Computer Networks 2
Computer Networks 2
Computer Networks 2
which are able to communicate with each other and share hardware and software
resources. In this context, the term interconnected means that there exists a path through
which data can be transmitted from one computer/device to another.
Why do we have computer networks? Are there any advantages of
networked computers over stand alone computers? Yes, there are many.
A few of these advantages are :
1. Resource Sharing
2. Cost saving
3. Collaborative user interaction
4. Time saving
5. Increased storage
In a networked computer lab when print command is given on one computer
the document may be printed by the printer which is attached to some other
computer. This printer is able to print documents from multiple users on the
network. It means that the printer is being shared by more than one users. This
is an example of resource sharing, and this is possible only when the
computers are interconnected to form a network. Similarly other resources
like Hard Disk, DVD Drive, and Scanner etc. can also be shared on a
computer network. Software resources like Application Software's, Anti-Virus
tools etc. can also be shared on computer networks. You can very easily
conclude that this resource sharing also leads to cost-saving.
Let us take one more example of a school. Here we assume
that all the computers in the school are connected to one main
computer (called server). After the exams, teachers have to
exchange marks with each other for result preparation. So all
the teachers enter the marks class wise for their respective
subjects at one centralized location and from there the class
teachers can copy the marks of their classes and can prepare
the result. This way data is shared on a computer network.
Similar is the case with other computerized organizations
also. Let us take another example of collaborative user
interaction. If we are working on a computer which is a part
of a computer network, we can communicate with any other
user of the network through e-mail or chatting. It takes
negligible time to send and receive messages and watch live
videos of one another irrespective of terrestrial distances. If
the e-mail or chatting is done for some useful purpose, it
leads to increased productivity, cost-saving as well as time-
saving.
On a network, same data may be replicated on multiple computers to ensure the
availability of data in the case of some computer getting faulty. For example, when you
save your java applications on your computer, you can also store their copies on some
other networked computers in your lab. This way your work will be available even if
your computer develops some fault or somehow your programs are deleted from your
computer. Similarly, on large networks also the data is replicated on multiple computers
as if a huge storage area is available to store multiple copies of the data. All these
advantages are there for a small organization like a school as well as for big business
organizations and for governments. Today, small as well as big organizations, and
governments keep their data on secured large scale computers called servers. They
share this data with authorized users. This ensures security. Customer care cells of
companies share the resources and data and they also communicate among themselves
as well as with customers with the help of computer networks only.
To form a computer network a lot of hardware devices are
required. Some of these devices along with their functionalities
are mentioned in the next part of the presentation.
Computers on a network are able to share data and other resources.
They are also able to communicate among themselves. To make all
this possible there must be some medium over which the data can
travel from one computer to another. A medium of data transmission
over a computer network is called a channel or a transmission
medium. Channels may be guided (wired) or unguided (wireless).
Wired Media
A number of various types of cables are used to transfer data over
computer networks. These are Twisted Pair Cable, Co-axial
Cable, and Optical Fiber Cable. Let us know about these in some
details.
Electromagnetic waves are used for wireless communication over computer networks.
Frequencies of waves are measured in Hertz (Hz). As the frequencies of
electromagnetic waves change, their properties also change. Based on their
frequencies, electromagnetic waves are categorized into various categories. These
categories are (in increasing order of frequencies):
1. Radio waves,
2. Microwaves
3. Infrared radiation,
4. Visible light
5. Ultraviolet
6. radiation,
7. X-rays,
8. Gamma rays.
o Radio Waves –
Radio waves have a frequency range of 3 KHz to 3GHz. Radio waves are used for
communication over distances ranging from a few meters (in walkie-talkies) up to
covering an entire city. These waves are easy to generate, can travel long distances and
can penetrate buildings easily. That's why they are widely used for communication, both
indoors and outdoors. Cordless phones, AM and FM radio broadcast, Garage door
openers etc. Are examples of radio wave transmission.
Characteristics of Radio Wave Transmission :
1. These waves are Omni-directional, so the transmitting and receiving antennas
need not be aligned.
2. Relatively inexpensive than wired media.
3. The transmission can be interfered by motors or other electrical equipment
4. It offers ease of communication over difficult terrain
5. Less secure mode of transmission
o Micro Waves -
Micro waves have a frequency range of 300MHz (0.3 GHz) to 300 GHz. This range has
some overlapping portion (0.3GHz - 3GHz) with radio waves as there is no clear-cut
demarcation between radio waves and micro waves. Microwaves travel in straight lines
and cannot penetrate any solid object. Therefore for long distance microwave
ccommunication, high towers are built and microwave antennas are put on their tops.
Characteristics of Micro Wave Transmission:
1. Free from land acquisition rights
2. Relatively inexpensive than wired media
3. Offers ease of communication over difficult terrain
4. The transmission is in straight lines so the transmitting and receiving antennas need
to be properly aligned ( line of sight transmission)
Infrared Waves -
Infrared waves have a frequency range of 300 GHz to 400 THz. If you recall
VIBGYOR spectrum of light, you will also recall that red light has the lowest frequency
(400THz - 484THz) in this spectrum. Infrared waves are so called because they have a
frequency range of just less than that of red light. These waves are used for short range
communication (approx. 5m) in a variety of wireless communications, monitoring, and
control applications. Home-entertainment remote-control devices, Cordless mouse, and
Intrusion detectors are some of the devices that utilize infrared communication.
