Sy Bms Sem III It Unit III
Sy Bms Sem III It Unit III
e-mail -
Electronic mail (email, e-mail, eMail or e-Mail) is a method of exchanging messages (“mail”) between
people using electronic devices. Email entered limited use in the 1960s, but users could only send to
users of the same computer, and some early email systems required the author and the recipient to both
be online simultaneously, similar to instant messaging. Ray Tomlinson is credited as the inventor of
email; in 1971, he developed the first system able to send mail between users on different hosts across
the ARPANET, using the @ sign to link the user name with a destination server. By the mid-1970s, this
was the form recognized as email.
Email gives an excellent opportunity to coolly compose your thoughts, couch it in appropriate language
and put it in writing, go through it over and again, fine tuning or revising it before you hit the send button.
You don’t have that kind of advantage in a telephone conversation. Many time you forget what you
planned to say.
Email operates across computer networks, primarily the Internet. Today’s email systems are based on a
store-and-forward model. Email servers accept, forward, deliver, and store messages. Neither the users
nor their computers are required to be online simultaneously; they need to connect, typically to a mail
server or a webmail interface to send or receive messages or download it.
Originally an ASCII text-only communications medium, Internet email was extended by Multipurpose
Internet Mail Extensions (MIME) to carry text in other character sets and multimedia content
attachments. International email, with internationalized email addresses using UTF-8, is standardized
but not widely adopted.
The history of modern Internet email services reaches back to the early ARPANET, with standards for
encoding email messages published as early as 1973 (RFC 561). An email message sent in the early
1970s is similar to a basic email sent today.
Historically, the term electronic mail is any electronic document transmission. For example, several
writers in the early 1970s used the term to refer to fax document transmission. As a result, finding its
first use is difficult with the specific meaning it has today.
The term electronic mail has been in use with its current meaning since at least 1975, and variations of
the shorter E-mail have been in use since at least 1979:
• Email is now the common form, and recommended by style guides. It is the form required by
IETF Requests for Comments (RFC) and working groups. This spelling also appears in most
dictionaries.
• E-mail is the form favored in edited published American English and British English writing as
reflected in the Corpus of Contemporary American English data, but is falling out of favor in
some style guides.
• Email is a traditional form used in RFCs for the “Author’s Address” and is required “for
historical reasons“.
• E-mail is sometimes used, capitalizing the initial E as in similar abbreviations like E-piano, E-
guitar, A-bomb, and H-bomb.
In the original protocol, RFC 524, none of these forms was used. The service is simply referred to as
mail, and a single piece of electronic mail is called a message.
An Internet e-mail consists of an envelope and the content consists of a header and a body.
Message format
The basic Internet message format used for email is defined by RFC 5322, with encoding of non-ASCII
data and multimedia content attachments defined in RFC 2045 through RFC 2049, collectively called
Multipurpose Internet Mail Extensions or MIME. The extensions in International email apply only to
email. RFC 5322 replaced the earlier RFC 2822 in 2008, then RFC 2822 in 2001 replaced RFC 822 –
the standard for Internet email for decades. Published in 1982, RFC 822 was based on the earlier RFC
733 for the ARPANET.
Internet email messages consist of two sections, ‘header’ and ‘body’. These are known as ‘content’. The
header is structured into fields such as From, To, CC, Subject, Date, and other information about the
email. In the process of transporting email messages between systems, SMTP communicates delivery
parameters and information using message header fields. The body contains the message, as unstructured
text, sometimes containing a signature block at the end. The header is separated from the body by a blank
line.
Message header
RFC 5322 specifies the syntax of the email header. Each email message has a header (the “header
section” of the message, according to the specification), comprising a number of fields (“header fields”).
Each field has a name (“field name” or “header field name”), followed by the separator character “:”,
and a value (“field body” or “header field body”).
Each field name begins in the first character of a new line in the header section, and begins with a non-
whitespace printable character. It ends with the separator character “:”. The separator follows the field
value (the “field body”). The value can continue onto subsequent lines if those lines have space or tab
as their first character. Field names and, without SMTPUTF8, field bodies are restricted to 7-bit ASCII
characters. Some non-ASCII values may be represented using MIME encoded words.
Header fields
Email header fields can be multi-line, with each line recommended to be no more than 78 characters,
although the limit is 998 characters. Header fields defined by RFC 5322 contain only US-ASCII
characters; for encoding characters in other sets, a syntax specified in RFC 2047 may be used. In some
examples, the IETF EAI working group defines some standards track extensions, replacing previous
experimental extensions so UTF-8 encoded Unicode characters may be used within the header. In
particular, this allows email addresses to use non-ASCII characters. Such addresses are supported by
Google and Microsoft products, and promoted by some government agents.
The message header must include at least the following fields:
• From: The email address, and, optionally, the name of the author(s). Some email clients are
changeable through account settings.
• Date: The local time and date the message was written. Like the From: field, many email clients
fill this in automatically before sending. The recipient’s client may display the time in the format
and time zone local to them.
RFC 3864 describes registration procedures for message header fields at the IANA; it provides for
permanent and provisional field names, including also fields defined for MIME, netnews, and HTTP,
and referencing relevant RFCs. Common header fields for email include:
• To: The email address(es), and optionally name(s) of the message’s recipient(s). Indicates
primary recipients (multiple allowed), for secondary recipients see Cc: and Bcc: below.
• Subject: A brief summary of the topic of the message. Certain abbreviations are commonly
used in the subject, including “RE:” and “FW:”.
• Cc: Carbon copy; Many email clients mark email in one’s inbox differently depending on
whether they are in the To: or Cc: list.
• Bcc: Blind carbon copy; addresses are usually only specified during SMTP delivery, and not
usually listed in the message header.
• Content-Type: Information about how the message is to be displayed, usually a MIME type.
• Precedence: commonly with values “bulk”, “junk”, or “list”; used to indicate automated
“vacation” or “out of office” responses should not be returned for this mail, e.g. to prevent
vacation notices from sent to all other subscribers of a mailing list. Sendmail uses this field to
affect prioritization of queued email, with “Precedence: special-delivery” messages delivered
sooner. With modern high-bandwidth networks, delivery priority is less of an issue than it was.
Microsoft Exchange respects a fine-grained automatic response suppression mechanism, the X-
Auto-Response-Suppress field.
• Message-ID: Also an automatic-generated field to prevent multiple deliveries and for reference
in In-Reply-To: (see below).
• In-Reply-To: Message-ID of the message this is a reply to. Used to link related messages
together. This field only applies to reply messages.
• References: Message-ID of the message this is a reply to, and the message-id of the message
the previous reply was a reply to, etc.
• Reply-To: Address should be used to reply to the message.
• Sender: Address of the sender acting on behalf of the author listed in the From: field
(secretary, list manager, etc.).
• Archived-At: A direct link to the archived form of an individual email message.
• The To: field may be unrelated to the addresses to which the message is delivered. The delivery
list is supplied separately to the transport protocol, SMTP, which may be extracted from the
header content. The “To:” field is similar to the addressing at the top of a conventional letter
delivered according to the address on the outer envelope. In the same way, the “From:” field may
not be the sender. Some mail servers apply email authentication systems to messages relayed.
Data pertaining to the server’s activity is also part of the header, as defined below.
SMTP defines the trace information of a message saved in the header using the following two fields:
• Received: after an SMTP server accepts a message, it inserts this trace record at the top of the
header (last to first).
• Return-Path: after the delivery SMTP server makes the final delivery of a message, it inserts
this field at the top of the header.
Other fields added on top of the header by the receiving server may be called trace fields.
• Authentication-Results: after a server verifies authentication, it can save the results in this field
for consumption by downstream agents.
By- Mr. Bhanuprasad Vishwakarma Page 3
Importance
Easy to use: E-mail frees us from the tedious task of managing data for daily use. It helps us manage
our contacts, send mails quickly, maintain our mail history, store the required information, etc.
Speed: An e-mail is delivered instantly and anywhere across the globe. No other service matches the e-
mail in terms of speed.
Easy to prioritize: Because e-mails come with a subject line, it is easy to prioritize them and ignore the
unwanted ones.
Reliable and secure: Constant efforts are being taken to improve the security in electronic mails. It
makes e-mail one of the secured ways of communication.
Informal and conversational: The language used in e-mails is generally simple and thus, makes the
process of communication informal. Sending and receiving e-mails takes less time, so it can be used as
a tool for interaction.
Easier for reference: When a person needs to reply to a mail, he/she can use the provision of attaching
previous mails as references. It helps refresh the recipient’s know-how on what he is reading.
Automated e-mails: It is possible to send automated e-mails using special programs like auto
responders. The auto responders reply only to those messages with generalized, prewritten text messages.
Environment friendly: Postal mails use paper as a medium to send letters. Electronic mail therefore,
prevents a large number of trees from getting axed. It also saves the fuel needed for transportation.
