0% found this document useful (0 votes)
16 views128 pages

Network

Uploaded by

sahajram790140
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
16 views128 pages

Network

Uploaded by

sahajram790140
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 128

IT TOOLS & NETWORK BASICS:-

COMPUTER NETWORK:-
A group of computers which are
connected to each -other for the purpose
of sharing their resources is called
computer network.
Basic Terminologies of Computer
Networks:-

• Network: A network is a collection of


computers and devices that are connected
together to enable communication and data
exchange.
• Nodes: Nodes are devices that are connected
to a network. These can include computers,
Servers, Printers, Routers, Switches, and
other devices.
• Protocol: A protocol is a set of rules and
standards that govern how data is transmitted
over a network. Examples of protocols
include TCP/IP, HTTP, and FTP.

• Topology: Network topology refers to the


physical and logical arrangement of nodes on a
network. The common network topologies
include bus, star, ring, mesh, and tree.
• Types of Protocols:-
1*Transmission Control Protocol (TCP).
• Internet Protocol (IP).
• User Datagram Protocol (UDP).
• Post office Protocol (POP).
• Simple mail transport Protocol (SMTP).
• File Transfer Protocol (FTP).
• Hyper Text Transfer Protocol (HTTP).
• Hyper Text Transfer Protocol Secure (HTTPS).
*IP Address: An IP address is a unique
numerical identifier that is assigned to every
device on a network. IP addresses are used to
identify devices and enable communication
between them.

*DNS: The Domain Name System (DNS) is a


protocol that is used to translate human-
readable domain names (such as
www.google.com) into IP addresses that
computers can understand.
• Firewall: A firewall is a security device that is used
to monitor and control incoming and outgoing
network traffic. Firewalls are used to protect
networks from unauthorized access and other
security threats.
Characteristics of a computer
network:-
• Resource sharing.
• Communication speed .
• Backup.
• Reliability.
• s\w& H\W sharing .
• Security .
Types of Enterprise Computer
Networks:-
• LAN: A Local Area Network (LAN) is a
network that covers a small area, such as
an office or a home. LANs are typically
used to connect computers and other
devices within a building or a campus.
• WAN: A Wide Area Network (WAN) is a
network that covers a large geographic
area, such as a city, country, or even the
entire world. WANs are used to connect
LANs together and are typically used for
long-distance communication.
• MAN: A metropolitan area network (MAN) is
a computer network that is larger than a
single building local area network (LAN) but
is located in a single geographic area that is
smaller than a wide area network (WAN).
Network devices:-

• Hub.
• Switch.
• Router
• Repeater .
• Bridge.
• Gateway.
• Modem.
Hub :-
*Hub is a network device that is used to
connect multiple computer in the network.
*All the information send to the hub is
automatically send to each port to every
device.
*Hub is generally used to connect computer in
a LAN.
• Switch is a network device that connects
multiple computer together in the network .
• It is mainly used to send the the private
message as well as there is no wasting of data .

Router
• Router is a network device which works as a
traffic controller. A main work of router is to
choose a congestion free path through with
the data packet will travel.
• Router receive data packets to the sender,
analyze and forward those data packets then
giving to receiver.
• Repeater is a network device through which
we can “boostup the weak signals” when the
signal travels in the network after traveling
some distance the intensity of the signal
become low.
• In order to regenerate the weak signal we
should use repeater device.
Bridge :-

