Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
17 views
24 pages
CH 5. Networking
Rudiments of Computer Science Class 12 WBCHSE Board Chapter: 5 Network - 5
Uploaded by
debjitdutta556
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Ch 5. Networking For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
0 ratings
0% found this document useful (0 votes)
17 views
24 pages
CH 5. Networking
Rudiments of Computer Science Class 12 WBCHSE Board Chapter: 5 Network - 5
Uploaded by
debjitdutta556
AI-enhanced title
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Ch 5. Networking For Later
Share
0%
0% found this document useful, undefined
0%
, undefined
Print
Embed
Report
Download
Save Ch 5. Networking For Later
You are on page 1
/ 24
Search
Fullscreen
Rudiments of Computer Sclence Cera N Oey a anna iat and Wide Area Networ | was created by the US. Air Force nthe ats 19508 t interconnect ‘esi th Ser ‘Automatic Ground Environment (SAGE) radar defence system. == = comeces TW Wr neework is spread over a city or a town, itis [fj {Wisner ) | ARPANET anne iow asa Metropolitan Area Network or MAN. Its |S 2\Whatapecticinocoes ae vatdina} | the wor st a network which is spread over an area which is larger than a Healsovnn 7] success packet Local Area Network butsmaleihn heuacoverebyaWide |_LSecessseatson {| | tater Area Network. It can include several buildings to an entire city, —_— — ofan organisation in city to share the epional resources, ttle ke FD (Fe isi ig teri) or ATM Ancona Tra | [Het Mode) to conmest several component LANs tgeter to form 8 MAN. As aule, MAN does not || Rew aN belong to any particular organisation. A network service provider generally owns the communication || Whar anetwr i links of a MAN. send overs yor town, ts known 28. AMAN handles daa efficiently like a LAN while a the same time | | atetropoitan Area saves the cost related to a WAN, Speeds of up to 1 Gbps can be Network Ris rer achieved in a MAN. The eable television network is an example than a LANBut ofa MAN. sale than WAN ERIE wa In addition to the existing LAN technologies, another technology emerged during the 1960s and 70s which connected networks over large geographical areas. This new, long distance technology is called a WAN. When computers and other network devices are connected over a large geographic area like a city, ‘country, continent or the whole globe, it is known as a Wide Area Network or WAN. ‘As shown in the diagram, a WAN can be formed by ‘connecting several LANs using special purpose devices like routers and gateways. Once the WAN has been set up, network switching technologies are used along with proper communi protocols to establish communication between the connected networks, General Characteristics of a Wide Area Network: en + Operation: Each LAN when connected to the WAN can usually communicate with any other | °* WAN eles Pn enc OS yaar creas wae eee P2541 59Difference biw LAN and WAN, like T1 lines provides a bandwidth of up to Ls Part2: Chapter 5 + Bandwidth: A WAN uses broadband transmission mode. However, long distances reduce the bandwidth of a WAN. to several Mbps only (1.844 Mbps for TI link, 44.184 Mbps for T3 link). Sharing: A computer at one site ean be connected 0 a ‘computer at another site via a WAN and can access data from that computer. This data sharing ability forms the basis ofthe Internet Cost: Cost of setting up a WAN is higher compared to a LAN as it requires more planning, ‘more hardware (like routers) and leasing long distance transmission lines. + Protocols Used: Different protocols used in a WAN include X.25, ATM, TCP/IP, FTP ete. + Example: The Intemet Differences between LAN and WAN ea Nena Doe neuas 1. The area covered by a LAN is small, usually covering an office space, factory, or a campus. 1. The area covered by a WAN Is large, usually covering cities, countries, or continents. LLANs usually use baseband transmission. | 2, WANS use broadband transmission. ata transmission rates re higher than WAN. | 3. Data transmission rates are lower than LAN. A LAN has bandwidth in the order of 10-100 | 4. A WAN has bandwidth in the order of several Mbps. Mbps only (eg 44.184 Mbps for a T3 Link). Data wansmission errors are more due w longer distances. Data transmission errors are less due to shorter distances. 6. Cost of setting up @ LAN is usually low as | 6 Cost of setting up a WAN is high as it requires ‘compared toa WAN, ‘more hardware and long-distance transmission 7, Ethernet and Token Ring form two important |7. Different protocols used in a WAN include LAN protocols, | __ various protocols under TCP/P protocol suite 8, The Internet is an example ofa WAN. 8._A school network isan example ofa LAN. EMTS keno ‘Temporary and shs ble communication links can be set up so that all computers connected over long distances can communicate with each other within a reasonable cost. Depending upon the ‘method used, digital communication ean be of the following types: . Leased cireuit networks: Here permanent lines are used for communication ». Switched Network Services: These can be further classified into: * Circuit switched networks: Here temporary links are established for communication + Message switched networks: This is a store and forward type data communication ‘= Packet switched networks: Here data is transmitted in the form of data packets | + Leased Line Services: Dedicated Lented Line Leased lines are permanent point-to-point links between ase two oF more points and are suitable for building WANS. A leased line connection doesnot passthrough the switching system ofthe telephone exchange and ‘can operate using both analogue and digital communication channels, Digital communication lines 14 Mbps whereas T3 lines works at about 45 Mbps. P25-2 60‘Rudiments of Computer Sclonce Motropotan Area and Wide Area Networks Advantage: + These lines are always *O) ~ thus providing o full-time dedicated connection ‘As the carrier's circuits are dedicated to the customer even when they are not in use, lensed lines are more expensive than switched network connections. + Cast of implementation of dedicate lines is also higher, a cables need toe laid out + Switched Network Services: When you post a leter, it zoes from your home to the local post office, from there t the recipient post office and from there Finally tothe recipient, Ina similar manner, when data is transmitted from fone computer network to another, it travels through intermediate rhodes before being delivered to the recipient network. Such a network is called a switched communication network and these intermediate nodes are called switching devises which mainly consist of switehes and routers, + Circuit Switched Networks: In this ype, temporary eireult is set up using electro:mechanieal switches during the time of communication. The circuit link is maintained until the communication session is over. Usually telephone companies ote | tse such a network for continuous voice. communication
