls.
-rw-r--r-- 1 ftpuser ftpusers 14886 Dec 3 15:22 Acmemail.TXT
-rw-r--r-- 1 ftpuser ftpusers 317000 Dec 4 17:40 Yoyodyne.TXT
226 Listing completed.
ftp> get Yoyodyne.TXT
local: Yoyodyne.TXT remote: Yoyodyne.TXT
200 PORT command successful.
150 Opening ASCII mode data connection for Yoyodyne.TXT.
226 Transfer completed.
317000 bytes received in 0.0262 secs (1.2e+04 Kbytes/sec)
ftp> quit
221 Goodbye.
TELNET PROTOCOL
Remote Access Protocol (Telnet) : This protocol helps a user
(Telnet Client) to log in at a remote computer (Telnet Server)
and function as if he/she were connected directly to that
computer. Telnet is the main internet protocol for creating a
connection with a remote machine. It allows you to connect to
remote computers (called remote hosts) over a TCP/IP
network (such as the Internet). Once your telnet client
establishes a connection to the remote host, your client
becomes a virtual terminal, allowing you to communicate with
the remote host from your computer with whatever privileges
you may have been granted to the specific application and
data on that host computer.
BANDWIDTH AND DATA TRANSFER RATE
DIFFERENCE
Bandwidth Data Rate
It is the potential of the data that is to It is the amount of data transmitted
be transferred in a specific period of during a specified time period over a
time. network.

It is the number of bits per second


It is the speed of data transmission.
that a link can send or receive.

Normally it is measured in bps, Mbps It is normally measured in Mbps or


or Gbps. MBps.

It refers to to maximum data It refers to the actual data


transmission speed. transmission speed.

It is physical layer property in OSI


While it is common in all layers.
model.

It shows the present speed of data


It shows the capacity of the channel.
transmission.

It does not depend on properties of While it gets affected by sender or


sender or receiver. receiver.
Web
services
Web service - is a standardized medium,protocol or
language to propagate communication between the client
and server applications on the World Wide Web. A web
service is a software module that is designed to perform a
certain set of tasks.
Web services are invoked by the user directly or indirectly to
provide services to the program/software which is being
used as a part of WWW.User may be unaware about such
web services.

The web services can be searched for over the network


and canalso be invoked accordingly.

When invoked, the web service would be able to provide


the functionality to the client, which invokes that web
service.
Web
services
Many people think that the internet and the world wide web
(WWW) are the same thing. While they are closely linked,
they are very different systems.
The internet is a huge network of computers all connected
together. The world wide web (‘www’ or ‘web’ for short) is a
collection of webpages found on this network of computers.
Our web browser uses the internet to access the web.
The World Wide Web is a way of exchanging information
between computers on the Internet, tying them together into
a vast collection of interactive multimedia resources.
World Wide Web was created by Timothy Berners Lee in
1989 at CERN in Geneva. World Wide Web came into
existence as a proposal by him, to allow researchers to
work together effectively and efficiently at CERN.
Eventually it became World Wide Web.
Web
services
Web architecture

Web is a two – tiered architecture.


• A web browser display information contents
• Web server that transfers information to the
client
Web
services
HTTP - HTTP stands for hypertext transfer protocol and is used to transfer data
across the Web. It allow users of the World Wide Web to exchange information found
on web pages. When accessing any web page entering http:// in front of the address
tells the browser to communicate over HTTP.
How It Works-
It is a connectionless text based protocol. Clients (web browsers) send requests
through request object of http to web servers for web pages / images etc.Web server
respond accordingly through response object of http After this cycle(request –
response), the connection between client and server across the Internet is
disconnected. A new connection must be made for each request(means for each web
page).