The bridge is a networking device in a computer


network that is used to connect multiple LANs to a
larger LAN. In computer networks, we have
multiple networking devices .
Advantage:-
1) By using bridge device we can extends
network.
2) Collision can be reduced easily.
3) It is more intelligent.
• Dis-advantage:-
1) It don’t stablish connection between two
different network.
2) it is more expensive.
• Gateway is a network device that is used to
connect two dissimilar type of network.
• It allow us to send & receive data through the
internet even it is LAN network.
• Advantage :-
1) It connects two network which has different
protocol.
2) We can not access the internet without a
gateway.
3) It provide some security.
• Dis-advantage:-
1)It is more expensive.
2)Data transmission rate is slow.
3)Difficult to maintain as well as very complex.
• Modem stands for “modulator &
demodulator” ,it is a network device that is
placed between the computer system and
telephone line.
• It has two part modulator & demodulator .
• Modulator convert digital signal to analog
signal were as demodulator convert analog to
digital signal.
• Note:- it allow us to computer to connect
internet.
Topology
• The physical arrangement of the
computer system node, which is
connected to each other via
communication medium is a called
topology.
Bus topology:-
• In Bus topology one long cable acts as a
single communication channel &all the
device are connected to this cable .
• It is a multi-point connection and a non-
robust topology because if the backbone
fails the topology crashes.
Advantage :-
1) Easy to add/remove nodes in a network.
2) Required only cable.
3) It is less expensive .
4) It is easy to maintain.
5) In case of any computer failure , there will be
no effect on other devices.
Dis-advantage:-
1) If cable is fail then the entire network will be
failed .
2) The massage are broadcast so, we can’t send
private messages.
3) The length of cable is limited.
Star topology:-
• In Star Topology, all the devices are connected
to a single hub through a cable. This hub is the
central node and all other nodes are connected
to the central node.
• The sharing of data is only possible through
hub.
Advantage :-
1) Easy to connect new nodes.
2) If one node failed, then it would not be
failure of entire network.
Dis-advantage:-
1) If two node want to share the data , sharing is
only possible through hub.
2) If hub is failed the entire network will be failed.
3) We can’t send private data.
Mesh topology:-

• In this topology each an every computer is


directly connected with each-other , so we can
directly send the data to the destination machine
without going to intermediate machine .
Advantages:-
1) It is very good topology to send the private
message.
2) All nodes are directly associated with
another node so, it provide point to point
connection.
3) Multiple device can send or receive data
same time.
Dis- advantages:-
1) It is very difficult to add some new node because each
on every computer directly connected with another
one.
2) If a particular machine not working then , we can’t
send or receive data from the failure machine .
Ring topology:-
• Ring topology is a network architecture in which
all the device are connected to each other in the
shape of ring . The structure of this topology is
like a ring .in this topology each device connects
with two other device and forms a circular path.
Advantages:-

1) It forms a strong network.


2) Each an every node can share data with another
node connected through a ring cable.
3) Transmission rate of data is very speed.
4) The data send through ring topology will be
broadcast.
Dis-advantage:-

1) It is very difficult task to add some new


computer.
2) If we want to send data from a source to
destination machine then data will un-
necessary passed to all nodes.
3) single point of failure, than means if a node
goes down entire network goes down.
4) We can’t send private messages.
Tree topology:-
• In this topology all the nodes are connected like
a branches of tree. The combination of Bus &
Star topology is called tree topology.
Advantage:-

1) Easy to add/remove a nodes in a network


2) Failure of a solo node will not disturb the other
nodes.
Dis-advantage:-
1) Difficulty in maintenance and configuration.
2) We can’t send private data.
3) If cable is fail then the entire network will be
failed .
Hybrid topology:-
• Hybrid topology is type of network topology
that is created by combining two or more
topologies together. In the other words,
“Hybrid topology is a network topology that is
made up to two or more topologies.
Network protocol:-

Protocol:-

protocol is a “set of rule” which are used in digital


communication to connect network device and
exchange information between them.
TCP/IP:-

TCP stands for transmission control protocol


where as IP stands for internet protocol.
TCP is used to transfer the data over the internet
,it divide the data into small packets and sends it
to the destination through the network.
IP is used for addressing through which a reaches
the final destination.
HTTP:-
HTTP is an application protocol that is used in the
address bar of the web browser we season
anything in the address bar of browser so it brings
that website in front of us.
FTP:-
FTP stands for file transfer protocol. It is used to
transfer the file from server to client machine.
It uses the TCP/IP protocol to enable data transfer.
SMTP:-
SMTP stands for “simple mail transfer protocol.it is
used to send and receive the email in the network .
There are two more protocol uses with SMTP
(pop & IMAP), all these protocols work with the
help of TCP/IP.
POP:-
POP stands for post office protocol.
It is a mail box which is actually a messege access
protocol through which a user can fetch the email
from the server.
IMAP :-
IMAP stands for internet mail access protocol.
It is also a mail box which is actually an
improvement version of POP.
By using IMPA the main advantage is we can
retrieve our deleted email the server.
UDP:-
UDP stands for user datagram protocol.
It is a connection less protocol .meaning when data
is transferred this protocol does not establish a
connection between the sender and the receiver.
In UDP the receiver does not acknowledgment for
receiving data and the sender for sending data.it
transfers data directly.
Transmission mode:-