| art: chapters Disadvantage: + As there is no upper limit to the data block size, the routers atthe switching stations mus, hhave sufficient physical storage disks to store the data on its way. + A large data block can also keep engaged a particular link between two switching offices fora long time, delaying communication, + Packet Switched Networks: This technology is normally suitable for text and data signals. In this scheme, the data to be transmitted is first broken down into smaller units called packets, where each packet contains a part of the whole data and the sender and receiver addresses. Each packet is then independently sent over the best possible route to the destination. At the destination computer, the received packets are again assembled together to get back the original data ‘The diagram shows how the data is broken down into five different packets marked 1 10 5 ang sent over different paths through different routers from the source S to the destination D, Advantage: 1 Sie deaharoge arose + In case there is a fault in a particular route then only the | 2 Wratepacetswtcrng? 3 data packets trough that route may be lost, which can then | 3 Gwe Zabigs foe oy, be re-transmitted 4. Give 2 atartges pace + More than two stations can use the same channel | swiheg "°° TPO 2 simultaneously using multiplexing method ee Disadvanta, 6. Ghot dtrences between eat idvantage: ching apa sweneg ‘Since the same communication channel is shared by several ‘tations simultaneously, network traffic ean cause a delay in data transmission + A station cannot utilise the full bandwidth of a channel as itis shared by other stations Differences between Leased Lines and Switched Lines Sere forthe dura 2. Cost of implementation is low 3. Multiple users share communication media | ble ifnetwork is not loaded to capacity ally '._ Cheap per unit of time if used extensively Differences between ‘Switching and Packet Switching CIT IT Teaporary creat ls se wp and tulnaned| |. Invomaton teamuet i on bree aber dorm ti feo conmnieton, data packets dough tren avalos BE Wink ibs fx de boven te oder wl] Does ot fen’ any elses tercelte before tacanaton ar. Tranny ont lew eed 5. Teint be wasnidis tanita] 3 Te information tobe waned is ker dma tesedauon at sven i smater ons eed packets. TA poinnpaiatphyseal comnetion e]A Dat pokes wansmiedbareeon sane a Iaumined baa sated dena" | _deinddon ogi sae ‘5. Only two stations can use the communication] 5. Several stations can use the same communication channel atthe same time.uciments of Computer Science Metropolitan Area and Wide Area Networks CS Panrn + Dial-up Lines and MODEM ‘The telephone company provides two types of telephone lines to serve as a media to connect LANS. | yopey The first one is a Leased Line, as discussed earlier. The second type is a Dial-up Line, It is a communication link connected to the public telephone network and used along with a MODEM (refer diagram). In such a communication when a telephone number is dialled, the computers in the telephone-exchange route the call and setup temporary connection between the source and end computers. The connection is maintained until the signal transfer is over. The word MODEM stands for MOduiator-DEModulator. It is a device used for dial-up communication using ‘computers and the local telephone lines ‘The data transmitted by a computer is digital in nature. [= 7 yaasemoE 7 However, the local loop of the telephone company ean carry only |€B 2Wactu'emawoose 1 analogue signal. Hence, before transmission, a modem converts |} frunewennactssooe, 2 | The word MODEM the digital signal from digital form to analogue form. This conmecion eee process is called modulation. On reaching the destination, another | § Ss Wo dexsenmpesctusgad 2 modem converts the analogue signal back to digital form, |, arcie 2 || DEModultr tise 3 eves used for dal ‘up communication using computers andthe eel telephone lines We ne tent SO before the computer accepts it. This process is called de- | 7 Waeasnon nit on SON modulation. Each modem functions as a full duplex device, both | ® Nhsicoyoy nan ty Bars haat SN 2 receiving and transmitting signals through them, MODEMS are available as External and Internal modems. External modems are connected to the computer through external ports and have their own power supplies. On the other hand, internal | = ‘modems are available as add-on cards for PCI slots on the motherboard. 4 j1som ‘Advantages: Nisan atl + Diak-up lines are shared with other subscribers tothe public telephone network. Accordingly, | | hop seve tat these lines are much less expensive 10 use leone + As these connections use a standard modem, the hardware cost are minimal reocreamer car rm oie, dt, auto 8 ees | | video at 128 Kbps + Dial-up connections are very slow compared to other connection types. reenter + Dial-up connections transfer data over an analogue line so before the data is sent it has to be | | ces wing existing converted from digital to analogue and reconverted again atthe receiving end, This affets the || tephone network connection speed. + ISDN: Integrated Services Digital Network y ISDN is an all-digital dial-up service that uses standard telephone lines to simultaneously carry | 1SON high quality voice, data, audio and video transmissions at 128KDbps across long distances using the existing telephone network ‘The basic form of ISDN uses three channels of data over a single communication line. Out of these two 64-Kbps full duplex channels called Bearer channels or B-channels are used for carrying cither voice or data, These two B-channelscan also be combined to form a single 128-Kbps channel P25-5 63Op TCPIP model & WAN Protocols {CPAP Protocls TCPIPis the name given toa family of | communication protocols to organise computers from diferent | networks into 2 single logical network o TCPIIP model & WAN Protocols Part 2: Chapter 5 There is another single 16-Kbps full duplex Data channel or [q+ ihwidoyateanby 50 owen D-channel used as a control channel for setting up connections. |Q son? 2 is TA wh Hence, together itis also called a 28+D service S Soe trucrmope cesta! A Network Termination Unit (NTU) is used to connect the | + Whatdeyey neanby he TCP proeasut?| telephone company’s line to the customer premises. For mon- | —5,How many ayers are ter fhe NN devices a Terminal Adapter (TA) or ISDN modem is TCPIP reference made? ted to dvcly conte! he neeenng SEN tne withneneisbN | Sheebeien Tone Spam aes ‘Advantages of ISDX + ISDN can transfer data wo time faster than 286 Kbps modem ‘ISDN uses digital signal hich ses vulerableCo noise than an analogue signal + ISDN offers thee separate channels, 28 chants and 1D channel * Voice, au, vide and data can be pased simultaneously through an ISDN line ERR ene eee + The TCPIIP Protocol suite | TCPIP is the name given to a family of ‘communication protocols developed in the 1970-80s by the U.S. Department of Defence to organise computers from different networks into a single logical network. The protocols, collectively called the Internet Protocol Suite, presently form the most important set of | WAN protocols. Since TCP and IP are the most important and best-known protocols in this protocol suite, the whole family of Intemet protocols are commonly called the TCP/IP protocols. Data Transfer Between Computers Ina TCPIP Network clap aes sla TT + TOPIIP Reference Model The TCP/IP reference model was developed during the 1970s with the aim to interconnect different types of computers over different types of transmission media and to connect computers through some alternate paths, The ‘model was also developed to support different technologies that had emerged over the years and the ability to carry different types of data like text, audio, video, etc. at various speeds. The TCPIP protocol suite comprises of different protocols arranged in four layers (sce