Use of graphics: Colourful greeting cards and interesting pictures can be sent through e-mails. This adds
value to the e-mail service. Advertising tool: Nowadays, many individuals and companies are using the
e-mail service to advertise their products, services, etc.
Info at your fingertips: Storing data online means less large, space taking file cabinets, folders and
shelves. You can access information far quicker if you learn how to use email this way.
Leverage: Send the same message to any number of people. Adaptations are simple, too. If you have a
product or service to sell, email is an effective medium to get your message out.
Send reminders to yourself. Do you use more than one account? Email yourself messages from work to
home or vice versa.
Objectives
1. Inform
One of the main objectives of an email marketing campaign is to inform your readers. Showing up in
your customers’ inboxes regularly presents a great opportunity to keep them informed about everything
and anything about your company.
2. Engage
Not only should they be informational, beneficial, and attractive, but you should also be sure that they
engage recipients so they will want to learn more about your business and your brand as a whole. Make
your emails engaging with images, graphics, and even videos to make sure that recipients read the emails
in their entirety and digest all of the information you’ve provided.
3. Attract
Another objective of email marketing is to attract users to your company. You may think that since
current customers have already committed to your company, that there’s no need to attract them
anymore. The truth is, current customers have the choice to stop buying products or services from your
brand whenever they choose, and email marketing is a great way to ensure that you consistently win
them over.
Use of Outlook:
1. Outlook and Microsoft Exchange Play Well Together
If your e-mail server runs Microsoft Exchange, Outlook is a no-brainer. They go together like bacon and
eggs, toast and coffee, peaches and cream.
Users need to know absolutely nothing to connect. They just fire up Outlook, enter their e-mail address,
and it and Exchange commune. Transparently. That cuts down on IT involvement in client configuration
and allows users to switch computers easily.
2. Outlook Plays Well With Active Directory.
Active Directory’s authentication extends to Exchange. That means that a user can simply log on to a
computer, start Outlook, and her Active Directory credentials are passed to the Exchange server-no
typing or separate logon required.
By- Mr. Bhanuprasad Vishwakarma Page 5
In fact, since the e-mail address is stored in Active Directory, a user need not even enter that information
if authenticating through AD. Outlook automatically figures out the right e-mail address (and, yes, you
can bypass that functionality if you need to), log you in and you’re good to go.
3. Outlook Integrates with Many Devices and Applications
If you’re possessed by any sort of PDA or smartphone, there’s a way to synch it with Outlook. Some
vendors don’t even provide a native personal information manager for their devices, but rely on the fact
that most customers have a copy of Outlook that does the trick very nicely.
Even third party add-on applications for devices like BlackBerry or various Windows Mobile models
manage to talk to Outlook. Skype talks to Outlook. ACT! talks to Outlook. In fact, it’s hard to find a
desktop tool that doesn’t talk to Outlook. And you can find dozens of little add-ins that extend Outlook
even farther-check out Office Addins.com for example.
4. Outlook Makes it Easy to Organize Your Assets
Most e-mail clients offer some sort of rules for sorting and managing e-mail, but Outlook 2007 (in
conjunction with Exchange 2007) really raises the bar. Sure, you can sort messages into folders, or
forward or redirect them according to selected criteria. However, you also have the option to send
different automatic Out of Office (OOO) messages to internal and external addresses. For example, users
who subscribe to mailing lists may not want to send messages to addresses outside their company at all
(mailing list admins frown on OOO messages, which act like spam to the list), but need to give internal
senders information on who’s covering for them.
If you need to follow up on a message, Outlook offers flags of various colors that can be tied to reminders
if you need a friendly nag. A shortcut folder called “Follow Up” gathers links to all flagged messages to
make them simple to locate. And if you want to be sure the boss’s messages leap out at you, with a
couple of clicks you can make them show up in the color of your choice in your in-box listing. My boss’s
mail, for example, is red, and his counterpart with whom I also deal is an unsubtle lime green. There’s
no missing either of their tomes in the clutter!
5. Outlook Plays Nicely With SharePoint
Microsoft’s SharePoint is a collaborative platform offering tools for building and managing websites,
intranets and workspaces. But Microsoft realizes that many users have neither the time nor the mental
bandwidth to log on to yet another server to check forum discussions or to examine shared documents.
What to do? Simple-Outlook users can opt to receive notifications of new or changed content by e-mail,
then click through to the SharePoint site. They can also add content to a shared workspace or participate
in forum discussions by e-mail, thanks to integration with Outlook and Exchange.
6. Outlook Expedites Workflow
Outlook’s messaging isn’t limited to mere e-mail. Companies can set up workflows for functions such
as online voting. For example, if a group wants to decide on a location for a festive lunch, the coordinator
can send a message offering several options. Recipients simply click a voting button within the e-mail
message to send their responses.
Using Outlook’s forms feature, things like requests for time off can be automatically routed to approvers,
and the reply returned to the user.
Configuring Outlook -
Outlook is one of the most popular email clients in the world, and has a host of powerful features. In
order to get the most out of Outlook, you’ll want to add your email accounts so that you can find all of
your messages in one place, import your calendar so that you can see upcoming events, and add your
contacts from your various online contacts lists.
1. Understand the difference between POP and IMAP email services
There are two ways that email can be delivered to your email client: POP (Post Office Protocol) and
IMAP (Internet Message Access Protocol). POP is the older method of transferring email messages, and
works by downloading new messages to your client and then deleting them from the server. IMAP was
designed to allow you to check email from multiple devices, as messages and organization are synced
between all of the clients you use.
• There is really no practical reason to use POP if IMAP is available. IMAP is more stable, more
secure, and allows you to check your email from your computer, phone, and laptop without losing
any messages.
• Most email services allow you to use IMAP, though some may charge for it. Gmail, Yahoo!,
Outlook.com (Hotmail), AOL, and most service providers allow for IMAP.
2. Configure your service for IMAP (Gmail)
Most email services allow you to access the IMAP functions without making any changes. The major
exception to this is Gmail, where you will need to manually enable IMAP.
Log into the Gmail website and click the Gear button. Select “Settings’ and then click the “Forwarding
and POP/IMAP” tab. Select “Enable IMAP” and click “Save Changes”.
3. Open Outlook
When you add an IMAP email service, you’ll be able to check, organize, and manage your email in
Outlook and on all of your other devices. Any changes you make in Outlook will be reflected in your
other email clients.
4. Click the “File” tab. In the “Info” section, click the “+ Add Account” button.
5. Select “Manual setup or additional server types”. This will allow you to enter any email account.
Note: If you’re using Gmail or Hotmail (Outlook.com), you can enter your email address and password
in the “E-Mail Account” section of the Add New Account window and skip the rest of this section.
Outlook will take care of the rest of the configuration for you. You can also manually set them up if you
prefer by reading on.
6. Select “POP or IMAP”. This will enable you to enter a web-based email account.
7. Enter your email account information. Enter your name as well as your email address in the top
section. Leave the Server Information blank for now (see next step). In the Logon Information
section, enter your account User Name (usually the same as your email address) as well as the
password you use to access the account.
8. Enter your mail server information
In the Server Information section, enter in the information for your mail service. Select “IMAP” from
the Account Type drop-down menu. Below is information for some of the more popular mail services:
Service Incoming Mail Server Outgoing Mail Server
Gmail imap.gmail.com smtp.gmail.com
Yahoo! imap.mail.yahoo.com smtp.mail.yahoo.com
Hotmail imap-mail.outlook.com smtp-mail.outlook.com
AOL imap.aol.com smtp.aol.com
Comcast imap.comcast.net smtp.comcast.net
Time Warner mail.twc.com mail.twc.com
AT&T imap.mail.att.net smtp.mail.att.net
9. Click the .More Settings… button. Click the Outgoing Server tab.
10. Check the “My outgoing server (SMTP) requires authentication”. Select “Use same settings as
my incoming mail server”. This setting is the same for nearly all email services.
11. Click .Next > after entering all of your account settings. Outlook will begin testing your settings
to ensure that it can connect to the server to send and receive messages.
12. Wait for your messages to sync. once you’ve connected your email account, your messages and
folders will begin syncing with Outlook. Depending on how many messages you have, this may
take a few moments. You can monitor the process from the status bar at the bottom of the
window.
Outlook will only have to do a major sync the first time you connect your account. After this, it will just
sync any changes made from any of your email clients.
14. Browse through your messages. On the left side of the window, you’ll see your email account
with its associated folders listed underneath. You can browse through these folders to see all of
your messages. Any organizational changes you make in Outlook will be reflected in the web
version of your email account, and vice versa.
Intranet -
Intranet is defined as private network of computers within an organization with its own server and
firewall. Moreover we can define Intranet as:
Intranet is system in which multiple PCs are networked to be connected to each other. PCs in intranet
are not available to the world outside of the intranet.
Usually each company or organization has their own Intranet network and members/employees of that
company can access the computers in their intranet.
Every computer in internet is identified by a unique IP address.
