Networking Concepts1
Networking Concepts1
Network protocols
Protocol: A set of rules and procedures that determines how a computer system
receives and transmits data.
TCP/IP Model:
The TCP/IP model uses four layers to perform
the functions of the seven-layer OSI model.
1. Layer 1 – Network Access Layer:
The lowest layer of the TCP/IP protocol
hierarchy.
It defines how to use the network to
transmit an IP data.
It encompasses the functions of physical
and data link layer of OSI reference model.
THE INTERNET
It is an interconnection of large and small networks around the globe.
It was evolved from the first network ARPANET.
INTERSPACE:
Interspace is a client/server software program that allows multiple users to
communicate online with real-time audio, video and text chat in dynamic 3D
environments.
Interspace provides the most advanced form of communication available on the
Internet today.
Nodes (Workstations)
The term nodes refer to the computer that are attached to a network and are
seeking to share the resources of the network.
Server
It is a high speed computer system controls all the computers connected to the
network.
There are two types of server.
1.Non-dedicated server 2. Dedicated server
Non-dedicated Server
It is used in small networks
It acts as a server and client
Slower and need more memory
Networks using non dedicated server are called as peer to peer networks
Example : windows NT, advanced 2000 servers etc
Dedicated Server
It is used in large networks and it works as a server only.
It helps the workstations to access data, software and hardware resources
Networks using dedicated server are called as master slave networks.
Example : File server , printer server etc
Types of network:
A computer network means a group of networked components, i.e., computers
are linked by means of a communication system.
There are three types of network.
Local Area Network (LAN)
Wide Area Network (WAN)
Metropolitan Area Network (MAN)
Mesh Topology
In this topology, each node is connected with all
other computers.
The mesh topology is excellent for long distance
networking because Communication is possible
between any two nodes on the network either
directly or by passing through.
Graph Topology
In this topology, nodes are connected together in an arbitrary fashion.
A link may or may not connect two or more nodes, there may be multiple
links also and It is not necessary that all the nodes are connected.
Transmission medium
It is a path way that carries the information from sender to receiver.
We use different types of cables to transmit data.
Data is transmitted normally through electrical or electromagnetic signals.
Transmission media is also called communication channel.
Coaxial Cables
It transmits high-frequency electrical signals through conductors without
interference. Used for cable television, LANs etc
The two most commonly used types of coaxial cables are Thicknet and Thinnet.
(i) Thicknet: This is thicker and the length is upto 500 meters long.
(ii) Thinnet: This is thinner and the length is185 meters.
Optical Fibers
Fiber optic cabling consists of a center glass core
surrounded by several layers of protective materials.
It transmits light rather than electric signals.
Radio Wave
The transmission making use of radio frequencies is termed as radio-wave
transmission. Any radio setup has two parts:
The transmitter
The receiver
The transmitter takes some sort of message, encodes it onto a sine wave and
transmits it with radio waves. The receiver receives the radio waves and
decodes the message from the sine wave it receives. Both the transmitter and
receiver use antennas to radiate and capture the radio signal.
Advantages
Provide mobility
Inexpensive.
It proves cheaper than digging trenches for laying cables.
Free from land acquisition rights.
Disadvantages
It is an insecure communication.
Susceptible to weather effects like rains, thunder storms etc
Unguided media
Infrared
This type of transmission uses infrared light to send the data.
The infrared light transmits data through the air and can propagate
throughout a room (bouncing off surfaces), but will not penetrate walls.
The infrared transmission has become common in PDAs (Personal digital
assistants) e.g., hand held devices like palm pilots etc.
The infrared transmission is considered to be a secure one.
Laser
It is unidirectional like microwave, but has much higher speed than
microwaves.
The laser transmission requires the use of a laser transmitter and a photo-
sensitive receiver at each end.
Packet Switching
Here a message is broken into small parts called packets.
Each packet is tagged with appropriate source and destination addresses.
A sequences number is added to fragmented packets and when it reaches
the destination the packets are de-fragmented by sequence number.
Communication Modes
It means transferring of data between two devices. These modes direct the
direction of flow of information.
There are 3 types of communication mode. They are
1. Simplex
2. Half –duplex
3. Full-duplex
Simplex:
In simplex mode the communication can take place in one direction.
The receiver receives the signal from the transmitting device.
In this mode the flow of information is uni-directional.