diagratn ‘on right), The layers ate Application, Transport, Intemet, and Network Interface Layer. Each layer is responsible for some aspect of the overall communication effort. The processed ‘output of one layer becomes the input data for the next layer, till the last layer 2-5-6 64Rudiments of Computer Sclence Metropolitan As Conceply& particular layer inthe source machine can be (APT HasTaaeeaROR ‘thought to be in direct communication with the same layer in ‘fhe TCPAP rterence model? oa the destination machine irrespective of the intermediate layers, | _ 2 Slslv wo nto on Ropleton though in reality the acl pial communion usally | 3 S"areratrae 2 traverses the intermediate ayers as shown in he fas pe Sheteletnd ten © The TCP/IP model is actually a truncated version of the OSI aatnte poet 7 ‘model and is considered to be @ 4layered model with each layer | *N&TEssepen he ot ey wo ite Tsai 2 sharing a different responsibility in the overall communication | — 6 Stew hain Pont Lye between two computers in a network. It i used as a reference [__ abe Torr raw 7 * Layers in TCP/IP Model | 2 Itfomsthe wer interac beteen he wera he computer netork. apps per ». It consists of applications and protocols using which end-users interact with the network. ee ise Caeemcigio ee ce cooey * File Transfer Protocol (FTP): Used for interactive file transfer between hosts. andthe computer Simple Mail Transfer Protocol SMTP); Used for uasfr of emai messages aoe « HTTP: Used to transfer web pages of the World Wide Web. | | HTTP, Telnet, SMTP * DNS: To getthe IF nas for de lphnumere dans ee of server URL 4 Thislayer helps o establish a communication link betwesn the communicating nodes | Tranapor Layer b. It divides the data received from the Application layer into segments or packets. a € Tepes hn aranetinse tie patewetow | met © TRS ut Feowledgement and error contrl schemes ofecover iter omup da | (beter . Ithandesprotocas tke: [rena and maintains reliably in cata rane using protocols ike TCP = Transmission Control Protocol (TCP): It is used to provide a connection-oriented, reliable data transfer service that can be used for any data size. User Datagram Protocol (UDP): It is used to provide a connectionless, unreliable data transfer service and is suitable for small data size. 2, Internet Layer (Network Layer): This isthe layer ofthe TCP/IP model. The functions are: | <_ly 4. This layer adds the source and destination IP address o each data packet received from the | internet Layer Transport layer and forms the IP datagrams, b Ithelps to determine a path for the data to the destination and delivers the data following that path. A hardware device called a router does the routing of data packets. el lata travel independently to the destination using a best effort, See ieee dmever does ot guaran he waster oda | tithe 2nd layer and els to determine the path for data vanster uring communics tin, eth the help of IPadsrsses. delivery scheme, However, 4. Ithandles protocols like: = Internet Protocol (IP): It is used to determine the network path and transfer data through different routers from the source node to the end node, P25-7 65i Network Interface Layer Part2: Chapters ‘+ Address Resolution Protocol (ARP): The transfer of data from source to destination network usually takes place though various intermediate networks and uses the IP ia sano Baas) Pesos Proce 2 2 hai te Uncen ce ene adds ofthe outers todecine he pa However te | ioe” 3 final data delivery takes place using the actual physical |‘ YebeestmmdtoMe 4 address of the node that has the destination IP address. | Paras tere TMP oe 2 AARP is used to get the physical adress of’ node (ike | anew igen} MAC adres ofthe NIU) fora given I address. i iasesann eee + The RARPor Reverse Address Resolution Protocol does the reverse job of getting the IP address fora given physical or MAC address of anode, + Internet Controt Message Protocol (ICMP): It is used by network devices like routers to send error and other messages generated by events lke unsuecessful delivery of IP packets, + Internet Group Management Protocol (IGMP): A data sent o a single multicast address in an IP network can be distributed to an entire group of recipients. IGMP is responsible forthe management of such IP multicast groups ina network. | 1. Network Interface Layer (or Link Layer): This is the lowest ie, the I" layer of the TCP/IP ‘model. The functions of this layer are 4. Its used to physically connect the computer via the network interface unit (NIU) to the extemal network transmission media. b. Itdeals with transmitting the data to, and receiving the data from the external medium. «. Concemed with signalling characteristis of the network (electrical, optical, wireless ete.) 44. The protocols inthis layer include + LAN protocols like Ethernet and Token Ring: These are used to ensure data transfer within @ LAN and use the MAC address ofthe concerned nodes forthe data transfer. + WAN protocols like X.25, Frame Relay, ATM: These protocols are connection-oriented protocols used for packet switched networks to transfer data over a WAN, Ses Since long distances are involved in delivering data across a WAN, the protocols involved in ‘maintaining the communication are also different from that in a LAN. As long distances demand ‘more reliability in data transfer, reliability features are stronger in WAN than in LAN protocols + X.25 Protocol: It is a connection-oriented service that was developed in the 1970s asa global standard protocol fora packet-switching network. It defines how communication devives route data over a WAN that uses the Public Switched Telephone Network. + Frame Relay: Iti also a connection-oriented service and a replacement o the X.25 technology for transmitting data packets over a WAN. It was originally designed during the 80°s for use ovet ISDN lines. It provides higher performance and greater efficiency than X.25 + Asynchronous Transfer Mode (ATM): It is a connection-oriented, high-speed, broadband data transmission service based on packet switching. Telecom companies use it to cary dl voice, and video over a single channel. ATM encodes data into small fixed sized packets called cells having 48 bytes of data and § bytes of control and routing information in the header * Point-to-Point Protocol (PPP): Itis primarily used to establish a direet connection between 0 nodes ina computer network. Its commonly used by ISPs to establish a Digital Subseriber Live (DSL) Internet connection with customers. Using PPP, data packets are delivered in order. i 4 fall duplex connection from the source tothe destination. The point-to-point link also ens that the data packets flow straight from the user's computer tothe ISP's router 2-6-8 68Rasdment of Computer Science Metropolitan Area and Wide Area Networks + Transmission Control Protocol a Transmission Control Protocol or TCP was invented to guarantee data delivery by using | transmission acknowledgment schemes. With the help of IP. it ensures thatthe data is delivered properly Control Protocol ror) TCP first creates link or session between the host and the destination nodes. The data is then transmitted in packets, with cach packet given a sequence number. At tbe receiving node, TCP | -~—@— sends an acknowledgment tothe source node for the sequence number received. Incase a data | | TcP packet gets lost on its way. the end node does not send an acknowledgement for