This diagram shows


the working of http
protocol. Working with
dns server and
working with web
Server both.
Web
services
HTML – Hyper text markup language is a document
design language not a programming language. It
provide various kinds of tags(commands) used to
define the structure and appearance of web page.
HTML was created by Sir Tim Berners-Lee in late 1991
but was not released officially, which was published in
1995 as HTML 2.0. HTML5 is the latest evolution of the
standard that defines HTML.
Web
services
Basic structure of HTML document –
<html>
<head>
<title>simple document</title>
</head>
<body>
<p>a simple paragraph</p>
</body>
</html>
Save above content in text editor with .html extension and
open it in web browser to run it(tags).Generally/Most of the
tags are written as part of <body> tag.
Web
services
Extensible Markup Language (XML) is a markup
language that defines a set of rules for encoding
documents in a format that is both human-readable
and machine- readable.
XML is Platform Independent and Language
Independent: The main benefit of xml is that we can
use it to take data from a program like Microsoft
SQL, convert it into XML then share that XML with
other programs and platforms. You can
communicate between two platforms which are
generally very difficult.
Web
services
Structure of XML Document System
A XML Document is intended to display data like HTML.
An XML document system comprises the following-
 Style Sheet (CSS or XSL)
It defines the style (How it would appear i.e. font,
color, size alignment etc.) of the elements.
 Grammar Structure (DTD)
It is optional component in XML document system
and defines the Rules of the document (Tag
definitions).
 XML File
It contains and describes actual data.
Web
How to Prepare XML Document
services
In order to prepare XML Document system, you may
do the following steps-
 Prepare XML document file as per problem
XML document is divided into two part.
1. The Prolog :
Preface or Introduction to the XML document. It
includes An XML declaration, Comments etc.
2. The Data Instance :
It contains actual data.
 Prepare a style-sheet file for XML file
It contains style rules that tells a browser how to
display an XML document.
 Link the XML file with Style sheet
Web
Example to create XML document
services
 Expected View on Browser
Suppose we
want to make an Computer Parts
XML document
Mother Board
which is
displayed in
Asus
browser as
shown here P3B-F
1230.00

TFT Monitor

LG Electronics
995e
8500.00
Web
services
 Preparation of XML (test.xml) document Prolog

<?xml version=“1.0” encoding = UTF-8“ ?>


<?xml-stylesheet type=“text/css” href=“parts.css”?>
<PARTS>
<TITLE> Computer Parts </TITLE>
<PART> Linking of .css
<PARTNAME>Mother Board</PARTNAME> (Style Sheet) file
<MANUFACTURER>Asus</MANUFACTURER>
<MODEL>P3B-F</MODEL>
<COST>1230.00</COST>
Data
</PART>
Instance
<PART>
<PARTNAME>TFT Monitor</PARTNAME>
<MANUFACTURER>LG Electronics</MANUFACTURER>
<MODEL>995e</MODEL>
<COST>8500.00</COST>
</PART>
</PARTS>
Web
services
 Preparation of StyleSheet (part.css) file
PARTS {display:block}
TITLE {display:block; font-fanily:arial; color:#008000;
font-weight:600; font-size:16 margine-top:12pt;
text-align:center}
PART {display:block}
PARTNAME {display:block; font-fanily:arial; color:#008000;
font-weight:400; font-size:14 margine-left:10pt;
margin-top: 10pt}
MANUFACTURER {display:block; font-fanily:arial; color:#600060;
font-weight:400; font-size:14 margine-left:30pt;
margin-top: 10pt}
MODEL {display:block; font-fanily:arial; color:#600060;
font-weight:400; font-size:14 margine-left:30pt;
margin-top: 10pt}
COST {display:block; font-fanily:arial; color:#800000;
font-weight:400; font-size:14 margine-left:30pt;
margin-left: 5pt}
Difference between HTML and
XML
Web
services
BASIS FOR
XML
COMPARISON HTML

Expands to Extensible Markup Language Hypertext Markup Language

Basic Provides a framework for HTML is predefined markup


markup language.
Structural Information Provided Does not contain structural
information
Language type Case sensitive Case insensitive
Purpose of the Transfer of information Presentation of the data
language
Errors Not allowed Small errors can be ignored.