Each computer in Intranet is also identified by a IP Address, which is unique among the computers in
that Intranet.
Advantage of Intranet
Intranet is very efficient and reliable network system for any organization. It is beneficial in every aspect
such as collaboration, cost-effectiveness, security, productivity and much more.
(i) Communication
Intranet offers easy and cheap communication within an organization. Employees can communicate
using chat, e-mail or blogs.
(ii) Time Saving
Information on Intranet is shared in real time.
(iii) Collaboration
Information is distributed among the employees as according to requirement and it can be accessed by
the authorized users, resulting in enhanced teamwork.
(iv) Platform Independency
Intranet can connect computers and other devices with different architecture.
(v) Cost Effective
Employees can see the data and other documents using browser rather than printing them and distributing
duplicate copies among the employees, which certainly decreases the cost.
(vi) Workforce Productivity
Data is available at every time and can be accessed using company workstation. This helps the employees
work faster.
(vii) Business Management
It is also possible to deploy applications that support business operations.
(viii) Security
Since information shared on intranet can only be accessed within an organization, therefore there is
almost no chance of being theft.
(ix) Specific Users
Intranet targets only specific users within an organization therefore, once can exactly know whom he is
interacting.
(x) Immediate Updates
Any changes made to information are reflected immediately to all the users.
Issues in Intranet
Apart from several benefits of Intranet, there also exist some issues.. These issues are shown in the
following diagram:
Applications
Intranet applications are same as that of Internet applications. Intranet applications are also accessed
through a web browser. The only difference is that, Intranet applications reside on local server while
Internet applications reside on remote server. Here, we’ve discussed some of these applications:
Extranet -
An extranet is a controlled private network that allows access to partners, vendors and suppliers or an
authorized set of customers normally to a subset of the information accessible from an organization’s
intranet. An extranet is similar to a DMZ in that it provides access to needed services for authorized
parties, without granting access to an organization’s entire network. An extranet is a private network
organization.
Historically the term was occasionally also used in the sense of two organizations sharing their internal
networks over a VPN.
During the late 1990s and early 2000s, several industries started to use the term ‘extranet’ to describe
centralized repositories of shared data (and supporting applications) made accessible via the web only
to authorized members of particular work groups – for example, geographically dispersed, multi-
company project teams. Some applications are offered on a software as a service (SaaS) basis.
Advantage of Extranet
• Exchange large volumes of data using Electronic Data Interchange (EDI)
• Share product catalogs exclusively with trade partners
• Collaborate with other companies on joint development efforts
• Jointly develop and use training programs with other companies
• Provide or access services provided by one company to a group of other companies, such as an
online banking application managed by one company on behalf of affiliated banks.
Disadvantage of Extranet
• Extranets can be expensive to implement and maintain within an organization (e.g., hardware,
software, employee training costs), if hosted internally rather than by an application service
provider.
• Security of extranets can be a concern when hosting valuable or proprietary information.
Issues in Extranet
Apart for advantages there are also some issues associated with extranet. These issues are discussed
below:
1. Hosting
Where the extranet pages will be held i.e. who will host the extranet pages. In this context there are two
choices:
2. Host it on your own server.
Host it with an Internet Service Provider (ISP) in the same way as web pages.
But hosting extranet pages on your own server requires high bandwidth internet connection which is
very costly.
3. Security
Additional firewall security is required if you host extranet pages on your own server which result in a
complex security mechanism and increase work load.
By- Mr. Bhanuprasad Vishwakarma Page 16
4. Accessing Issues
Information cannot be accessed without internet connection. However, information can be accessed in
Intranet without internet connection.
5. Decreased Interaction
It decreases the face to face interaction in the business which results in lack of communication among
customers, business partners and suppliers.
Networking Basics -
A computer network is a group of two or more interconnected computer systems. You can establish a
network connection using either cable or wireless media.
It is the interconnection of multiple devices, generally termed as Hosts connected using multiple paths
for the purpose of sending/receiving data or media.
There are also multiple devices or mediums which helps in the communication between two different
devices which are known as Network devices. Ex: Router, Switch, Hub, Bridge.
Every network involves hardware and software that connects computers and tools.
Components of Computer Network
Here are essential computer network components:
1. Switches
Switches work as a controller which connects computers, printers, and other hardware devices to a
network in a campus or a building.
It allows devices on your network to communicate with each other, as well as with other networks. It
helps you to share resources and reduce the costing of any organization.
2. Routers
Routers help you to connect with multiple networks. It enables you to share a single internet connection
with multiple devices and saves money. This networking component acts as a dispatcher, which allows
you to analyze data sent across a network. It automatically selects the best route for data to travel and
send it on its way.
3. Servers
Servers are computers that hold shared programs, files, and the network operating system. Servers allow
access to network resources to all the users of the network.
4. Clients
Clients are computer devices which access and uses the network as well as shares network resources.
They are also users of the network, as they can send and receive requests from the server.
5. Transmission Media
Transmission media is a carrier used to interconnect computers in a network, such as coaxial cable,
twisted-pair wire, and optical fiber cable. It is also known as links, channels, or lines.
6. Access points
Access points allow devices to connect to the wireless network without cables. A wireless network
allows you to bring new devices and provides flexible support to mobile users.
7. Shared Data
Shared data are data which is shared between the clients such as data files, printer access programs, and
email.
8. Network Interface Card
Network Interface card sends, receives data, and controls data flow between the computer and the
network.
9. Local Operating System
A local OS which helps personal computers to access files, print to a local printer and uses one or more
disk and CD drives which are located on the computer.
10. Network Operating System
The network operating system is a program which runs on computers and servers. It allows the computers
to communicate via network.
11. Protocol
A protocol is the set of defined rules that allows two entities to communicate across the network. Some
standard protocols used for this purpose are IP, TCP, UDP, FTP, etc.
12. Hub
Hub is a device that splits network connection into multiple computers. It acts a distribution center so
whenever a computer requests any information from a computer or from the network it sends the request
to the hub through a cable. The hub will receive the request and transmit it to the entire network.
13. LAN Cable
Local Area Network(LAN) cable is also called as Ethernet or data cable. It is used for connecting a
device to the internet.
14. OSI
OSI stands for Open Systems Interconnection. It is a reference model which allows you to specify
standards for communications.
3. DNS Server
DNS stands for Domain Name System. It is a server which translates URL or web addresses into their
corresponding IP addresses.
4. MAC Address
MAC (Media Access Control Address) is known as a physical address is a unique identifier of each host
and is associated with the NIC (Network Interface Card). General length of MAC address is: 12-digit/ 6
bytes/ 48 bits
5. Port
Port is a logical channel which allows network users to send or receive data to an application. Every host
can have multiple applications running. Each of these applications are identified using the port number
on which they are running.
Advantages of a Computer Network
Here are the fundamental benefits/pros of using Computer Networking:
• Helps you to connect with multiple computers together to send and receive information when
accessing the network.
• Helps you to share printers, scanners, and email.
• Helps you to share information at very fast speed
• Electronic communication is more efficient and less expensive than without the network.
Disadvantages of using Computer Networks
Here are drawbacks/ cons of using computer networks:
• Investment for hardware and software can be costly for initial set-up
• If you don’t take proper security precautions like file encryption, firewalls then your data will be
at risk.
• Some components of the network design may not last for many years, and it will become useless
or malfunction and need to be replaced.
• Requires time for constant administration
• Frequent server failure and issues of regular cable faults
Summary:
• A computer network is a group of two or more interconnected computer systems
• Computer networks help you to connect with multiple computers together to send and receive
information
• Switches work as a controller which connects computers, printers, and other hardware devices
• Routers help you to connect with multiple networks. It enables you to share a single internet
connection and saves money
• Servers are computers that hold shared programs, files, and the network operating system
• Clients are computer device which accesses and uses the network and shares network resources
Using routers, LANs can connect to wide area networks (WANs, explained below) to rapidly and safely
transfer data.
3. Wireless Local Area Network (WLAN)
Functioning like a LAN, WLANs make use of wireless network technology, such as Wi-Fi. Typically
seen in the same types of applications as LANs, these types of networks don’t require that devices rely
on physical cables to connect to the network.
4. Campus Area Network (CAN)
Larger than LANs, but smaller than metropolitan area networks (MANs, explained below), these types
of networks are typically seen in universities, large K-12 school districts or small businesses. They can
be spread across several buildings that are fairly close to each other so users can share resources.
5. Metropolitan Area Network (MAN)
These types of networks are larger than LANs but smaller than WANs and incorporate elements from
both types of networks. MANs span an entire geographic area (typically a town or city, but sometimes a
campus). Ownership and maintenance is handled by either a single person or company (a local council,
a large company, etc.).
Uses of Metropolitan Area Network
• MAN is used in communication between the banks in a city.
• It can be used in an Airline Reservation.
• It can be used in a college within a city.
• It can also be used for communication in the military.
