0% found this document useful (0 votes)
11 views9 pages

Id Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
11 views9 pages

Id Assignment

Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 9

Assignment Of Idea

Name: Sachin
Roll No: 252402160
B.Tech CSE B 1st Semester
1. Network Technologies and Topologies
Network Technologies
Network technologies refer to the various methods, protocols, and devices used to establish
communication between systems within a network. Some common network technologies
are:

 LAN (Local Area Network): A network of devices located within a limited area such
as an office, building, or school. It connects computers and devices within close
proximity.
 WAN (Wide Area Network): A network that spans a large geographical area, such as
cities, countries, or continents. The internet is the largest example of a WAN.
 Wi-Fi: A technology that allows devices to connect to the internet wirelessly, using
radio waves to communicate with a router.

 Bluetooth: A short-range wireless technology used to exchange data between


devices like smartphones, speakers, and computers.

 Fiber Optic: A high-speed technology that uses light signals to transmit data through
glass or plastic fibers. It is faster and more reliable than traditional copper cables .

Network Topologies

Network topology refers to the physical and logical arrangement of devices and cables in a
network. Some common network topologies include:
 Bus Topology: In a bus topology, all devices are connected to a single central cable
called the bus. Data travels in both directions along the bus, and devices
communicate by sending data across it. This topology is simple but can be prone to
congestion.
 Star Topology: In a star topology, each device is connected to a central device, such
as a switch or hub. This topology is easy to manage and expand, but if the central
device fails, the entire network may be affected.
 Ring Topology: Devices are connected in a circular manner. Data travels in one
direction around the ring. A failure in one part of the ring can disrupt communication
for the entire network.
 Mesh Topology: Each device is connected to every other device in the network. This
topology provides redundancy and high reliability, but it is expensive to implement
due to the number of connections required.
 Hybrid Topology: A combination of two or more different topologies. For example, a
star topology might be used within a building, while multiple buildings are connected
via a bus topology.
2. IP Addressing and IP Classes
IP Addressing
An IP address (Internet Protocol address) is a unique identifier assigned to each device
connected to a network. There are two main types of IP addresses:
 IPv4 (Internet Protocol version 4): The most commonly used IP address format,
consisting of four octets (32 bits) separated by periods (e.g., 192.168.1.1). IPv4
addresses are running out due to the increasing number of connected devices.
 IPv6 (Internet Protocol version 6): A newer version of IP addressing that uses 128-bit
addresses, allowing for a much larger address space than IPv4. IPv6 addresses are
written in hexadecimal format (e.g., 2001:0db8:85a3:0000:0000:8a2e:0370:7334).
IP Classes

IP addresses are divided into five classes based on the range of the address. The most
commonly used classes are:
 Class A (1.0.0.0 to 127.255.255.255): This class is used for large networks, such as
those owned by major corporations. Class A addresses allow for 16 million hosts.

 Class B (128.0.0.0 to 191.255.255.255): Used for medium-sized networks, such as


universities or large organizations. Class B allows for 65,000 hosts.
 Class C (192.0.0.0 to 223.255.255.255): Class C is used for smaller networks and is
the most common for local networks like home or office networks. Class C allows for
254 hosts.

 Class D (224.0.0.0 to 239.255.255.255): This class is reserved for multicast addresses,


used for sending data to multiple destinations.
 Class E (240.0.0.0 to 255.255.255.255): This class is reserved for experimental and
research purposes.
3. Input and Output Devices
Input Devices
Input devices are hardware components used to input data or commands into a computer
system. Some common input devices include:
 Keyboard: A device used to input text and commands into the computer. It is one of
the primary input devices.

+3

+
 Mouse: A pointing device used to move a cursor on the screen and interact with the
computer. It often includes buttons for selecting or opening items.

 Scanner: A device that converts physical documents, such as photos and text, into
digital formats.

 Microphone: An input device that captures sound and converts it into a digital signal
that a computer can process.
 Touchpad: A small, flat device found on laptops that detects the movement of a
finger to control the mouse pointer.

Output Devices
Output devices are hardware components that receive data from a computer and present it
to the user in a readable or usable form. Common output devices include:
 Monitor: A screen that displays visual output from the computer, such as text,
images, or videos.

 Printer: A device that produces a hard copy (paper copy) of a digital document.
 Speakers: Output devices that play sound, such as music, speech, or system
notifications.

 Projector: A device used to project an image or video onto a larger surface, typically
used in presentations.

Difference Between Input and Output Devices


 Input Devices allow users to send data or commands to the computer, while Output
Devices deliver processed data from the computer to the user.
 Input Devices are used to enter information, while Output Devices show or present
the result of the computer's processing.
4. Basics of Network Security
Network Security involves measures taken to protect the integrity, confidentiality, and
availability of data and resources in a network. It aims to prevent unauthorized access,
attacks, and data breaches. Some basic concepts in network security include:
 Firewall: A network security system that monitors and controls incoming and
outgoing traffic based on predetermined security rules. Firewalls help prevent
unauthorized access to or from a private network.
 Encryption: A process of converting data into a coded form to prevent unauthorized
access. Encryption is used to secure communication over the internet (e.g., SSL/TLS
for websites).
 VPN (Virtual Private Network): A service that creates a secure, encrypted connection
over a less secure network, such as the internet. VPNs are often used to securely
connect remote users to an organization's internal network.
 Antivirus Software: Programs designed to detect, prevent, and remove malicious
software (malware) such as viruses, worms, and Trojans.
 Authentication: The process of verifying the identity of a user or device. Common
methods include passwords, biometrics, and multi-factor authentication (MFA).
Common Security Protocols
 SSL/TLS (Secure Socket Layer/Transport Layer Security): Protocols that ensure
secure communication over a computer network by encrypting data.
 IPsec (Internet Protocol Security): A protocol suite used to secure Internet Protocol
(IP) communications by authenticating and encrypting each IP packet.
5. Device Access to Local and Remote Network Resources
Local Network Resources

Local networks (LANs) enable devices within a specific area, such as a home or office, to
share resources like files, printers, and internet access. Devices can access local resources
through:
 Workgroups: A simple way for computers to share resources within a local network,
often used in home networks.

 Home Groups: A feature in Windows that makes sharing files and printers easier in a
home network.

 File Sharing: A method that allows one device to share files or folders with others on
the same network. Common protocols include SMB (Server Message Block) and NFS
(Network File System).

Remote Network Resources


Remote access allows users to access resources on a network from a distant location.
Methods of remote access include:
 VPN (Virtual Private Network): A secure way to access a private network remotely
by establishing an encrypted tunnel through the public internet.
 RDP (Remote Desktop Protocol): A protocol developed by Microsoft that allows a
user to connect to a remote computer and interact with its desktop environment.
 Cloud Services: Services like Google Drive, Dropbox, and OneDrive allow users to
access files and applications from any location with internet access .
Security Considerations for Remote Access
 Encryption: Ensures that data transmitted over a network is unreadable to
unauthorized users.
 Multi-Factor Authentication (MFA): A security system that requires more than one
form of authentication (e.g., password and fingerprint) to access network resources.
 Access Control: Limiting access to network resources based on user roles and
permissions.

You might also like