Hub:
Hub is a device that allows us to connect multiple computers/devices together in a network. A
hub has ports into which the cables from individual computers' NICs are inserted. This way each
computer's NIC is connected to hub and hence all the computers are connected together.
Whenever a computer has to send some information to some other computer(s), the information
is sent by the NIC to the hub. Then the hub retransmits this information to the other computers
attached to it. The computer(s) for which the information is intended receive(s) this information
and accept(s) it. Other computers on the network simply reject this information.
Switch:
A switch is an intelligent hub. It looks exactly like a hub. It has the same function as that of
a hub: to connect multiple computers/devices in a network. But the difference between the
two is in the way they re-transmit the received information. Unlike a hub, instead of
broadcasting (sending to each device attached to it) the received information, a switch sends
the information selectively only to those computers for which it is intended. This makes a
switch more efficient than a hub.
Repeater:
When the data is transmitted over a network for long distances, the data signal gets
weak after certain distance. This distance depends on the data transfer range of
transmission channel being used and can be from a few meters to a few kilometers. If
the signal becomes weak, it cannot reach its destination. Therefore, some device is
required which can re-strengthen the data signal before it gets too weak. Repeater is
such a device. A repeater regenerates the received signal and re-transmits it to its
destination
Gateway:
A Gateway is a device, which is used to connect different types of
networks and perform the necessary translation so that the connected
networks can communicate properly.
A Topology is an arrangement of physical connections among nodes in a
network. Some network topologies have been discussed in the next part
of the presentation.
Bus Topology:
In bus topology all the nodes are connected to a main cable called backbone. If any
node has to send some information to any other node, it sends the signal to the
backbone. The signal travels through the entire length of the backbone and is received
by the node for which it is intended. A small device called terminator is attached at each
end of the backbone. When the signal reaches the end of backbone, it is absorbed by the
terminator and the backbone gets free to carry another signal. This prevents the
reflection of signal back on the cable and hence eliminates the chances of signal
interference.
Characteristics of Bus topology:
1.It is easy to install.
2. It requires less cable length and hence it is cost effective.
3. Failure of a node does not affect the network.
4. In case of cable (backbone) or terminator fault, the entire network breaks
down.
5. Fault diagnosis is difficult.
6. At a time only one node can transmit data.
Star Topology:
In star topology each node is directly connected to a hub/switch. If any node has to send
some information to any other node, it sends the signal to the
hub/switch. This signal is then broadcast (in case of a hub) to all the nodes but is
accepted by the intended node(s). In the case of a switch the signal is sent only to the
intended node(s).
Characteristics of Star topology:
1. It is more efficient topology as compared to bus topology.
2. It is easy to install
3. It is easy to diagnose the fault in Star topology.
4. It is easy to expand depending on the specifications of central hub/switch
5. Failure of hub/switch leads to failure of entire network
Tree Topology:
Tree topology is a combination of bus and star topologies. It is used to combine
multiple star topology networks. All the stars are connected together like a bus. This
bus-star hybrid approach supports future expandability of the network.
Characteristics of Tree topology:
1. It offers easy way of network expansion
2. Even if one network (star) fails, the other networks remain connected and working.
A network protocol is a set of rules for communication among networked
devices. Protocols generally includes rules of how and when a device can send
or receive the data, how is the sent data packaged, and how it reaches its
destination. There are a number of protocols defined for computer networks.
Here we discuss three of them - HTTP, TCP/IP, PPP.
HTTP (Hyper Text Transfer Protocol):
HTTP is used to transfer all files and other data (collectively called resources) from one
computer to another on the world wide web. When an HTTP client (a browser) sends a
request to an HTTP server (web server) , the server sends responses back to the client.
This transfer of requests and responses is done following HTTP protocol.
1.By getting someone's login information by casually watching what he/she is typing.
2.Reading the files on someone's computer in an unauthorized manner
3. Using some software's which keeps track of the activities and data being sent or
received on someone's computer.
Eavesdropping –
In context of network security Eavesdropping refers to unauthorized access to another
person's or organization's data while the data is on its way on the network.
This may be done in a number of ways:
1. By setting up parallel telephone lines.
2. By installing some software (spyware) in the target computer.
3. By installing some receiver which captures the data while on its way.
Login-Password:
By assigning login names and strong passwords to the users of a system, it can be
ensured that only authorized people access a computer. This helps in increasing the
computer as well as network security. A strong password is the one which is easy to
remember for the user but difficult (almost impossible) for the others to guess
successfully. On the other hand a weak password is generally the name of a person or
organization, the registration number of a vehicle, year of birth of a person and so on.
A weak password can be cracked in a few attempts.
Firewall:
A firewall is a hardware device or a software that is installed to monitor
the data entering the computer/Network or leaving it. A firewall permits
only that data to enter or leave a computer/Network for which
permissions have been granted by the computer/network administrator.