6. Wide Area Network (WAN)
Slightly more complex than a LAN, a WAN connects computers together across longer physical
distances. This allows computers and low-voltage devices to be remotely connected to each other over
one large network to communicate even when they’re miles apart.
The Internet is the most basic example of a WAN, connecting all computers together around the world.
Because of a WAN’s vast reach, it is typically owned and maintained by multiple administrators or the
public.
Advantages of Wide Area Network
Following are the advantages of the Wide Area Network:
• Geographical area: A Wide Area Network provides a large geographical area. Suppose if the
branch of our office is in a different city then we can connect with them through WAN. The
internet provides a leased line through which we can connect with another branch.
• Centralized data: In case of WAN network, data is centralized. Therefore, we do not need to buy
the emails, files or back up servers.
• Get updated files: Software companies work on the live server. Therefore, the programmers get
the updated files within seconds.
• Exchange messages: In a WAN network, messages are transmitted fast. The web application like
Facebook, Whatsapp, Skype allows you to communicate with friends.
• Sharing of software and resources: In WAN network, we can share the software and other
resources like a hard drive, RAM.
• Global business: We can do the business over the internet globally.
• High bandwidth: If we use the leased lines for our company then this gives the high bandwidth.
The high bandwidth increases the data transfer rate which in turn increases the productivity of
our company.
Disadvantages of Wide Area Network
The following are the disadvantages of the Wide Area Network:
• Security issue: A WAN network has more security issues as compared to LAN and MAN
network as all the technologies are combined together that creates the security problem.
• Needs Firewall & antivirus software: The data is transferred on the internet which can be changed
or hacked by the hackers, so the firewall needs to be used. Some people can inject the virus in
our system so antivirus is needed to protect from such a virus.
• High Setup cost: An installation cost of the WAN network is high as it involves the purchasing
of routers, switches.
• Troubleshooting problems: It covers a large area so fixing the problem is difficult.
7. Storage-Area Network (SAN)
As a dedicated high-speed network that connects shared pools of storage devices to several servers, these
types of networks don’t rely on a LAN or WAN. Instead, they move storage resources away from the
network and place them into their own high-performance network. SANs can be accessed in the same
fashion as a drive attached to a server. Types of storage-area networks include converged, virtual and
unified SANs.
8. System-Area Network (also known as SAN)
This term is fairly new within the past two decades. It is used to explain a relatively local network that
is designed to provide high-speed connection in server-to-server applications (cluster environments),
storage area networks (called “SANs” as well) and processor-to-processor applications. The computers
connected on a SAN operate as a single system at very high speeds.
9. Passive Optical Local Area Network (POLAN)
As an alternative to traditional switch-based Ethernet LANs, POLAN technology can be integrated into
structured cabling to overcome concerns about supporting traditional Ethernet protocols and network
applications such as PoE (Power over Ethernet). A point-to-multipoint LAN architecture, POLAN uses
optical splitters to split an optical signal from one strand of singlemode optical fiber into multiple signals
to serve users and devices.
10. Enterprise Private Network (EPN)
These types of networks are built and owned by businesses that want to securely connect its various
locations to share computer resources.
11. Virtual Private Network (VPN)
By extending a private network across the Internet, a VPN lets its users send and receive data as if their
devices were connected to the private network even if they’re not. Through a virtual point-to-point
connection, users can access a private network remotely.
By- Mr. Bhanuprasad Vishwakarma Page 22
Hubs -
A hub, also called a network hub, is a common connection point for devices in a network. Hubs are
devices commonly used to connect segments of a LAN. The hub contains multiple ports. When a packet
arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
A hub is a network hub used for connection of devices in a network. It connects several devices in a
LAN. All the devices in the network connection is connected through hub that acts as a central
connection for all the devices. There are many ports in the hub and if a packet arrives only at one port,
it is copied so that all the ports can see the packets. This helps if there is any trouble in one port of the
hub. The three types of hub are active, passive and intelligent. Active hubs amplify the incoming electric
signal whereas passive hubs do not amplify the electric signal. Intelligent hubs are kind of active hubs.
When referring to a network, a hub is the most basic networking device that connects multiple computers
or other network devices together. Unlike a network switch or router, a network hub has no routing tables
or intelligence on where to send information and broadcasts all network data across each connection.
Most hubs can detect basic network errors such as collisions, but having all information broadcast to
multiple ports can be a security risk and cause bottlenecks. In the past, network hubs were popular
because they were cheaper than a switch or router. Today, switches do not cost much more than a hub
and are a much better solution for any network.
What Hubs Do?
Hubs and switches serve as a central connection for all of your network equipment and handles a data
type known as frames. Frames carry your data. When a frame is received, it is amplified and then
transmitted on to the port of the destination PC.
In a hub, a frame is passed along or “broadcast” to every one of its ports. It doesn’t matter that the frame
is only destined for one port. The hub has no way of distinguishing which port a frame should be sent
to. Passing it along to every port ensures that it will reach its intended destination. This places a lot of
traffic on the network and can lead to poor network response times.
Compared to a standard switch, the hub is slower as it can send or receive information just not at the
same time, but typically costs more than a hub.
Types of Hub
There are three types which is deployed according to its usage. They are passive, active, and intelligent.
In recent days, the modification was done to hubs that provide high performance.
1. Passive Hub
It has quiescent creatures as the name portraits and it does not should any impact on performance but it
helps in identifying the bugs and detecting the faulty hardware. They are a simple that receives the packet
on a port and is then broadcast to all the port.
It has a 10base-2 port and RJ-45 connectors which is connected to each local area network device. This
connecter is applied as a standard one in your network. AUI ports are placed in advanced passive hubs
which are connected as the transceiver as per the network design.
2. Active Hub
Active hubs have some additional features apart from passive hubs. It monitors the data which is sent
out to the connected devices. It has a unique role in this network communication by using Store
technology where it checks the data before sending out and prioritizes which packet to send first.
It has the option to fix the damaged packets and hold the direction and distribution of the rest of the
packets. If a week signal is received in port but it’s still readable then the active hub amplifies it to a
stronger signal before its retransmitted to other ports.
If any connecting device is not functioning in the network it can boost the signal which is viewed by
other devices with passive hubs. Hence it helps in the continuation of service in the local area network.
But few of them will account for the malfunction of any device and offer related diagnostic capabilities
in the local area network. They will be able to resync the packets and transmit them again. Some cables
go through electromagnetic troubles and stop the packet from entering into the designated port or rarely
it does not reach the port. At those times, they can make up for the packet or data loss. They are accessible
to retime the port for slower delivery and error-prone connections
3. Intelligent Hub
These give many advantages than passive and active hubs. The management who wants to expand their
business in networking can assign users to share a common pool efficiently and work more quickly using
intelligent hubs. The technique behind them is explored recently and now its great demand in the market.
It is proved that it delivers unparallel performance for your local area network. If any problem is detected
with any physical device it is easily detected, diagnosed and solution to the problem using management
data which can be rectified by the hub.
This is a standard improvement over active hubs. Detecting the centralized management tool which helps
to explore the network which runs out of the device to find the low functioning devices.
Another feature is flexibility which has high transmission rates to numerous devices. They have their
standard terms with transmission rate as 10, 16, in the speed of 100Mbps to desktop.
Benefits of Hubs
• The technical information has a physical layer function which is connecting multiple hubs and
has numerous benefits. They detect crucial problems and immoderate collision and interrupt
jabbering occurred between ports or devices. If any fault occurs, it disconnects the signal flow
and prevents the damaged device from the rest of the device.
• If there is any misbehavior or hissing in a cable can also be detected and prevented the device
from great loss. It has an inbuilt twisted based ethernet which helps to detect any malfunction.
To pass the data through each segment through repeater should be the same in all partitions
because the repeater cannot connect the data with different segments.
• Many classes have varied speed range hubs. Class 1 has a signal delay of 140-bit time by setting
a transaction record in a range of 100BASE-TX, and 100BASE-T4 whereas class 2 has the signal
delay of 92-bit time by accessing a single collision domain.
• Dual speed is an internal port switch that works on 10M/bits and 100M/bits segments. When any
device is connected along with these segments the port becomes active and the data signal is
transmitted at a higher rate, but this turns as a failure model because it fails to design the switch
between traffic flow.
By- Mr. Bhanuprasad Vishwakarma Page 24
A switch is part of Hub which tracks all details of the MAC address of the connected devices. It knows
about the system or devices and their connection port, so if any packet is received, the switch chooses
and sends it to that port. The network hub is also called an active, multiport repeater, ethernet, and
repeater. The hubs and switches with multiple inputs and output ports that form a network and all the
connected devices act a single network segment and work efficiently preventing data loss.
Bridges -
A bridge is a type of computer network device that provides interconnection with other bridge networks
that use the same protocol.
Bridge devices work at the data link layer of the Open System Interconnect (OSI) model, connecting
two different networks together and providing communication between them. Bridges are similar to
repeaters and hubs in that they broadcast data to every node. However, bridges maintain the media
access control (MAC) address table as soon as they discover new segments, so subsequent transmissions
are sent to only to the desired recipient.