Whitespace Can be preserved. Does not preserve white spaces.

Closing tags Compulsory to use closing tags. Closing tags are optional.
Nesting Must be properly done. Not much valuable.
DIFFERENCE
STATIC WEB PAGES
DYNAMIC WEB PAGES
BASIS FOR COMPARISON STATIC WEB PAGES DYNAMIC WEB PAGES

Basic Static web pages will Dynamic web pages are


remain same for the time behavioral and have the
until and unless someone capacity to produce

COMPARISON CHART
changes it manually. distinctive content for
different visitors.

Complexity Simple to design. Complicated to construct.

Application and web HTML, JavaScript, CSS, CGI, AJAX, ASP, ASP.NET,
languages used to create etc. etc.
web pages

Information change Occurs rarely Frequently

Page loading time Less comparatively More

Use of Database Doesn't use databases A database is used.


GENERATIONS OF MOBILE COMMUNICATIONS
GSM and GPRS

1G – First generation
2G - Second Generation (GSM)
2.5 G – GSM+GPRS
3G – Third Generation
4G – Fourth Generation
5G – Fifth Generation
1G – FIRST GENERATION

1G – First generation (popular in 1980s)


--Analog Cellular networks and designed for
only Voice communications
--Limitations of range and security
--Speed upto 2.4 kbps
--No security
--Poor voice quality
--Large phones with limited battery life.
(Telephone calls)
2G – SECOND GENERATION
GSM (GLOBAL SYSTEM FOR MOBILE COMMUNICATIONS)

2. 2G GSM – Second generation (1990s)


Started as digital circuit switched network
Data speed upto 64 kbps
Better QoS (Quality of service) than 1G
GSM digitizes and compresses voice data and text messaging , then sends it down a
channel with two other streams of user data, each in its own time slot. It used technique
TDMA (Time Division Multiple Access)
Expanded to packet data transport via GPRS(General Packet Radio Service)
GSM+GPRS= 2.5 G
The GSM standard operates on three different carrier frequencies: the 900 MHz band,
which was used by the original GSM system; the 1800 MHz band, which was added to
support the swelling number of subscribers and the 1900 MHz frequency, which is used
mainly in the U.S.
Mobile phones, SMS, MMS, browsing websites, uploading/downloading (incredibly
slow)
3G – THIRD GENERATION
3G – Third generation (early 2000)
Data communication through text, multimedia,
audio/video format
Data speed of 144kbps to 2 Mbps

MMS, surfing internet, download data, 3D gaming, video


conferencing (faster than 2G)

Expensive mobile phones, infrastructure (towers


investment), trained personnel.

Limitation with weak internet connection


4G – FOURTH GENERATION
4G – Fourth generation (2010)
faster speed on internet
download HD videos
Mobile Web Access
Data speed upto 100 Mbps to 1Gbps
IP telephony
Cloud computing
Many different frequencies to handle more users at the same time.
4G LTE (Long term Evolution) to meet industry standards.
The "anytime, anywhere" feature of 4G is also referred to as "MAGIC"
M: Mobile multimedia;
A: Anytime/anywhere;
G: Global mobility support;
I: Integrated wireless solution;
C: Customized personal services).
5G – SECOND GENERATION

5G – Fifth generation
( started but likely to be achieved after 2020)
Watch all programs and download full HD videos
instantly
Complete wireless communication with almost no
limitations.
High speed, high capacity
Work with smart devices like Self-driving cars, Smart
Street lights, multimedia newspapers etc
WIRELESS LOCAL LOOP
PSTN – Public Switched Telephone Network
RPCU – Radio Port Control Unit
HLR – Home Location Register
WANU – Wireless Access Network Unit
WASU – Wireless Access Subscriber Unit
AM – Access Manager

You might also like