Transmission mode means transferring of data


between two devices connected over a network.
It is also know as mode of communication.
There are three type of transmission mode :

1) Simplex
2) Half-duplex
3) Full duplex
Simplex:-
In this mode of communication, data can be sent
only one direction.
sender can only send the data, and the receiver can
only receive the data. The receiver cannot reply to
the sender.
Half- duplex:-
In this mode of communication a sender can send
the data as well as receives the data but not at the
same time.
It is a type of two-way directional communication
but restricted to only one at a time.
Full duplex mode:-
In this mode of communication the sender can
send as well as receive the data on the other hand
the receive can receive as well as send the data at
the same time.
INTERNET :-
INTERNET

INTERNET stands for Interconnected Network is a


network system that connects millions of web
servers.
INTERNET IS A NETWORK OF NETWORK THAT IS
USED TO INTERLINKED MANY DIFFERENT TYPE OF
COMPUTER ALL OVER THE WORLD.

“January 1, 1983 is considered the official birthday


of the internet .”
ADVANTAGES:-

1) Global connection through a virtual


communication .
2) E commerce.
3) Online education.
Dis- advantages:

1) Lose of personal information.


2) Spread of fake news.
3) Internet addiction and time wastage.
4) Physical and mental health issues .
www

www Stands for world wide web is also known as


the web,w3.
“The www was initiated by CERN (European library
for Nuclear Research ) in 1989.”
www can defined as the collection of different
websites around the world, containing different
information shared via local servers or computer
“ Tim Berners-Lee, the father of the World Wide
Web”
Website address:
• A web address is the location of a web page
on the Internet. Web addresses are officially
known as Uniform Resource Locators, or
URLs for short.
website :-

A website (also written as a web site) is a


collection of web pages and related content that
is identified by a common domain name and
published on at least one web server.
Static website:-

Static websites are small, limited in content,


and don't require frequent updates. They are
often used for: Resumes, Portfolios, Brochures,
Landing pages, Informational or read-only sites.
• Dynamic website:-
Dynamic websites are websites that use a
database to allow users to update or modify
content.
Dynamic websites are those websites that
changes the content or layout with every request
to the webserver. These websites have the
capability of producing different content for
different visitors from the same source code file.
Example:-
• E-commerce sites.
• Blogs.
• Calendars, or to-do sites.
• Any site with information that must be updated
regularly.
SERVER :-
Server is a main computer of any computer
network that fulfills the request of other
computers.
A server is a computer or system that provides
resources, data, services, or programs to other
computers, known as clients, over a network.
Advantages :-

1) backup.
2) security.
3) storage .
Types of server:-

1) File server
2) Application server .
3) Mail server.
4) Web server.
5) Database server.
URL:-
A URL (Uniform Resource Locator) is a unique
identifier used to locate a resource on the Internet.
It is also referred to as a web address. URLs consist
of multiple parts -- including a protocol and domain
name -- that tell a web browser how and where to
retrieve a resource.
Two types of URL:

1) Absolute URL.
2) Relative URL.
Absolute URL:-
Absolute URL is the full URL, including protocol
( http / https ), the optional subdomain (e.g.
www ), domain ( example.com ), and path
(which includes the directory and slug).
Absolute URLs provide all the available
information to find the location of a page.
Relative URL:
A relative URL is a URL that only includes the
path.
It is used to point to a file that is located in the
same folder and on the server as the
originating file and not use them to link to
pages on other domain names. An originating
file is the file that contains the link.
Internet Applications
• Sending and receiving email.
• Searching and browsing information
archives.
• Copying files between computers.
• Conducting financial transactions.
• Navigating (in your car, smart scooter,
smart bike, or other)
• Playing interactive games.
• Video and music streaming.
ISP:-
Internet service provider (ISP) is an organization
that provides services for accessing, using,
managing, or participating in the Internet. ISPs
can be organized in various forms, such as
commercial, community-owned, or otherwise
privately owned.
• Category of ISP:-

• 1) Tier 1:- for all over the world.


• 2) Tier 2:- Only for country.
• 3) Tier 3:- only for city .
HOW TO SELECT AN ISP:-

• Check The Provider's Availability.


• Both the Speed and the Bandwidth Reliability.
• Equipment Quality And Flexibility.
• Equitable Contract Terms.
• Availability Of Customer Support.