that packet. TCP on | | The petals wed ‘he source computer monitors this and retransmits the lost data packet again. | terest a session | setren tani In case 2 router falls the packets are sent through other routers. This result in different packets | szriving at different times a the destination. TCP checks the incoming packets and arranges them | back in order based on the sequence number. Network hardware failure may also result in uplication of data packets. This results in multiple copies of datagrams arriving atthe destination TCP automatically detects duplicate data packets and accepts only the first copy of the data. Advantages of using TCP: + Guarantees delivery of data packets across the network ‘Ensures data reaches destination in time ‘Ensures data is not duplicated TwereteaaTe 1 LimeseomecTo 2 i Sue mossmmpecteng TO? 2 {Sec taemmape ergo | iimerewenaiae GWewemoteaonle 2 2 2 Disadvantages of using TCP: 7 Sano soc ng UEP. ‘+ Data acknowledgement schemes makes it slower than UDP | i wressuicsge * Canmot be used for broadcast and multicast connections | {2 Yes sutrmeme. i Wecraupe + User Datagram Protocol (UDP) | & UDP is a reduced version of TCP. tis used in situations where the reliability overhead of TCP ‘ot required. Applications like steaming multimedia can tolerate some dats loss and hence can | Ser Datagram ‘se UDP slong with IP to deliver data. For example, a viewer may not detect a lost packet in video ‘seam when doing video-conferencing. UDP does not use data acknowledgement schemes. Hence, it does not insert sequence numbers | | Y2P cor keep wack ofthe data packets. These are expected wo artve in sequence or they are dropped. | |¥itariced | Heoce. w maximise dats transfer UDP makes 1 communication channel between the | |"euena ‘communicating computers before transmission begins. oer te velbity Advantages of using UDP: _overead of TOP 8 = Much faster tham TCP as it does not have the reliability overhead of TCP cee + More suitable for streaming multimedia applications and small data size [personas ‘© Canbe used for broadcast and multicast addresses [schemes Disadvantages of using UDP: + Does not guarantee data delivery = ‘+ Data may not be delivered on time TT + Internet Protocol (IP) ‘The Internet Protocol (IP) was developed mainly for use in the Internet for addressing and transporting data packets bowen compuerson a TCP/IP network. Any two computers in which IPs mould! can communicate with each other independent of other interconnecting hardware. e ‘switching network, a data packet that follows the IP specifications is called an IP Ce PRES OFT pare an ener pr thar onan he source and dination P| oy Satcors IP csc best effort delivery to deliver these datagrams. I doesnot provide any special | \ roe protcol features to recover lost or corrupt data packets The recovery is handled by TCP. Hy 72.59 67| | VolP & File Transfer Protocol FTP) Ris a clen-server- based protocal used | to acess fies | stores in tare | FIP servers | connected tothe | eteret. works slong with TCP to ‘malian relly in data vanster _— (eae mca ce, lars eareem {xeon imei aes ar & Hyper Text ‘Transfer Protocol (HTTP) 12: Chapter 5 Is a connectiontess protocol ic. it is not required to set up a connection between the source and the end node before data transmission begins. Its main function is to transport data packets from source node to the next router connected to a network closer tothe final destination node. As seen in the diagram, the data packet iis forwarded from source S to end node Evia the routers Ri, Re, and Ry. Voice over Internet Protocol (VoIP), is a technology that allows a user to make voice calls or make ‘multimedia sessions over an IP network, instead of using a regular (or analog) phone line. Advantages of using * Helps to find the optimal route for a data packet from source to destination node Makes communication across computer networks independent of interconnecting hardware = Transforms a collection of networks like the Internet to a seamless communication system * File Transfer Protocol (FTP) FIP Server FTP Client | eTP is a elentserverased Application Layer Pre rom protocol uted to acces fils stoned tn diferent FIP 2 Servers connected tthe Internet FTP works lng With ‘TCP for maintaining reliability in data transfer. Seemed te | Toimznetwithan FT? snr thle compat hast fist log into the server. The wera te | browse truth the le econ nd owafeadluploa the speci is, During communis FP epes to crmestons ist ope a Conte conesonf nd convo ial ad tes Opens atn onnecion ase e's ata | There are two different modes of file transfer. By default, FTP uses ASCII mode to download text Ts Todovnlnd guy au, ideo exeubleor ber non tent eth Binary made sed FTP can we eer secured ote wit gin name and pasrword for secured data transferor tnonymous mode wih edeed incom all the general able oases les as goes | Advantages of using FTP: nT lows wns of map les and rector Ifa file download gets interrupted midway due to some reason, FTP downloads the remaining of the file only, when the connection is resumed. FTP can be used to automatically transfer files at specific times to help in data backup. Disadvantages of using FTP: * Generally, requires a login name and password to access an FTP site + A-new session is required for each file transfer. Ths slows down multiple file transfer. + User may need to remember various commands to work with FTP downloads. + Hyper Text Transfer Protocol (HTTP) 1 Wt alton oT? 8 Wt ashore on HTTP HTTP, which first appeared in 1990, is another clientserver-based Application Layer protocol used for data transfer. A Web browser software acts as a client to download files from a WeD server. HTTP works along with TCP for maintaining reliability in communication To access any Web sit, the Web browser using HTTP makes a direct connection with the Web server. The Web server in tur transfers the required file to the Web browser using HTTP. It allows the client and the server to maintain the connection untit all objects on a page are transferred ‘After the transfer is completed, HTTP terminates the connection. 2-5-10 68Rudiments of Computer Science Motropottan Area and Wide Area Networks HTTP does not use any encryption, and requests and rower responses are visible to anyone between the Web Paoee a communicating servers. HTTP comections can be fj secured using the transport layer protocol Secure iirtPoctrrs a 2 2 ITP Serer Chonttner Advantages of using HTTP: [gq aaieumaan a] + Can be used to transfer large volumes of data 1 Sin ceterne an TP? || + Multiple transfers can be made using a single connection. | * rpms TP) * Pipelining allows user to ask for the next transfer before | _¢ Sve Ztiees sien HTTP ont ending the previous one. ster be ule Hl Sinise raeentena 3 Disadvantages of using HTT! 5 Gin nce Toe 2 + HTTP uses large packet headers containing additional information like metadata * Information sent over HTTP is not enerypted and can pose security problems. ferences between HTTP and HTTPS 1, Itisan unsecured protocol 1. Htisa seeured protocol | 2. Itsends data over port 80 2. teuses p to send data | 3, _Itoperates atthe application layer 3. Toperates atthe transport layer | 4. Itdoes not have any encryption 44. The data is enerypted before sending Differences between FTP and HTTP 1, Used to download/upload files to FTP server | 1. Used to download fils from Web server 2. Most FTP servers require the user to log on to |2. There is no such requirement for transfering the server in order to transfer files Ses from a Web server using HTTP. 3._ FIP can transfer data both as ASCH or binary |3. HTTP always transfers data as binary data 4. FIP can be used on « command line interface, | 4. The browser Is the most common software for a graphical client software, o browser using HTTP 3. FTP has to create anew seston, one foreach | 5 A client can mania a sage connexion a new data transfer Server and we that fr mull transfers + TELNET Zl Tye Telnet is a client-server protocol in the Application Layer. 