A network bridge is a device that divides a network into segments. Each segment represent a separate
collision domain, so the number of collisions on the network is reduced. Each collision domain has its
own separate bandwidth, so a bridge also improves the network performance.
A bridge is also called Layer 2 Switch. A network bridge is a device that is primarily used in Local Area
Networks (LANs). It is because these networks can potentially flood and clog a large network.
It is one of their abilities that they broadcast data to all the nodes if they do not know the destination
node’s address. The bridge uses a database.
The purpose of this database is to ascertain where to pass the data frame, where to transmit the data
frame, or where to discard the data frame. Network bridges are also called Ethernet bridges. They connect
two segments of a single network together. The main purpose of bridges is to divide a network into
different manageable sections.
A bridge works at the Data link layer (Layer 2) of the OSI model. It inspects incoming traffic and decide
whether to forward it or filter it. Each incoming Ethernet frame is inspected for destination MAC address.
If the bridge determines that the destination host is on another segment of the network, it forwards the
frame to that segment.
Consider the following example network:
In the picture above we have a network of four computers. The network is divided into segments by a
bridge. Each segment is a separate collision domain with its own bandwidth. Let’s say that Host A wants
to communicate with Host C. Host A will send the frame with the Host C’s destination MAC address to
the bridge. The bridge will inspect the frame and forward it to the segment of the network Host C is on.
Network bridges offer substantial improvements over network hubs, but they are not widely used
anymore in modern LANs. Switches are commonly used instead.
Types of bridges in networking
Following are some Types of bridges in networking
1. Transparent Bridge
This is a bridge in which the stations are completely unaware of the experience of the bridge. For
example, May or May not a bridge is added or deleted from the network, the station’s reconfiguration is
unnecessary. This bridge makes use of two different processes like bridge forwarding and bridge
learning.
2. Source routing bridge
In this bridge, the routing operation is performed by the source station. The frame specifies which route
to follow. The hot discovers the frame by sending a special frame which is called a discovery frame.
This spreads through the entire network by using all possible paths to the destination.
Advantages of bridges
• Bridges can extend a network.
• Bridges can act as a repeater.
• They can reduce network traffic on a segment.
• They can subdivide the network communication.
• They increase the available bandwidth to individual nodes.
• Bridges reduce collisions as well.
• Bridges can create separate collision domains.
• They can connect different architectures.
Disadvantages of bridges
• They are slower than repeaters.
• Filtering makes them slower.
• They do not filter broadcasts.
• Bridges are more expensive.
• They must use routable protocols.
• They need to understand the protocols which they forward.
• They require a lot of amount for initial configuration.
• These are complex devices.
By- Mr. Bhanuprasad Vishwakarma Page 26
Routers -
A router is a networking device that forwards data packets between computer networks. Routers
perform the traffic directing functions on the Internet. Data sent through the internet, such as a web page
or email, is in the form of data packets. A packet is typically forwarded from one router to another router
through the networks that constitute an internetwork (e.g. the Internet) until it reaches its destination
node.
A router is connected to two or more data lines from different IP networks. When a data packet comes
in on one of the lines, the router reads the network address information in the packet header to determine
the ultimate destination. Then, using information in its routing table or routing policy, it directs the
packet to the next network on its journey.
The most familiar type of IP routers are home and small office routers that simply forward IP packets
between the home computers and the Internet. An example of a router would be the owner’s cable or
DSL router, which connects to the Internet through an Internet service provider (ISP). More sophisticated
routers, such as enterprise routers, connect large business or ISP networks up to the powerful core routers
that forward data at high speed along the optical fiber lines of the Internet backbone.
A router is the first line of security from intrusion into a network. Enabling the highest level of security
on the router turns on things like the firewall, and is the best way to keep your computer system and
information safe from attack.
How Routers Work?
Routers connect a modem like a fiber, cable, or DSL modem to other devices to allow communication
between those devices and the internet. Most routers, including wireless routers, usually feature several
network ports to connect numerous devices to the internet simultaneously.
A router typically connects physically, using a network cable, to the modem via the internet or WAN
port and then physically, again through a network cable, to the network interface card in whatever wired
network devices you have. A wireless router can connect using various wireless standards to devices that
also support the particular standard used.
The IP address assigned to the WAN or internet connection is a public IP address. The IP address
assigned to the local network connection is a private IP address. The private IP address assigned to a
router is usually the default gateway for the various devices on the network.
Wireless routers, and wired routers with multiple connections, also act as simple network switches
allowing the devices to communicate with each other. For example, several computers connected to a
router can be configured to share files and printers among each other.
Routers are like small computers, with a CPU and memory to deal with incoming and outgoing data.
Different software, such as DD-WRT, can be loaded on the router, much like an operating system on a
computer.
A router operates on the Network layer (layer 3) of the OSI model and uses routing tables to understand
where traffic is coming from and where it should go.
Managing a Router
There will most likely come a time where you need to make changes to how your network works. This
is done by accessing the software on the router.
A few reasons you need to log in to your router is if you want to change the router’s login password,
encrypt the network, set up port forwarding rules, change the Wi-Fi password, pick a different wireless
network name, or update the firmware on the router.
Some other common tasks related to managing a router involve rebooting the router and completely
resetting the router’s software.
Buying a Router
There are several things to consider before buying a router, such as how fast it needs to be to support
your internet speed and devices, as well as its power to ensure that all your devices can receive internet
access.
For example, maybe you’re buying a Wi-Fi router to serve lots of devices, like gaming consoles,
computers, tablets, and phones. If your house is small, you might be able to get away with one router,
whereas larger homes or businesses with several rooms might be better off with a mesh network or a
Wi-Fi extender.
See these lists if you’re having trouble deciding on a new router:
• Long-Range Routers
• Secure Routers
• Routers for Under $50
• Budget Routers
• DD-WRT Routers
• Gaming Routers
• Travel Routers
• Parental Control Routers
• VPN Routers
Mobile Wi-Fi hotspots are similar to routers because they connect multiple devices to the same internet
connection.
Types of Routers
Core routers used by Internet Service Providers (ISPs) are the fastest and most powerful, sitting at the
center of the internet and forwarding information along the main fiber optic backbone. Enterprise routers
connect large organizations’ networks to these core routers.
By- Mr. Bhanuprasad Vishwakarma Page 28
An edge router, also known as an access router, is a lower-capacity device that resides at the boundary
of a LAN and connects it to a the public internet or a private wide area network (WAN) and/or
external local area network (LAN). Home and small office routers are considered subscriber edge
routers.
Branch routers link an organization’s remote office locations to its WAN, connecting to the primary
campus network’s edge routers. Branch routers often provide additional features, like time-division
multiplexing, wireless LAN management capabilities and WAN application acceleration.
A logical router is a configured partition of a traditional network hardware, or physical, router. It
replicates the hardware’s functionality, creating multiple routing domains within a single router. Logical
routers perform a subset of the tasks that can be handled by the physical router, and each can contain
multiple routing instances and routing tables.
A wireless router works in the same way as the router in a hard-wired home or business local area
network (LAN), but allows greater mobility for notebook or portable computers. Wireless routers use
the 802.11g specification, a standard that offers transmission over short distances.
IP Address -
An Internet Protocol address (IP address) is a numerical label assigned to each device connected to a
computer network that uses the Internet Protocol for communication. An IP address serves two main
functions: host or network interface identification and location addressing.
Internet Protocol version 4 (IPv4) defines an IP address as a 32-bit number. However, because of the
growth of the Internet and the depletion of available IPv4 addresses, a new version of IP (IPv6), using
128 bits for the IP address, was standardized in 1998. IPv6 deployment has been ongoing since the mid-
2000s.
IP addresses are written and displayed in human-readable notations, such as 172.16.254.1 in IPv4, and
2001:db8:0:1234:0:567:8:1 in IPv6. The size of the routing prefix of the address is designated in CIDR
notation by suffixing the address with the number of significant bits, e.g., 192.168.1.15/24, which is
equivalent to the historically used subnet mask 255.255.255.0.
The IP address space is managed globally by the Internet Assigned Numbers Authority (IANA), and by
five regional Internet registries (RIRs) responsible in their designated territories for assignment to local
Internet registries, such as Internet service providers, and other end users. IPv4 addresses were
distributed by IANA to the RIRs in blocks of approximately 16.8 million addresses each, but have been
exhausted at the IANA level since 2011. Only one of the RIRs still has a supply for local assignments in
Africa. Some IPv4 addresses are reserved for private networks and are not globally unique.
Network administrators assign an IP address to each device connected to a network. Such assignments
may be on a static (fixed or permanent) or dynamic basis, depending on network practices and software
features.
Function
An IP address serves two principal functions. It identifies the host, or more specifically its network
interface, and it provides the location of the host in the network, and thus the capability of establishing
a path to that host. Its role has been characterized as follows: “A name indicates what we seek. An
address indicates where it is. A route indicates how to get there.” The header of each IP packet contains
the IP address of the sending host, and that of the destination host.