• Internet Gateway is a network connecting


device/appliance that can be used to connect
two devices in two different networks
implementing different networking protocols
and overall network architecture.
IP ADDRESS ? FULL EXPLANATION

• An Internet Protocol address (IP address) is a


numerical label such as 192.0.2.1 that is
connected to a computer network that uses the
Internet Protocol for communication.
• IP addresses are written and displayed in
human-readable notations, such as 192.0.2.1 in
IPv4, and 2001:db8:0:1234:0:567:8:1 in IPv6.
• which is seperated by dot(.)
IPV4

IPV4 defines a 32-bit number space. The


maximum number of unique host to
4,294,967,296 that provides more than four
billion (4 billion) address.
Network part:-

The first part of an internet address identifies if


the network number field has been referred to
as the network prefix because it is the first
portion of each IP address identifies the
network number.
• Host part:-
the second part identifies the on a given
network . All hosts on given network share the
same networks prefix but must have a unique
host number.
IP address and classes :-

1)Class A address. (0 to 126)


2)Class B address.( 128 to 191)
3)Class C address.(192 to 223)
4)Class D address.(224 to 239)
5)Class E address.(240 to 255)
Class A address :-
class A address is used for very large networks.
In class A, the highest order bit of the first octet
is always set to 0 and the remaining 7 bits
determine network ID .
CLASS A 0 to 126 (125.255.29.17)
Class B address:-
• Class B IP address is an IP address used for
networks that are medium to large in size.
Class B makes it possible to have 16,384
networks because the network ID is made up
of the first two octets..
class B :-128 to 191 (191.23.28.144)
• class c address-
• Class C IP address is an IP address used in
relatively modest local area networks or LANs.
Small businesses and household networks
typically utilize Class C addresses. By reserving
the first three octets of the address space for
the network ID, Class C can support nearly 2
million networks.
IPV6
IPV6 STANDS FOR INTERNET PROTOCOL VERSION
6, IPV6 defines a 128 bit number space.
The maximum number of unique host to
340 TRILLION that provides more address.
MAC:-

THE FULL NAME OF MAC IS “MEDIA ACCESS


CONTROL” MAC ADDRESS IS ALSO CALLED PHYSICAL
ADDRESS AND HARDWARE ADDRESS .
THIS IS UNIQUE AND PERMANENT ADDRESS FOR ALL
ELECTRONIC AND NETWORKING DEVICES.
MAC address format :-

1) MM:MM:MM:SS:SS:SS
2) MM-MM-MM-SS-SS-SS
3) MMM.MMM.SS.SS.SS
NIC :-
A Network Interface Card (NIC), also known as
an Ethernet Card or Network Adapter, is a
computer expansion card that allows your PC,
laptop, or server to connect to a network via an
ethernet cable.
IMEI:-
The full form of IMEI is the International Mobile
Equipment Identity. The IMEI number is a special
series of 15 to17 digits used for identification on
Global System for Mobile communication (GSM)
phones. Any telecommunications firm’s SIM card is
connected to the customer and can be transferred
from one phone to another, so it is a necessary
method for keeping aware of the hardware itself.
IMEI is a code or a number used over such a mobile
network that identifies a particular cell phone. It is
typically printed on the back end of the mobile
battery.
WEB BROWSER :-
• A software application used to access
information on the World Wide Web is called a
Web Browser. When a user requests some
information, the web browser fetches the data
from a web server and then displays the webpage
on the user’s screen.
• It is also important to know in detail about what
a web browser is for candidates preparing for
Government exams. This is because Computer
Knowledge is a common topic for many
competitive exams and questions based on web
browsers may be asked.
• Application
• Presentation (encoding,encrypted)
• Session (transmission data continues )
• Transport (segment)
• Network (packet)
• Data link (frame )
• Physical (bits)
• OSI stands for Open System Interconnection is a
reference model that describes how information from
a software application in one computer moves
through a physical medium to the software
application in another computer.
• OSI consists of seven layers, and each layer performs a
particular network function.
• OSI model was developed by the International
Organization for Standardization (ISO) in 1984, and it
is now considered as an architectural model for the
inter-computer communications.
• OSI model divides the whole task into seven smaller
and manageable tasks. Each layer is assigned a
particular task.
• Each layer is self-contained, so that task assigned to
each layer can be performed independently.
• An application layer serves as a window for users
and application processes to access network
service.
• It handles issues such as network transparency,
resource allocation, etc.
• An application layer is not an application, but it
performs the application layer functions.
• This layer provides the network services to the
end-users.
• A Presentation layer is mainly concerned with
the syntax and semantics of the information
exchanged between the two systems.
• It acts as a data translator for a network.
• This layer is a part of the operating system that
converts the data from one presentation format
to another format.
• The Presentation layer is also known as the
syntax layer.
• It is a layer 3 in the OSI model.
• The Session layer is used to establish, maintain
and synchronizes the interaction between
communicating devices.
• Functions of Session layer:
• Synchronization: Session layer adds some
checkpoints when transmitting the data in a
sequence. If some error occurs in the middle of
the transmission of data, then the transmission
will take place again from the checkpoint. This
process is known as Synchronization and
recovery.
• The Transport layer is a Layer 4 ensures that
messages are transmitted in the order in which
they are sent and there is no duplication of data.
• The main responsibility of the transport layer is to
transfer the data completely.
• It receives the data from the upper layer and
converts them into smaller units known as
segments.
• This layer can be termed as an end-to-end layer
as it provides a point-to-point connection
between source and destination to deliver the
data reliably.
It is a layer that manages device addressing, tracks
the location of devices on the network.
• It determines the best path to move data from
source to the destination based on the network
conditions, the priority of service, and other
factors.
• The Data link layer is responsible for routing and
forwarding the packets.
• The protocols used to route the network traffic
are known as Network layer protocols.
• This layer is responsible for the error-free
transfer of data frames.
• It defines the format of the data on the network.
• It provides a reliable and efficient
communication between two or more devices.
• It is mainly responsible for the unique
identification of each device that resides on a
local network.
• The main functionality of the physical layer is to
transmit the individual bits from one node to
another node.
• It is the lowest layer of the OSI model.
• It establishes, maintains and deactivates the
physical connection.
• It specifies the mechanical, electrical and
procedural network interface specifications.
Network architecture:

Computer Network Architecture is defined as the


physical and logical design of the software,
hardware, protocols, and media of the transmission
of data. Simply we can say that how computers are
organized and how tasks are allocated to the
computer.
Peer-to-Peer network:-

• Peer-To-Peer network is a network in which all


the computers are linked together with equal
privilege and responsibilities for processing the
data.
• Peer-To-Peer network is useful for small
environments, usually up to 10 computers.
• Peer-To-Peer network has no dedicated server.
• Special permissions are assigned to each
computer for sharing the resources.
Advantages Of Peer-To-Peer Network:
• It is less costly as it does not contain any dedicated
server.
• If one computer stops working but, other computers
will not stop working.
• It is easy to set up and maintain as each computer
manages itself.
Disadvantages Of Peer-To-Peer Network:
• In the case of Peer-To-Peer network, it does not
contain the centralized system . Therefore, it cannot
back up the data as the data is different in different
locations.
• It has a security issue as the device is managed itself.
• Client/Server network is a network model designed for
the end users called clients, to access the resources such
as songs, video, etc. from a central computer known as
Server.

• The central controller is known as a server while all other


computers in the network are called clients.

• A server performs all the major operations such as


security and network management.

• All the clients communicate with each other through a


server.
• For example, if client1 wants to send some data to client
2, then it first sends the request to the server for the
permission. The server sends the response to the client 1
to initiate its communication with the client 2.
Advantages Of Client/Server network:

• A Client/Server network contains the centralized system.


Therefore we can back up the data easily.
• A Client/Server network has a dedicated server that
improves the overall performance of the whole system.
• Security is better in Client/Server network as a single
server administers the shared resources.
• It also increases the speed of the sharing resources.

Disadvantages Of Client/Server network:

• Client/Server network is expensive as it requires the


server with large memory.
• A server has a Network Operating System(NOS) to
provide the resources to the clients, but the cost of NOS
is very high.
Guided media and Unguided media :-

Guided media:-

Guided media uses a physical path or conductor to


transmit the signals.
It provides direction to signal for travelling .
Signal transmission speed is generally faster.

EX:- TWISTED PAIR CABLE ,COAXIAL CABLE &


OPLICAL FIBRE
Unguided (wireless):-
Where as the unguided media broadcast the signal
through the air.
It does not provide any direction.
Signal transmission speed is generally slower than
guided media .

Ex:- radio wave, microwave, & infrared signals .

You might also like