54" _Glent Ivallows users to login and run programs on a remote E24 SL computer in @ network. It allows a user to connect to Remote = fnother computer and access its data and programs, as if Computer Computer the user's keyboard and display unit are attached directly tothe remote computer. ‘The user needs TCP/IP and a Telnet client program (like Tera Term, PUTTY etc.) o connect toa remote computer. Once connection is made, the local application connects the user's display and. keyboard to the remote computer. The user can then interact with the remote computer directly Information entered by the user at the Telnet client computer is processed at the remote computer ‘and the output returned to the client. When the user finishes work and logs out of the remote ‘computer, control ofthe keyboard and display are again returned tothe local computer. Advantages of using Telnet: * [allows users at one site to interact with applications that run on a computer at another site [tis a cent server bated Transport | Layer protocol used for fle wanser ina secured manner ‘ing encryption & Difference biw HTTP and HTTPS a Difference biw FTP and HTTP P2514 69art 2: Chapter 5 ‘+ One can fix problems in a computer from a remote computer using Telnet. 7 Gaia estan ang Taha 2 vis raters tteen + Remote computers can be monitored using Telnet. Disadvantages of using Teinet: ‘ont A ssn Pastons Telnet is not secure as everything is sen in plaintext. beter emer + Working on a computer through Telnet is slow. Differences between FTP and TELNET User ean login to an FTP server and upload or | 1. User can login toa TELNET server and int download any type of file swith programs on the remote TELNET server, 2 While using FTP, most processes run on the user's computer. 2, While using TELNET the majority of processe, run on the remote host computer. 3. Using FTP, the user merely uploads! downloads files from the FTP server hard disk. 3. The user's keyboard and display get attached directly to the remote computer using Telne 4 FTP cannot be used to control remote servers, 4. An administrator can use TELNET to have ‘ts that part of an | | network tis unique fora given network. ‘access and control a remote server. ers ‘+ The IP Addressing Scheme ‘Any device that uses TCP/IP needs at Jeast one unique IP address for each connection. An IP address is a 32-bit binary number divided into 4 octets with eight bits per octet. The assignment and maintenance of IP addressing is maintained by InterNIC. As it is difficult to remember a 32-bit binary number, for convenience the address is writen by converting each octet to decimal, An example ofan IP address and the corresponding decimal representation is given below. 0101000 nn 4 4 4 (x). ae). ao). AS) tess in deci As an octet consists of 8 binary digits, each octet in an IP address can have a value from 0 to 255, Before a computer uses this address, it converts it to binary. An IP address consists of 2 parts as a. The Network ID: It is that part of an IP address which is shared by all devices in a network. It is unique for the entire network and identifies a particular network. b. The Host ID: Each device within @ given network has a unique host ID. tis that part of the IP address which separates different devices with the same Network ID icc. in the same network ‘The above diagram shows two different networks connected by a router. We find that all computers in Network-I have the same network ID ic. 25, while all computers in the Network-2 have the sat network ID i.e. 27. To distinguish between the different computers in Network-1 having the coma network ID 25, different host IDs like 0.0.1, 0.0.2, 0.0.3 are given to each of them, Thus, in the full IP address 25.0.0.2, the first octet here i.e. 25 represents the network ID. Its common tall computers in Network-1. Last 3 octets ic. 0.0.2 form the host ID fora given compult only. Combination of network ID and host ID forms a unique address of a computer in a netwott 25.0.0.2 1900000 op0i0r0 1 Adress ary Different Host IDs, ferent Host Oe P2-5-12Rudiments of Computer Science Metropolitan Area and Wide Area Networks ‘The Different Classes of Addressing: The following are the traditional modes of addressing using IP addresses. All addresses are divided {nto certain Classes depending on the distribution of the network ID and the host ID. (oss as B [Newark Newor Hos. Haat —| oat] Te [cuss ¢— [Network Network Network; Har] 10 [108 33] 2097150 [cs DE [Spec Asses andre ovale rconaling Thus, it can be seen thatthe address classes specify which octet of [fy 7 Novete atwenasesd® 7 the IP address isthe network ID and which pat isthe host 1D. It |} 2 wets Aang? 2 also specifies the number of hosts supported by each class iWsnersteay 2 + Class A Address: Any IP address that starts with a °0° in | *Wihencisst ates fare | binary in the first bit of the first octet is a Class A address, (6. Which clans of IP aséresves has te The first octet epresents the network IDandthe last} octets | hemes? represent the host ID. Thus, a Class A address is of the form | Viteassdae tetoug P| | (where each x can be a 0 oF I) Dates omcntt 230082? Qexexnry . vauxvcnnxxvanany. vsannsay | Maceo stSThO Qexexuny « Survxany -uneanaen uexeeay a ‘Network ID weno i.e» includes the range of addresses 1.0.0.0 to 126.255.255.255 in dotted decimal form. A total of 126 Class-A type networks exist. Each such network can accommodate a total of | about 16.7 million host computers in a network. Such addresses are generally used by ‘multinational companies with very large networks. = Class B Address: Any IP address that starts with a‘10" in binary in the frst 2 bits ofthe first, ‘octet is @ Class B address. The first 2 octets represent the network ID and the last 2 octets represent the host ID. Thus, a Class B address is ofthe form (where each x ean be a 0 of |) JOxwxxex . crEEKaAy . saxsaay. LasxAry CESEE REE SEEREEES rete aearanas Network Hosti0 ic, includes the range of addresses 1280.0. to 191.285.255.255 in dotted desimal form A total of 16,384 Class-B type networks exist. Each such network can accommodate a total of about 65,534 host computers ina network, Such addresses are generally used by ISPs. + Clase C Address: Any addres tht starts with 4110" in binary in the fst 3 its ofthe fis | octet isa Class C address The first 3 octets represent the network ID andthe last octet ‘Epresents the bos ID. Thus, a Class Cares i ofthe frm (where each can be 0 or 1) etl esto ies includes the range of adresses 192.0.0.0 to 228.255.258.255 in ded decimal form, ‘Atotal of about 2 millon Class-C type networks exist. Each such network can have a toa 2S5a het computers Such adresses re generally wed by small or midsized compe. these addresses are used for Multicast addressing i.., addressing a group Class D Address: ‘of Inermet addresses and start with 1110 inthe first octet It includes the range of addresses | | epenmens! 