IP versions
Two versions of the Internet Protocol are in common use in the Internet today. The original version of
the Internet Protocol that was first deployed in 1983 in the ARPANET, the predecessor of the Internet,
is Internet Protocol version 4 (IPv4).
The rapid exhaustion of IPv4 address space available for assignment to Internet service providers and
end user organizations by the early 1990s, prompted the Internet Engineering Task Force (IETF) to
explore new technologies to expand the addressing capability in the Internet. The result was a redesign
of the Internet Protocol which became eventually known as Internet Protocol Version 6 (IPv6) in 1995.
IPv6 technology was in various testing stages until the mid-2000s, when commercial production
deployment commenced.
Today, these two versions of the Internet Protocol are in simultaneous use. Among other technical
changes, each version defines the format of addresses differently. Because of the historical prevalence
of IPv4, the generic term IP address typically still refers to the addresses defined by IPv4. The gap in
version sequence between IPv4 and IPv6 resulted from the assignment of version 5 to the experimental
Internet Stream Protocol in 1979, which however was never referred to as IPv5.
Other versions v1 to v9 were defined, but only v4 and v6 ever gained widespread use. v1 and v2 were
names for TCP protocols in 1974 and 1977, as there was to separate IP specification at the time. v3 was
defined in 1978, and v3.1 is the first version where TCP is separated from IP. v6 is a synthesis of several
suggested versions, v6 Simple Internet Protocol, v7 TP/IX: The Next Internet, v8 PIP — The P Internet
Protocol, and v9 TUBA — Tcp & Udp with Big Addresses.
A LAN comprises cables, access points, switches, routers, and other components that enable devices to
connect to internal servers, web servers, and other LANs via wide area networks.
The rise of virtualization has also fueled the development of virtual LANs, which enable network
administrators to logically group network nodes and partition their networks without a need for major
infrastructure changes.
For example, in an office with multiple departments, such as accounting, IT support, and administration,
each department’s computers could be logically connected to the same switch but segmented to behave
as if they are separate.
Types of LAN
Ethernet is the most common type of LAN. Different Lan can be differentiated on the behalf of following
characteristics.
• Topology: The topology is the geometric arrangement of a network elements. For example,
Network devices can be interconnected in a ring topology or in a bus topology or linear bus.
• Protocols: It is a guidelines for communicating data between two devices. The protocols also
determine type of error and data compression.
• Media: The cable used in Lan to connect devices are twisted-pair wire, coaxial cables, or fiber
optic.
Benefits of a LAN
The advantages of a LAN are the same as those for any group of devices networked together. The devices
can use a single Internet connection, share files with one another, print to shared printers, and be accessed
and even controlled by one another.
LANs were developed in the 1960s for use by colleges, universities, and research facilities (such as
NASA), primarily to connect computers to other computers. It wasn’t until the development of Ethernet
technology (1973, at Xerox PARC), its commercialization (1980), and its standardization (1983) that
LANs started to be used widely.
While the benefits of having devices connected to a network have always been well understood, it wasn’t
until the wide deployment of Wi-Fi technology that LANs became commonplace in nearly every type
of environment. Today, not only do businesses and schools use LANs, but also restaurants, coffee shops,
stores, and homes.
Wireless connectivity has also greatly expanded the types of devices that can be connected to a LAN.
Now, nearly everything imaginable can be “connected,” from PCs, printers, and phones to smart TVs,
stereos, speakers, lighting, thermostats, window shades, door locks, security cameras–and even
coffeemakers, refrigerators, and toys.
In 1982, 10 Mbps Ethernet cards came into existence and they were very expensive. By 1988, 10 Mbps
Ethernet had acceptable performance for large LANs and was still good for small installations. By 1990,
large installations were beginning to see congestion. Hence, alternatives to 10 Mbps cards were
becoming popular. One of these alternatives was to install a switched architecture, rather than
constructing architecture with hubs.
In 1996, 10Mbps switched LANs were providing acceptable service for smaller installations. The
awesome technology at this point was 100Mbps shared Ethernet. By 1998 switched 10Mbps Ethernet
was common in small LANs and switched 100 Mbps Ethernet was common in large LANs. Large LANs
are beginning to see limitations of 100 Mbps when everyone on the LAN starts doing video conferencing.
Now, Gigabyte Ethernet cards are available for sale. The 10 Mbps cards are not used anymore. Now-i-
days 10/100, 10/100/1000 auto-sensing cards are available in the market. Everything is moving to dual
mode auto-sensing technology. Even though Gigabyte Ethernet is getting more popular now-a-days,
Gigabyte LANs are 10 times faster than a 100Mbps LAN. Ethernet was evolved from a protocol called
ALOHA. ALOHA was mainly used in packet radio network which communicate using satellites. In
brief, an earth station sends some data, as soon as the data is ready it waits for an acknowledgement
(ACK). If it fails to get an ACK, it would time out and sends the same thing again. The sender keeps
trying until the transmission is successful. The lesson to be learned here is that it is important to limit the
number of users on a shared network medium. Traffic analysis can help determine the maximum number
of users to ensure a reasonable Quality of Service (QOS).
Characteristics of a LAN
A LAN can be characterized by means of hardware and software components and a set of protocols.
Hardware components of a LAN are:
1. The Server
Server is a computer that provides services to other computers (workstations or clients) on the network.
The primary goal of a LAN server is data management. It stores, retrieves, and protects the data. A server
also sends data to the requesters on the network and also to authorized remote users. The type and
configurations needed for the server, depends mainly on the purpose for which the LAN is being
constructed. Servers may be classified, based on the type of service they provide. A single server may
provide a number of services also. The following are the list of servers categorized, based on the type of
service.
(i) File server and disk server
A file server makes the disk storage space (in the order of several Gigabytes), to various client PCs. The
file server satisfies the request for data from application programs running in client workstations. It also
keeps the consistency of data when more than one client makes simultaneous data requests. In a LAN,
working with a file server, all application running in a workstation may request for a file with involving
the local operating system. The workstation sends its file request to the server and the server processes
the request and sends the required file directly to the workstation.
4. Communication Equipments
(i) Repeater
A repeater operates at layer-I. It has just enough intelligence to find out the layer-l incoming signals are
and then send out a clean stream of signals built from scratch. Noise is eliminated from the signals in
this manner. A repeater has one incoming and one outgoing line. It extends the distance that a signal
may be sent over a transmission media.
(ii) Hub
A hub is a multi-port repeater. Any incoming signal is repeated on all other outgoing lines. A hub
functions at layer-I.
(iii) Bridge
A bridge has more intelligence than a hub or repeater. This device separates two segments of a single
LAN. A bridge operates at layer-2 by looking at the destination address in the frame header. Consulting
a table, the bridge will determine if the frame needs to pass on to the other segment. Only certain frames
may pass those with the correct MAC address.
(iv) Switch
A switch is a multi-port bridge. It performs its functions at layer two. It looks at MAC layer addresses
just like a bridge, consults a table, and determines if a frame needs to be sent on one of the attached lines.
Multiple connections can occur through a switch simultaneously as long as they don’t compete for the
same line. A switch, just like a bridge, does not divide a LAN into two LANs. It merely reduces
unnecessary traffic on LAN segments.
(v) Router
A router is more intelligent than bridges and switches. It functions at layer-3. At layer-2 all incoming
frames are checked for errors and then they are delivered to layer-3. A layer-3 datagram has an address
that permits it to be sent across internet works (interconnected networks). This requires a single global
addressing scheme. The router finds the layer-3 address and consults a table that it keeps. There the
router will learn which attached line to send the datagram on. A router provides facilities to the stations
on the LAN, to access other networks.
The term is applied to the single network such as a cable television network, or it can be a way of
connecting a certain number of LANs in a more extensive network so that resources can share from LAN
to LAN and from device to device. For example, a company can use a MAN to connect the LANs of all
its offices scattered around the city. Local libraries and government agencies often use a MAN to connect
to citizens and private industries. It may also connect MANs within a larger area than LAN. The
geographical limit of a MAN may span a city.
In MAN, different LANs connected through a local telephone exchange. Some of the widely used
protocols for MAN are X.25, Frame Relay, Asynchronous Transfer Mode (ATM), ISDN (Integrated
Services Digital Network), xDSL (Digital Subscriber Line), ADSL (Asymmetrical Digital Subscriber
Line), WDM (Wavelength Division Modulation), etc. These protocols are quite different from those
used for LANs.
A MAN can wholly own by a private company, which will be its operator, or it can be a service provided
by a public service company, such as a local telephone company. Many telephone companies have a
very popular MAN service called Multimegabit Data Switching Services (SMDS).