Ex: Radio, TV etc
Half –duplex:
In half-duplex mode the communication channel id used in both
directions, but only in one direction at a time.
Thus a half-duplex line can alternately send and receive data.
Ex: walkie-talkies, sub marine, aviation etc
Full-duplex
In full duplex the communication channel is used in both directions at the
same time.
Ex: Telephone line
2.Hub
It is device used to connect several computers together(Generally used in star
topology).
There are two types of hubs
1. Active hubs: It regenerates the incoming signals before sending the data on
to its destination.
2. Passive hubs: It pass the signals without any change.
3.Switch: It is device which provides connection between workstations, servers
and peripherals through cables.
5.Bridge:It is a device used to connect two networks of the same type( eg: LAN to
LAN) and it transmits the data to the correct destination.
GSM:
GSM is short for Global System for Mobile communications, which is
one of the leading digital cellular systems.
The GSM standard for digital cell phones was established in Europe in the
mid 1908s.
GSM uses narrowband TDMA, which allows eight simultaneous calls on
the same radio frequency.
TDMA is short for Time Division Multiple Access, a technology for
delivering digital wireless service using time-division multiplexing (TDM).
TDMA:
Time Division Multiple Access.
TDMA works by dividing a radio frequency into time slots and then
allocating slots to, multiple calls. In this way, a single frequency can
support multiple, simultaneous data channels.
SIM card:
The SIM - Subscriber Identity Module - is a chip card; the size of a first
class postage stamp.
A SIM is a computer chip that gives a cellular device its unique phone
number.
It has memory (16 to 64 KB), processor and the ability to interact with the
user.
CDMA:
CDMA is short for Code-Division Multiple Access, a digital cellular
technology that uses spread-spectrum techniques.
CDMA is a form of spread spectrum, which simply means that data is sent
in small pieces over a number of the discrete frequencies available for use
at any time in the specified range.
WLL
Wireless in Local Loop (WLL or WiLL),
It is meant to serve subscribers at homes or offices.
In WLL services, the telephone provided is expected to be as good as wired
phone.
Its voice quality must be high - a subscriber carrying out long conversation
must not be irritated with quality; one must be able, to use speakerphones,
cordless phones and parallel phones.
GPRS
GPRS stands for General Packet Radio Service.
GPRS is used for wireless communication using a mobile device.
With the service you can access the internet, send emails and large data,
download games and watch movies.
Applications in networking
1. SMS
2. Chat
3. Video conferencing
4. Wi-Fi
5. Wi –Fi Hotspot
6. Wimax
Wi-Fi(wireless fidelity)
It connect to the internet without a direct line from PC to ISP(internet service
provider).
It used radio signals.
Wi-Fi Hotspots
It is a place that offers Wi-Fi access. The public can use a laptop, WI-FI phone or
other suitable portable devices to access the internet through a WI-FI hotspot.
Network security
It is the method of protecting the computer and information it contains from
unauthorized access, modification, damage or destruction.
Protection methods
1.Authorization
2.Authentication
3.Encrypted smart cards
4.Biometric systems
5.Firewalls
Cookies : Cookies are messages that a web server transmits to a web browser
so that the web server can keep track of the user’s activity on a specific web site.
Cookies have few parameters name, value, expiration date.
Or
Cookies are small files which are stored on a user’s computer.
Cyber Law: It is a generic term, which refers to all the legal and regulatory
aspects of internet and the World Wide Web.
India’s IT Act:
In India the cyber laws are contained in the IT Act 2000. Aims to provide legal
infrastructure for e-commerce in India by governing transactions through
internet and other electronic medium.
Some viruses are categorized as harmless pranks, while others are far more
malicious. Broadly three types of viruses are:
1. File Infectors – These types of viruses either infect executable files or attach
themselves to a program file and create duplicate files.
2. Boot Sector Viruses – Install themselves on the beginning tracks of a hard
drive or the Master Boot Record
3. Macro Viruses – Infect data files like electronic spreadsheets or databases
of several software packages.
4. Network Viruses – These virus use protocols and commands of computer
network to spread themselves on the network. Generally they use email
or any data transfer files to spread themselves on the network.
Some of the antivirus are Kaspersky , Quick heal, K7, Norton 360, Micro trend
titanium, AVG, Panda, ESET Nod32, Avast.McAFee etc.,