224,0,0.0 to 239.255.255.255 in doted decimal form. [sa + Class E Address: These addresses are experimental addresses and reserved for future use. 1P | |‘Mureune addresses in this clas ranges fom 240.0.0.0 to 255.255.255.254 Pissersetny-9 —eee Pc TF | HE ETH 725-13 ” & Classes of iP addresses, | addres that [sats with 0 as | rt ofthe ist | octets a Cass & address. Fistoctet | Network nee 2 octets Hot | cuss Ades Padaress that |stats wah 110 25 [frst 3s ofthe rst |ectets a Class ¢ | dare First octets Network, |lastectet Host. | Tess adresses are— | | + Internet Protocol version-6 (Pv) Addressing: | Internet Protocol version 4, generally referred to as IPv4, was | the intemet grew, with today’s smartphones and IoT (Internet of | Things) devices, it quickly ran out of addresses. | intemet Protocot version 6, or IPV6, was first introduced in the late 1990s as a replacement for IP4, when it could no longer support the load. At present, {Pv coexists on the internet with IPv6, ‘though eventually, everything will use IPV6. In addition to increasing the range of IP addresses, TPvg ey 224.0.0.0 10 239.255.255.255 Seo 192,0.0.x t0 223,255.255.x Pv ps tis a replacement forlPvt as an | adressing scheme |forcomputers connected tothe lintemet Risa 128] also has better security features. Jit adsres divided pee IPV6 uses 128-bit addresses, allowing for theoretically a very large number of addresses. IPv6 addresses are represented as eight groups of four hexadecimal digits, with the groups being separated by colons. An example of such an address is 2002:0de6:0001 0042-0100:8c20:0370:7234. Difference between IPv4 and IPv6 separated by colons a mE 'Pv4.and'Pv6 || 2. itis numeric address separated by periods | 2. Itis alphanumeric address separated by colons [Wists secure an 16 3 is more secure tha IPv4 | [4 Teases ARP (Address Resolution roweal | 4 Ituses NDP (Neighbour Discovery Protocol) © | |< map MAC addresses map MAC adéreses 5 Offers five classes of P Addess (Class AoE) | 5. Offers an uallmited numberof I addresses ‘+ Domain Name System (DNS) It can be difficult to remember the IP address of a computer. To overcome this problem, alphanumeric names called domain names are used in place of IP addresses to communicate with ‘computers. Each domain name corresponds to a particular IP address. The Domain Name System ‘or DNS was invented during 1983-84 for the Internet and maintained by InterNIC. It is used for Biving specific names called domain names to computers corresponding to particular IP addresses. A special computer called a domain name server is used to translate an alphanumeric domain name (like www:googlecom) 10 its | corresponding IP address before using it ‘A. domain name normally has. the following parts * Root Domain; At the top of the hierarchical structure of the domain name system isthe Root Domain which is represented by a dot (.) ‘+ Top Level Domain: Below the Root Domain are situated the TLDs or Top- Level Domains. This is the rightmost part of a domain name. There are two types of TLD extensions. These are: species | the purpose and | country of oii, 72ema Metropolitan Area and Wide Area Networks Generie: This type usually indicates the purpose of an organisation. Some of these include: om [0 | For commerei ‘edu | For educational organisations, net | For ntemet Service Providers gov | For government organisations org | For ther non-profit organisations | mil | For military organisations (US mainly) | biz | For busines organisations ib [For ibary sites —] Country: These are used to specify the country where the sever is located, Some ofthese include: ia Forindia ‘ca | For Canada ‘ap __| For Nepal ] ‘au For Australia ‘de_| For Germany nz | For New Zealand | fr | ForFrance Ik _| For Hong Kon plc] For Pakistan ] es_| For Spain ip | For Japan ru_| For Russia tuk_| For the United Kingdom [tk —[ For Si Lanka en For China ] * Second-Level Domain: This is the middle section of a domain name and indicates a unique ‘name for an organisation. Different organisations with same top-level domains are distinguished by their second level domain names. For example google.com and onge.com are both commercial | ‘organisations but differ from each other by their second level domain names google and onge + Third-Level Domain: To identify closely related divisions of an organization another word called a third-level domain or « sub-domain may be added at the very beginning of a domain name. Example sales.onge.com, www.yahoo.com etc. However, tis is fully optional How DNS works: ‘Computers can work with IP addresses only. Hence, to access a computer in a network using domain names, first the domain name needs to be translated to the corresponding IP address. To do that, the application program contacts the DNS server and sends a request to translate the domain name ‘The DNS server contains a list ofall computer names along with their IP addresses. The server looks up the answer in its list and returns the correct IP address tothe application. The application program finally connects to the desired computer using the IP address received ftom the DNS server. Differences between IP and DN: aries Pena 1, Itisa numeric address 1. Itis an alphanumerie addres. S-No translation ofthe aro svequed Weta [2 Needs tobe ransnted oh consenting P tose Mares before 3._Dicult to remember such numeric addresses. | 3. I is easy to remember such an addres 4. Example 192,168.20.8 4. Example www.google.com ‘© Uniform Resource Locator (URL) | To access a particular file or Web-site on the Intemet, one has to know the IP address or the domain ame of the server where the file resides. Apart from this, the fle path and the protocol used to tet the file also needs to be given. The general form of such a process is given below: name: // domain_name_of server / path_of file protoc | ‘The complete information having file retrieval protocol, domain name ofthe server on which the fle resides and the file path is called the Uniform Resource Locator or URL of th fle. When a tise enters the URL ofa Website int the browser the browser extracts the domain name from the URL and connects tothe server. The retrieval scheme is used to retrieve the file from the given path ‘The most commonly used URLs one encounters are when using the World Wide Web (WWW). To understand the different parts of a URL, let us use the example of the URL of a web page as given | inthe next page: - 20 73 ao Second Level | Domain | este mia section ofa domain name andiniates ‘unigue name for an omanisaton a Difference biw IP Address and Domain Name & Uniform Resource Locator (URL) at isthe complete information wih fie retreal protocol, | domain name of the [server on wtih the |i esaop Virtual Private Network (VPN) Part 2: Chapter § ttp/yww.ShopOnline.comy/index. html, hi hetpsitqwr ind The Trnser Protocol Comainname ofserver Patho Flato Open The above address gives the full information a browser or any other application needs to access file on the web site www. ShopOnline.com. * The first partic. httpr// indicates the protocol used for the communication. Web browsers use Hypertext Transfer Protocol or http to connect to and exchange information with Web servers. It can be other protocols like https, ftp, telnet etc. ‘The next part je. www.ShopOnline.com indicates the domain name of the server or the Web site to