The copper pair technology positioned as the world’s largest network an excellent alternative for the
creation of metropolitan networks, for its low latency (between 1 and 50 ms), excellent stability and the
lack of radio interference, the MAN LOOP networks, offer speeds of 10 Mbit/s or 20 Mbit/s, on copper
pairs and 100 Mbit/s, 1 Gbit/s and 10 Gbit/s through optical fiber.
The concept of the metropolitan area network represents an evolution of the concept of a local area
network to a broader scope, covering larger areas that in some cases are not limited to an urban
environment but can reach regional and even national coverage through the interconnection of different
networks of the metropolitan area.
This type of networks is a larger version than the LAN and usually based on a technology similar to this
one. The main reason to distinguish a MAN with a particular category is that a standard has adopted to
make it work, which is equivalent to the IEEE standard.
WAN networks also applied in organizations, in groups of corporate offices near a city, these do not
contain switching elements, which divert the packets by one of several potential output lines. These
networks can be public or private.
The networks of the metropolitan area, comprise a specific geographical location “city, the
municipality,” and its distance of coverage is greater than 4 km. They are networks with two
unidirectional buses, each of which is independent of the other in terms of data transfer.
4. High reliability
Reliability referred to the error rate of the network while it is in operation the error rate defined as the
number of erroneous bits that transmitted over the network. In general, the error rate for optical fiber is
lower than that of copper cable with equal length. The error rate not detected by the error detection
mechanisms is of the order of 10-20. This feature allows metropolitan area networks to work in
environments where errors can be disastrous, such as air traffic control.
The creation of municipal metropolitan networks would allow municipalities to have a high-performance
infrastructure by providing them with a network similar to that of Internet service providers. In this way,
the town hall can connect new offices, remote users, or video cameras on public roads.
5. High security
Fiber optic offers a safe means because it is not possible to read or change the optical signal without
physically interrupting the link.
6. Real-time traffic
The metropolitan area networks guarantee minimum network access times, which allows for the
inclusion of synchronous services necessary for real-time applications, where it is crucial that specific
messages go through the network without delay even when the network load is high.
Between node and node, you cannot have, for example, more than 100 kilometers of cable.
Approximately 20 km of cable can approximate, but it not known at what moment information or data
sent can be lost.
Synchronous services require a reservation of bandwidth; Such is the case of voice and video traffic. For
this reason, metropolitan area networks are optimal networks for multimedia traffic environments,
although not all metropolitan networks support isochronous traffic (information transmission at constant
intervals).
WAN architecture
Initially, WANs were built with meshed webs of private lines bought from telecommunications carriers,
but WAN architectures have advanced to include packet-switched services such as frame relay and ATM
as well as MPLS. With these services, a single connection to a site can be connected to many others via
switching within service-provider networks. For certain types of traffic, the Internet can also be woven
into the mix to provide less expensive WAN connections.
History of WANs
WANs have been around since the early days of computing networks. The first examples of WANs
included circuit-switched telephone lines, but advances in technologies now include wireless
transmissions and fiber-optic transmissions. Data can also be moved via leased lines, or even via satellite
transmission.
As technologies changed, so did transmission rates. The early days of 2400 bps modems evolved to 40
Gbps and 100 Gbps connectivity today. These speed increases have allowed more devices to connect to
networks, witnessed by the explosion of computers, phones, tablets and smaller Internet of Things
devices.
In addition, speed improvements have allowed applications to utilize larger amounts of bandwidth that
can travel across WANs at super-high speed. This has allowed enterprises to implement applications
such as videoconferencing and large-file data backup. Nobody would have considered conducting a
videoconference across a 28K bps modem, but now workers can sit in a cubicle and participate in a
global company meeting via video.
Many WAN links are supplied via carrier services in which customers’ traffic rides over facilities shared
by other customers. Customers can also buy dedicated links that nail up circuits point-to-point and are
used for just one customer’s traffic. These are typically used for top-priority traffic or delay-sensitive
applications that have high-bandwidth needs such as videoconferencing.
Connections between WAN sites may be protected by virtual private networking (VPN) technology that
overlays security functions including authentication, encryption, confidentiality and non-repudiation.
The diagram below illustrates the main functions of the parties that are usually involved in the process.
A domain name registrant is the person or organization who has registered the domain name. In order to
do so, the domain name registrant will usually apply online to a domain registrar or one of their resellers.
The domain name registrant is bound by the terms and conditions of the registrar with which it registers
By- Mr. Bhanuprasad Vishwakarma Page 40
its domain name, for instance adhering to a certain code of conduct or indemnifying the registrar and
registry against any legal or civil action taken as a result of use of the domain name. Domain name
registrants have certain responsibilities that are incorporated into these terms and conditions like
payment of registration fees and submission and timely update of accurate data.
In addition to registering the domain name, domain name registrants also need to have their domain
names listed on name servers in order for that domain name to be reachable on the Internet. A domain
name registrant is responsible for procuring or hosting his or her own name server if the registrar does
not offer this service or he or she has opted out of the registrar’s service.
In some cases, a person or organization who does not wish to have their information listed in WHOIS
may contract with a proxy service provider to register domain names on their behalf. In this case, the
service provider is the domain name registrant, not the end customer.
Registrars are organizations accredited by ICANN and certified by the registries to sell domain names.
They are bound by the Registrar Accreditation Agreement (RAA) with ICANN, and by their agreements
with the registries. The RAA sets out responsibilities for the registrar including maintenance of WHOIS
data, submission of data to registries, facilitating public WHOIS queries, ensuring domain name
registrants details are escrowed, and complying with RAA conditions relating to the conclusion of the
domain name registration period.
Some domain name registrants may opt to register through a reseller. These organizations are affiliated
or under contract with registrars, and usually offer other services such as web hosting, email mailboxes
etc. Resellers are bound by their agreements with the registrar(s) whose services they sell; they are not
accredited by ICANN. However, the registrar for whom they are re-selling will still be the sponsor for
the domain name registration and accountable for the domain names sold by the reseller.
While registrars are contracted to conduct the day-to-day business of selling domain name registrations,
registries are responsible for maintaining the registry for each TLD. The responsibilities of the registries
include accepting registration requests (whether from registrars or directly from domain name
registrants), maintaining a database of the necessary domain name registration data and providing name
servers to publish the zone file data (i.e. information about the location of a domain name) throughout
the Internet.
The Internet Corporation for Assigned Names and Numbers (ICANN) is the non-profit organization that
oversees the assignment of both IP addresses and domain names. It has responsibility for managing root
server and TLD name system management and has contractual agreements with both registries and
registrars that provide the foundation for the WHOIS system.
like Amazon, Flipkart, Shopify, Myntra, Ebay, Quikr, Olx are examples of E-commerce websites. By
2020, global retail e-commerce can reach up to $27 Trillion.
E-commerce is a popular term for electronic commerce or even internet commerce. The name is self-
explanatory, it is the meeting of buyers and sellers on the internet. This involves the transaction of goods
and services, the transfer of funds and the exchange of data.
So when you log into your Amazon and purchase a book, this is a classic example of an e-commerce
transaction. Here you interact with the seller (Amazon), exchange data in form of pictures, text, address
for delivery etc. and then you make the payment.
Characteristics of E-Commerce
E-commerce is characterized by the following features:
(i) The business tools are electronic and the application is commerce, i.e. profit motive.
(ii) Business is externally focused on those with whom business is conducted.
(iii) Most of the transactions are processed automatically.
(iv) Uses a gamut of business support services, such as inter-organizational e-mail and on-line
directories.
Examples of E-Commerce
• Amazon
• Flipkart
• eBay
• Fiverr
• Upwork
• Olx
• Quikr
Advantages of e-commerce
• E-commerce provides the sellers with a global reach. They remove the barrier of place
(geography). Now sellers and buyers can meet in the virtual world, without the hindrance of
location.
• Electronic commerce will substantially lower the transaction cost. It eliminates many fixed costs
of maintaining brick and mortar shops. This allows the companies to enjoy a much higher margin
of profit.
• It provides quick delivery of goods with very little effort on part of the customer. Customer
complaints are also addressed quickly. It also saves time, energy and effort for both the
consumers and the company.
• One other great advantage is the convenience it offers. A customer can shop 24×7. The website
is functional at all times, it does not have working hours like a shop.
• Electronic commerce also allows the customer and the business to be in touch directly, without
any intermediaries. This allows for quick communication and transactions. It also gives a
valuable personal touch.
Disadvantages of e-commerce
• The start-up costs of the e-commerce portal are very high. The setup of the hardware and the
software, the training cost of employees, the constant maintenance and upkeep are all quite
expensive.
• Although it may seem like a sure thing, the e-commerce industry has a high risk of failure. Many
companies riding the dot-com wave of the 2000s have failed miserably. The high risk of failure
remains even today.
• At times, e-commerce can feel impersonal. So it lacks the warmth of an interpersonal relationship
which is important for many brands and products. This lack of a personal touch can be a
disadvantage for many types of services and products like interior designing or the jewelry
business.
• Security is another area of concern. Only recently, we have witnessed many security breaches
where the information of the customers was stolen. Credit card theft, identity theft etc. remain
big concerns with the customers.
