Part - Ii
Part - Ii
Modulation techniques
• Modulation is a process of changing the characteristics of the carrier wave by
super imposing the message signal on a high frequency signal.
• The waves from electromagnetic spectrum, like radiowave and microwave etc
used to carry data or messages.
Major types of Modulation
1. Amplitude Modulation: The amplitude of a wave is its maximum disturbance
from its undistributed position. It is measured in the form of the height of the
wave.
2. Frequency Modulation: The frequency of a wave is the number of waves
produced by a source, per second. It is measured as the number of waves that
pass a certain point in one second.
Collison in Wireless Networks
• A network collision occurs when two or more devices attempt to
transmit data over a network at the same time.
• For example, if two computers on an Ethernet network send data at
the same moment, the data will "collide" and not finish transmitting.
Transmission Modes in Computer Networks
• Full-duplex mode is used when communication in both direction is
required all the time means sending and receiving takes place
simultaneously. CSMA/CD (Carrier Sense Multiple Access/ Collison
Detection Protocol is used in Full Duplex mode.
http://encycle.msn.com/getinfo/styles.asp
Type of server
Path of the file styles.asp
Components of a URL
• ftp
• gopher
• http
IP address
• An Internet Protocol address (IP address) is a numerical label
assigned to each device connected to a computer network that uses
the Internet Protocol for communication. An IP address serves two
main functions: host or network interface identification and location
addressing.
Internet Protocol Versions
• IPv4 : Separated by Dots : x.x.x.x (4 segments)
• IPv6: Separated by Colons: y:y:y:y:y:y:y:y (8 segments)
• IPv6 (Dual): Combine: y:y:y:y:y:y.x.x.x.x
The Domain Name and DNS
• The domain name system (DNS) is a naming database in which
internet domain names are located and translated into internet
protocol (IP) addresses.
• The domain name system maps the name people use to locate a
website to the IP address that a computer uses to locate a website.
• It is a hierarchical and decentralized naming system for computers,
services, or other resources connected to the Internet or a private
network.
• It associates various information with domain names assigned to each
of the participating entities
How does Domain Name Resolution works?
• The Domain Name System (DNS) is the phonebook of the
Internet. Humans access information online through domain
names, like nytimes.com or espn.com.
• Web browsers interact through Internet Protocol (IP)
addresses.
• DNS translates domain names to IP addresses so browsers
can load Internet resources.
Cellular/Wireless Connectivity Protocols
• 2G GSM (1992)- the Second Generation
• 3G (2000) – the Third Generation
• 4G (2013) – the Fourth Generation
• 5G (2019) – the Fifth Generation: In telecommunications, 5G is the fifth
generation technology standard for broadband cellular networks, which
cellular phone companies began deploying worldwide in 2019, and is
the planned successor to the 4G networks which provide connectivity to
most current cellphones.
What makes a protocol have a higher bandwidth?
• The maximum bandwidth of a wireless connection depends on some
other technological factors.
• First, routers are configured to function under one or more
wireless protocols. ...
• A device closer to the router experiences
a higher maximum bandwidth than a device farther from the router.
Wi-Fi
• Wi-Fi is a family of wireless network protocols, based on the IEEE
802.11 family of standards.
• The name is sometimes written as WiFi, Wifi, or wifi, but these are not
approved by the Wi-Fi Alliance.
• IEEE is a separate, but related, organization
Basic Network Tools
1. PING
2. TRACEROUTE (for Linux) or TRACERT (for Windows)
3. NSLOOKUP
4. IPCONFIG
5. WHOIS
6. Speed Test
Protocols used on Networls
1. HTTP
2. FTP
3. POP
4. IMPA
5. SMTP
6. VoIP
7. NFC
How HTTP works – A basic idea
• As a request-response protocol, HTTP gives users a way to interact
with web resources such as HTML files by transmitting hypertext
messages between clients and servers.
• HTTP clients generally use Transmission Control Protocol (TCP)
connections to communicate with servers.
• The web browser connects to the web server and sends
an HTTP request (via the protocol stack) for the desired web page.
• The web server receives the request and checks for the desired page.
If the page exists, the web server sends it. If the server cannot find the
requested page, it will send an HTTP 404 error message.
FTP (File Transfer Protocol)
• The File Transfer Protocol is a standard network protocol used for the
transfer of computer files between a client and server on a computer
network.
• FTP is built on a client-server model architecture using separate control
and data connections between the client and the server.
• The goal of the File Transfer Protocol or FTP is to:
• encourage the sharing of computer files
• encourage the use of remote computers
• to help transfer data quickly and reliably.
POP (Post Office Protocol)
• Post Office Protocol (POP) is a type of computer networking and
Internet standard protocol that extracts and retrieves email from a
remote mail server for access by the host machine.
• POP is an application layer protocol in the OSI model that provides
end users the ability to fetch and receive email.
• The Post Office Protocol is an application-layer Internet standard
protocol used by e-mail clients to retrieve e-mail from a mail server.
POP version 3 is the version in common use.
IMAP (Internet Message Access Protocol)
• In computing, the Internet Message Access Protocol is an Internet standard protocol used
by email clients to retrieve email messages from a mail server over a TCP/IP connection.
• It is an application layer protocol which is used to receive the emails from the
mail server. It is the most commonly used protocols like POP3 for retrieving the
emails.
• It also follows the client/server model. On one side, we have an IMAP client,
which is a process running on a computer.
• On the other side, we have an IMAP server, which is also a process running on
another computer. Both computers are connected through a network.
SMTP (Simple Mail Transfer Protocol)
• The Simple Mail Transfer Protocol is a communication protocol for
electronic mail transmission.
• As an Internet standard, SMTP was first defined in 1982 by RFC 821,
and updated in 2008 by RFC 5321 to Extended SMTP additions, which
is the protocol variety in widespread use today.
VoIP (Voice over Internet Protocol)
• Voice over Internet Protocol, also
called IP telephony, is a method
and group of technologies for the
delivery of voice communications
and multimedia sessions over
Internet Protocol networks, such
as the Internet.
• Voice over Internet Protocol
(VoIP), is a technology that allows
you to make voice calls using a
broadband Internet connection
instead of a regular (or analog)
phone line.
NFC (Near Field Communications)
• Near-Field-Communication is a set of
communication protocols for
communication between two
electronic devices over a distance of
4 cm or less.
• Bits Per Second(bps): The speed at which data transfer is measured. Used in
phone lines/modems
• Although still in its infancy, cyber forensics is gaining traction as a viable way
of interpreting evidence.