access. The application will connect to this server and get the required information ‘The part after domain name indicates the path of the file to access is index.html. It shows the default web file to open is “index.html”, which is located under the root directory of the server. ‘With HTTP servers if the file or path is not given, the server returns the default index file which 's generally the "index.html", "homepage html”, "home_htm!", or the "weleome.html” file. | | + Virtual Private Network (VPN) A virtual private network of VPN allows a user to create a secure connection to another network over the Internet. In doing so, it protects the user's identity and browsing activity from hackers and other unwanted people. ‘When one signs up with a VPN provider, the user first logs into that service before connecting to the internet. Once connected, others can't see the user’s activity. The VPN provider will encrypt the user data, so that hackers, government agencies, and other businesses can't see what websites are visited, messages sent, social media sites used, or files downloaded. This keeps others from spying ‘on a user's online activity eee) ‘© When computers and other network devices are connected over city, country, continent or the whole globe, itis known as a Wide Ar + Long distances and use of leased lines usually reduces the bandwidth of a WAN and makes it slower than a LAN. Thus a WAN has bandwidth likel.544 Mbps fora TI digital WAN link to 44.184 Mbps for a T3 digital WAN link + Different protocols used in a WAN include X.25, ATM, TCP/IP, FTP ete. + Leased lines are permanent point-to-point lis between two ot more points. A leased line connection does not pass through the switching system of the telephone exchange and are always "ON" + In Circuit Switched Networks a fixed ciruit is set up during the time of communication and the | circuit is maintained till the communication session is over + In Packet Switched Networks the information is transmitted in the form of discrete data packets. The information that needs to be transite is fst broken down into smaller units called packets + Dial-up Line is any tclecommunication link that is used along with a modem. It is connected tothe public telephone network and uses circuit switching technology to connect the two lncations ‘+ ISDN is aal digital dial-up service that uses standard telephone lines rather than dedicated digital ies to simultaneously carry high quality voice, data, audio and video transmissions at 128Klbps across lon distances using the existing telephone network + Basic Rate Interface (BRI) ISDN uses 3 channels of data over a single communication line. Its also referred (0 as a 2B+D service. There are two 64-Kilobit full duplex Bearer channels OF Bechannels used for carrying either voice or data and another single 16-Kbps full duplex Dstt ‘channel or D-channel. Its 1 control channel for setting up the connector ——————————— P2-5-16 14aan ae Metropolitan Aren and Wide Area Networks * Primary Rate Interface (PRI) ISDN is usually designated as a 23B+D service. This supports up to 23 BE Cumelo( 64 Kips cochent resin ae + AMODEM is «device that swe te convert dg dat to analogue one and vice verso communication through the local telephone lines. The word MODEM stands for MOdulator- DiMaduatar Le thee devices arcane sone ot mans wget gual 6 malgue femal (mdulation) and snsoges teed ieee + Tein Point Protea (FP comist ofaseto ptclht at edd rarsmison nr ‘valerie Eni te Seat Line eras Paden tithe wa dts se wrk, The PP roto ste was devtape tanec cor ie eb nat SP + x2sisa pachetsvtching proton standard twa devdaped nthe 197s 8 goal standard pratt ora pockecoeeinnsernd + Frame rely technology isa packecsching sevice nd react the le X25 ehology for WAN links. " : a sa " + Asynchronous Traaser Mode or ATM is a bighapesd, bresdbandsrenminion date csmmericaton techonogy bund sa ail a pein et tctanogy anche by tclocoettealation pesto cary Sa rb snd a tn + TCPMP nthe name given oa amy of a conmreaton pcs sued apne compari heterogenous netwerks «sgl opl neva aunt rscoleensoeelcdae ne Pooiaoe + The TCPMP reference model was developed daring the 1970 with the sim to interconnect lead pis at eaxpuecr rer amet tanec sca tear ns emcee tGrooghootesbaruni phn ie ane Seen ame eben +The TCPMP rte st = deyred dl wi caer sai eet reebiliyand il ea ibace aelal St coneseiatie tas ase Turco Preccl (yes sreer pe prc adr coped ly res a Inrae mt Soareaey talteriag pocees aaa ceoae bees vente tare pelle the ret Searane Lott coupe shad comnts wi enor | vert ke he ert | IY er bi nk a pct tn fey een sled Dera > iP doo oo guavas ley of ta Te eerie tr problem the gv anapercayr | Pesase cama iaetaedee Cosel eats Tes ees eeeastoeavenaat oa by using acknowledgment schemes «Scena ne TOF ee ennpr ayer proce laity a esteing tr nt inde Sites web towers FTP Teneo «UDP cteedsevion cTCF het wort We exebmeta wih IF best er caer serves ee apa et reper bal tbat etd rae ete stent Tras andbencecn te UDF rong uf Savers = aolannee dares TOPAT nou oat or wir ade Brecher The des is a 32 bit binary number divided into 4 octets with eight bits per octet like Foust soyo11s 1011001000101 Dest WUAMaiaa aes cence a seme pee etwork or pyle spent dana re newak ora py vgmen browse Ho ID. tp of Bach a ve a aonb wk nv cane Neyo Fe Reta antec her Basa eratccm Neen) Aa re tata anh a3 one rpreet he oa conse een nas m brary inte fs 2s of eft ons Ca es fay des ht a ec ID athe ois oer he He D co nace ee vent inary Inthe feo 3 Ula of anit ott a Cas C Ayn sry in 1 nuh ft fh i i is ce eee we taantenng kg fon om stom arte overs emp network |__Ofthese FTP is among the earliest and mostefficientone 0 P2517 75| Part 2: Chapter § les, change directories et. from + There are two different modes of FTP file transfer. For downloading text files one has t0 select the ASCII option. For downloading graphics, audio, video, executable or any other non-text file one has || select Binary mode | | + Using FTP; fies can be queued up for upload and download purpose + During FTP file transfer ifa file download gets interrupted midway due to some reason, then FTP wit, ‘download the remaining ofthe file only, when the connection is resumed + One can make a program use FTP to automatically transfer files at specific times during a day + Uploading a single file using FTP is much easier than using HTTP ‘+ HTTP is another file transfer protocol, which has essentially replaced FTP's command based interface for file transfer, with a more user-friendly point-and-click graphical interface, that supports hyperlinks ‘+ HTTP isa client-server protocol inthe application layer of the TCP/IP model that supports hypermedia ‘+ Using HTTP, web browser software acts asa client to download HTML files from the Web server HTTP does not use any encryption and requests and responses are visible to anyone between the communicating servers ‘+ HTTPS or HTTP Secure is a better secure version to transfer files over the Internet + TELNET (or TELetype NETwork) protocol permits users to login and run programs on a remote computer over the Internet ‘Telnet allows a user to remotely connect to another computer and access it, as if the use keyboard and display unit are attached directly to the remote computer ‘Information entered by the user atthe Telnet client computer is processed atthe remote computer and | the output retumed to the client. When the user finishes work and logs