• Then there are also fulfillment problems. Even after the order is placed there can be problems
with shipping, delivery, mix-ups etc. This leaves the customers unhappy and dissatisfied.
Types of e-commerce Models
Electronic commerce can be classified into four main categories. The basis for this simple classification
is the parties that are involved in the transactions. So the four basic electronic commerce models are as
follows,
1. Business to Business
This is Business to Business transactions. Here the companies are doing business with each other. The
final consumer is not involved. So the online transactions only involve the manufacturers, wholesalers,
retailers etc.
2. Business to Consumer
Business to Consumer. Here the company will sell their goods and/or services directly to the consumer.
The consumer can browse their websites and look at products, pictures, read reviews. Then they place
their order and the company ships the goods directly to them. Popular examples are Amazon, Flipkart,
Jabong etc.
3. Consumer to Consumer
Consumer to consumer, where the consumers are in direct contact with each other. No company is
involved. It helps people sell their personal goods and assets directly to an interested party. Usually,
goods traded are cars, bikes, electronics etc. OLX, Quikr etc follow this model.
4. Consumer to Business
This is the reverse of B2C, it is a consumer to business. So the consumer provides a good or some service
to the company. Say for example an IT freelancer who demos and sells his software to a company. This
would be a C2B transaction.
By- Mr. Bhanuprasad Vishwakarma Page 43
Mobile Commerce -
Mobile commerce, also referred as m-commerce, is the use of wireless handheld devices, such as
cellular phones and laptops, to conduct commercial transactions online. Mobile commerce transactions
continue to grow, and the term includes the purchase and sale of a wide range of products and services,
such as online banking, bill payment and information delivery.
Mobile commerce is founded upon the increasing adoption of electronic commerce. The rapid growth
of mobile commerce is being driven by a number of positive factors, including the demand for
applications from an increasingly mobile consumer base; the rapid adoption of online commerce, thanks
to the resolution of security issues; and technological advances that have given wireless handheld devices
advanced capabilities and substantial computing power.
M-Commerce benefits for business
Surely, running a mobile app for ecommerce can’t be the sole guarantee of profit. This is a great
additional value tool to engage customers and offer experiences. Any amount of investment to make an
app, if done wisely, will be justified by loyal customers. Also, check your competition if they have app,
you should probably too.
Now we are going to name main advantages of m-commerce, with few practical examples.
1. Faster purchases
Yes, many sites have mobile versions, though apps are generally 1.5 times faster when loading data and
search results on mobile devices. Moreover, there is no need to pull data from a server and so customers
can browse and purchase products faster. As mobile ecommerce apps offer same functionality as desktop
apps, people may purchase items directly within an app.
M-commerce revenue has been rising at 30-40% rate annually since 2014, and by the end of 2017 is
expected to reach $150b total. The biggest retail app Amazon increased number of customers from 43
million in 2015 to 67 million in 2016. The reason for such achievements is intuitive mobile browsing,
which in turn drives sales up.
2. Flexible Accessibility
User can be accessible via mobile devices and at the same time be accessible online too through logging
on to various mobile messengers and other networking platforms. On the other hand, the user may also
choose not to be accessible by shutting down his mobile device, which at times can be a good thing.
3. Easy Connectivity
As long as the network signal is available, mobile devices can connect and do commerce transactions
not only mobile to mobile but also mobile to other devices. No need for modem or WI-FI connectivity
set up.
4. Personalization
Each mobile device is usually dedicated to a specific user so that it is personal. Users can do whatever
they want with their handheld devices: modify the wallpaper, change view settings or modify contact
information as you send emails or e-payments.
5. Time Efficient
Doing M-Commerce transactions do not require the users to plug anything like personal computer or
wait for the laptop to load.
According to the latest figures, in-app purchasing from mobile devices touched approximately $9 billion
in 2017. In the coming years, expect application development trends to move away from simple banners
and integrating advertisements in a fun, non-obnoxious manner for the end-user.
7. Application Security Becomes Necessary
With rapid technological advancements being made on a daily basis, application security, as well as
general smartphone security is a major concern. Currently, most of the top 100 apps in the Google app
store have already been hacked, and the picture isn’t that pretty on the iOS side as well.
Therefore, with Google, Microsoft, and Apple all raising the stakes and making security a big target for
the coming few years, developers also need to focus on cyber security and implement new-generation
security features within their apps.
8. New-gen Mobile Games See the Light of Day
With the advancements being made in the field of social connectivity and cloud technology, now is the
time for developers to focus on games which have an increased multiplayer focus rather than developing
only single player games.
By developing new-generation games based on the latest game engines, which also make use of easy
access to cloud technology, developers can push frequent and rapid updates to enhance the UX.
the traditional retail model, where a business sells to individuals, but business is conducted online as
opposed to in a physical store.
Examples of B2C businesses are everywhere. Exclusively online retailers include Newegg.com,
Overstock.com, Wish, and ModCloth, but other major B2C model brick-and-mortar businesses like
Staples, Wal-Mart, Target, REI, and Gap.
C2C Ecommerce
B2B and B2C are fairly intuitive concepts for most of us, but the idea of C2C is different. What does a
consumer-to-consumer ecommerce business look like?
Created by the rise of the ecommerce sector and growing consumer confidence in online business, these
sites allow customers to trade, buy, and sell items in exchange for a small commission paid to the site.
Opening a C2C site takes careful planning.
Despite the obvious success of platforms like eBay and Craigslist, numerous other auction and classified
sites (the main arenas for C2C) have opened and quickly closed due to unsustainable models.
C2B: Consumer to Business Ecommerce
C2B is another model most people don’t immediately think of, but that is growing in prevalence. This
online commerce business is when the consumer sells goods or services to businesses, and is roughly
equivalent to a sole proprietorship serving a larger business.
Reverse auctions, service provision sites like UpWork, and several common blog monetization strategies
like affiliate marketing or Google AdSense also fall under this heading.
they can sell to the general public and to retailers. This gives them a higher profit margin than a strictly
wholesale model.
Solutions for Wholesalers
Wholesale businesses are all about volume. You’ll need to push products out to Ebay, Amazon, Google,
etc. BigCommerce includes all this in their Basic plan for $29 month. No tinkering needed. If you have
dev skills, you can use X-Cart.
E-Governance -
Electronic governance or e-governance is the application of information and communication technology
(ICT) for delivering government services, exchange of information, communication transactions,
integration of various stand-alone systems and services between government-to-citizen (G2C),
By- Mr. Bhanuprasad Vishwakarma Page 50
Benefits of E-governance
• Reduced corruption
• High transparency
• Increased convenience
• Growth in GDP
• Direct participation of constituents
• Reduction in overall cost.
• Expanded reach of government
Through e-governance, the government plans to raise the coverage and quality of information and
services provided to the general public, by the use of ICT in an easy, economical and effective manner.
The process is extremely complicated which requires, the proper arrangement of hardware, software,
networking and indeed re-engineering of all the processes to facilitate better delivery of services.
frequently marks up the invoice and enters it into its own computer system. The entire process is nothing
more than the transfer of information from the seller’s computer to the customer’s computer. EDI makes
it possible to minimize or even eliminate the manual steps involved in this transfer.
EDI replaces postal mail, fax and email. While email is also an electronic approach, the documents
exchanged via email must still be handled by people rather than computers. Having people involved
slows down the processing of the documents and also introduces errors. Instead, EDI documents can
flow straight through to the appropriate application on the receiver’s computer (e.g., the Order
Management System) and processing can begin immediately. A typical manual process looks like this,
with lots of paper and people involvement:
1. Business documents
These are any of the documents that are typically exchanged between businesses. The most common
documents exchanged via EDI are purchase orders, invoices and advance ship notices. But there are
many, many others such as bill of lading, customs documents, inventory documents, shipping status
documents and payment documents.
2. Standard format
Because EDI documents must be processed by computers rather than humans, a standard format must
be used so that the computer will be able to read and understand the documents. A standard format
describes what each piece of information is and in what format (e.g., integer, decimal, mmddyy). Without
a standard format, each company would send documents using its company-specific format and, much
as an English-speaking person probably doesn’t understand Japanese, the receiver’s computer system
doesn’t understand the company-specific format of the sender’s format.
• There are several EDI standards in use today, including ANSI, EDIFACT, TRADACOMS and
ebXML. And, for each standard there are many different versions, e.g., ANSI 5010 or EDIFACT
version D12, Release A. When two businesses decide to exchange EDI documents, they must
agree on the specific EDI standard and version.
• Businesses typically use an EDI translator either as in-house software or via an EDI service
provider to translate the EDI format so the data can be used by their internal applications and
thus enable straight through processing of documents.
3. Business partners
The exchange of EDI documents is typically between two different companies, referred to as business
partners or trading partners. For example, Company A may buy goods from Company B. Company A
sends orders to Company B. Company A and Company B are business partners.