out of the remote computer, | control of the keyboard and display are again retumed to the local computer +A remote login service like Telnet allows a user at one ste o interact with application programs that run on a computer at another + Onecan problems in a computer fom a remote computer using Tenet + DNS or Domain Name System was invented for the Internet and maintained by the InterNIC. It isa hierarchical distributed database system used for translating domain names to IP addresses, | | + domain name is an alphanumeric name of computer in a ntwork with each name coreesponding o ‘unique I address. On the Intret & computer can have more than one domain names but only one address + Atte top ofthe hierarchical structure ofthe domai represented by a dot () + Below the Root Domain are situated Top Level Domains Thi is the rightmost part ofa domain name Examples include com, edu ore, i,k te | + The Second-Level Domain isthe middle section of «domain name and indicates unique name | for the organisation. Different organisations with same top-level domains are distinguished BY their second evel domain names + To identity closely related divisions of an organization another wor called a third-level domino ¢ sub-domain may be added at the very begining ofa domi name + To access a particular file or Web-site on the Internet, one has to know the IP address or the domain name of the server on which the file resides. Apart from the domain nasa teo other things need tobe specified These are the path ofthe filet acces and the scheme or proteca sed torretreve the file + The complete information containing the ile revival scheme, domain name of server on which the le resides andthe file path, is called the Uniform Resource Locator or the URL of te leo ta Wee ste + Voice over Internet Protocol (VoIP), is technology that allows auserto make voice calls or make multimedia sessions over an IP network, instead af wsinga regular (or analog) plane ing | +A virual private network of VPN allows @ user to create a secure connection to another network Ov" the Intemet. In doing so, it protects the identity and browsing activity from hackers and other people to P2-6-18 76
You might also like
Communication & Network Concept
PDF
No ratings yet
Communication & Network Concept
96 pages
Computer Networks
PDF
No ratings yet
Computer Networks
35 pages
Networking in Computer Science Notes For Advanced Level
PDF
No ratings yet
Networking in Computer Science Notes For Advanced Level
78 pages
Networking 2020-21 Part 1
PDF
No ratings yet
Networking 2020-21 Part 1
87 pages
PLC - Industrial Communication Network
PDF
No ratings yet
PLC - Industrial Communication Network
38 pages
Msword&rendition 1
PDF
No ratings yet
Msword&rendition 1
27 pages
Ch-01 Introduction To Computer Networks
PDF
No ratings yet
Ch-01 Introduction To Computer Networks
44 pages
Network System: Benefits of Computer System
PDF
No ratings yet
Network System: Benefits of Computer System
25 pages
Complete Networking
PDF
No ratings yet
Complete Networking
50 pages
Assignment Answer
PDF
No ratings yet
Assignment Answer
8 pages
Application and Implication
PDF
No ratings yet
Application and Implication
53 pages
Computer Networks
PDF
No ratings yet
Computer Networks
143 pages
Networks
PDF
No ratings yet
Networks
15 pages
CH NETWORKING
PDF
No ratings yet
CH NETWORKING
70 pages
Data Communication &network: 2.2. Data Topologies 2.3. Data Switching 2.4. Types of Networking
PDF
No ratings yet
Data Communication &network: 2.2. Data Topologies 2.3. Data Switching 2.4. Types of Networking
13 pages
1.1 MCN (18ec2t20)
PDF
No ratings yet
1.1 MCN (18ec2t20)
85 pages
H002 Computer Networks
PDF
No ratings yet
H002 Computer Networks
62 pages
SYN CH - 1 and 2
PDF
No ratings yet
SYN CH - 1 and 2
20 pages
Notes nETWORKING
PDF
No ratings yet
Notes nETWORKING
18 pages
Engg Utilities 1 - Group 6
PDF
No ratings yet
Engg Utilities 1 - Group 6
20 pages
Networking
PDF
No ratings yet
Networking
11 pages
Unit IV Data Communication and Computer Network
PDF
No ratings yet
Unit IV Data Communication and Computer Network
15 pages
PowerPoint Merge
PDF
No ratings yet
PowerPoint Merge
124 pages
Updated Networking Notes
PDF
No ratings yet
Updated Networking Notes
28 pages
Networking & Multimedia (PART-1)
PDF
No ratings yet
Networking & Multimedia (PART-1)
24 pages
010.1 Networking 2020-21 Part 1
PDF
No ratings yet
010.1 Networking 2020-21 Part 1
74 pages
Computer Networks - Lecture Notes
PDF
88% (17)
Computer Networks - Lecture Notes
42 pages
UNIT 5 Basics of Networking
PDF
No ratings yet
UNIT 5 Basics of Networking
73 pages
Acmp 101 Ass 4
PDF
No ratings yet
Acmp 101 Ass 4
10 pages
Computer Networks Updated 2024
PDF
No ratings yet
Computer Networks Updated 2024
25 pages
Transmission Media - Network Devices and Web Technologies
PDF
No ratings yet
Transmission Media - Network Devices and Web Technologies
31 pages
CSC 413
PDF
No ratings yet
CSC 413
27 pages
Unit 7
PDF
No ratings yet
Unit 7
18 pages
3-Evolution of Data Networks-05-01-2024
PDF
No ratings yet
3-Evolution of Data Networks-05-01-2024
89 pages
FINAL IP Study Material
PDF
No ratings yet
FINAL IP Study Material
79 pages
FINAL IP Study Material
PDF
No ratings yet
FINAL IP Study Material
79 pages
Fundamental Characteristics of Data Communication: Chapter # 1
PDF
No ratings yet
Fundamental Characteristics of Data Communication: Chapter # 1
8 pages
Data Communication, Networks and The Internet
PDF
No ratings yet
Data Communication, Networks and The Internet
45 pages
Data Science Unit 3
PDF
No ratings yet
Data Science Unit 3
14 pages
Reviewer
PDF
No ratings yet
Reviewer
6 pages
Data Communication - Networks
PDF
No ratings yet
Data Communication - Networks
10 pages
Switching
PDF
No ratings yet
Switching
44 pages
Chapter 9 Network Fundamentals
PDF
No ratings yet
Chapter 9 Network Fundamentals
18 pages
G12C8CS
PDF
No ratings yet
G12C8CS
9 pages
Computer Networks Notes 2
PDF
No ratings yet
Computer Networks Notes 2
12 pages
Telecommunications and The Internet
PDF
No ratings yet
Telecommunications and The Internet
29 pages
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
PDF
100% (1)
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
20 pages
Computer Networks and Communications
PDF
No ratings yet
Computer Networks and Communications
60 pages
Data Communications
PDF
No ratings yet
Data Communications
12 pages
Chapter 3
PDF
No ratings yet
Chapter 3
10 pages
Class 10 Computer Notes
PDF
No ratings yet
Class 10 Computer Notes
163 pages
Class 10 Computer Solved 1-3
PDF
No ratings yet
Class 10 Computer Solved 1-3
45 pages
Unit-5: Communication Technologies: Network
PDF
No ratings yet
Unit-5: Communication Technologies: Network
14 pages
ITE I Networking Fundamentals
PDF
No ratings yet
ITE I Networking Fundamentals
64 pages
Class 10 Computer Solved 4-7
PDF
No ratings yet
Class 10 Computer Solved 4-7
56 pages
Networking
PDF
No ratings yet
Networking
15 pages
CH 1. Networking
PDF
No ratings yet
CH 1. Networking
20 pages
Class 10 Mathematics Specimen
PDF
No ratings yet
Class 10 Mathematics Specimen
11 pages
CH 7. HTML
PDF
No ratings yet
CH 7. HTML
30 pages
CH 6. Networking
PDF
No ratings yet
CH 6. Networking
22 pages
CH 2. Networking
PDF
No ratings yet
CH 2. Networking
14 pages
Class 10 Computer Specimen
PDF
No ratings yet
Class 10 Computer Specimen
15 pages
CH 3. Networking
PDF
No ratings yet
CH 3. Networking
12 pages
CH 4. Networking
PDF
No ratings yet
CH 4. Networking
12 pages