0% found this document useful (0 votes)
13 views77 pages

Iti Unit-Ii

The document outlines various types of internet connectivity, categorized into Level One (Gateway access), Level Two (Dial-up connection), and Level Three (Leased connection). It details the hardware and software requirements for setting up a connection, including modem selection and security measures. Additionally, it discusses different internet accounts and protocols, such as SSH, SLIP, and PPP, as well as the advantages and disadvantages of ISDN connections.

Uploaded by

dtskingsdemon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views77 pages

Iti Unit-Ii

The document outlines various types of internet connectivity, categorized into Level One (Gateway access), Level Two (Dial-up connection), and Level Three (Leased connection). It details the hardware and software requirements for setting up a connection, including modem selection and security measures. Additionally, it discusses different internet accounts and protocols, such as SSH, SLIP, and PPP, as well as the advantages and disadvantages of ISDN connections.

Uploaded by

dtskingsdemon
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 77

UNIT-II

Internet Connectivity
 There are various type of connectivity to get hook on to internet.
 They all can be broadly classified into following category.
 Level one connection
 Level two connection
 Level three connection
Level One Connectivity
 Level One Connectivity is also known as Gateway access.
 It is the access to the Internet from a network that is not on the Internet.
 The gateway allows the two networks to "talk" to each other, but
the users of the Gateway internet are limited in their ability to fully
access all of the tools available on the Internet.
 With Level One connectivity, users are limited in what they can
access on the Internet by what their service provider allows them
to access.
 Good examples of networks with Level One connectivity are
America Online (AOL), CompuServe, Prodigy, and many of the
other commercial on-line services.
 AOL is in effect, it has a great number of different programs that
its subscribers can use (like the chat rooms), but all of these
programs run only on the AOL network.
 AOL subscribers, and subscribers to most of the other commercial
on-line services, are lucky in that they can access some of the
tools on the Internet through their gateway.
 Many people with Level One connectivity only have e-mail access.

FIG 3.1: Gateway Access


Level Two Connectivity

 Level Two connection is also known as Dial-up connection.


 This provides connection to Internet through a dial-up terminal
connection.
 The computer, which provides Internet access, is known as
‘Host’ and the computer that receives the access, is ‘Client’ or
‘Terminal’.
 The client computer uses modem to access a “host” and acts as
if it is a terminal directly connected to that host. 56K modem
access is now widely available and supported by most ISPs.
 It allows user to surf the Web at 56 Kbps with graphics.
 So this type of connection is also known as ‘Remote Modem
Access’ connection.
 And the host to which the client gets connected is actually
connected to the Internet by a full time connection.
 In dial-up connection to Internet, Host carries all the command that
are typed on a client machine and forward them to Internet.
 It also receives the data or information from the Internet on
behalf of the ‘Client’ and passes it to them.
 The client computer acts as a ‘dumb’ terminal connected to remote host.
 This type of connection can further be divided into three categories.

 Shell Connection

 TCP/IP Connection

 ISDN
 Shell Connection

 In this type of Internet Connection, the user will get only textual
matter of a Web Page.

 This connection does not support Graphics display.

 TCP/IP Connection
 The major difference between Shell and TCP/IP account is
that, Shell account can only display text and does not
support graphics display, whereas TCP/IP can display both.

 ISDN

 ISDN (Integrated Services Digital Network) offers Internet


connectivity at speeds of up to 128 Kbps through the use of
digital phone lines.

 To access any of these dial-up accounts you need the followings:

 Computer

 Modem

 Telephone Connection

 Shell or TCP/IP/ISDN account from the ISP

 Internet client software such as Internet browser

Level Three Connectivity


 Leased connection is also known as direct Internet access or
Level Three connection.
 It is the secure, dedicated and most expensive, level of Internet
connection using high speed transmission lines.
 It provides secure and private dedicated connection.
 Provides symmetrical, high speed connection and its reliable and
dependable but it is very expensive to install.

Setting up a connection
Hardware Requirement

 Computer the minimum hardware requirements are as follows.


 Windows XP, Vista, or later
 1.0 GHz or faster processor
 1 or more gigabytes (GB) of RAM
 Sound card and speakers
 DVD drive
 Monitor capable of 24-bit color at 1,024 x 768 resolution or better
 Internet
 DSL or Cable connection through an Internet Service Provider (ISP).
 Account plans offering a minimum of 1.5 MB download and 512
upload speed is recommended.
 AOL may require special set up with AOL tech support.
Selection of a Modem
 While selecting a modem do the following.
 Check the service
 Depending on whether user has cable or DSL service, a user
needs a different kind of modem.
 If user is establishing new service, determine which type of
broadband service they have access to before purchasing a
modem.
 Ensure interfaces
 It is important that user select a robust broadband modem
that is able to connect to the device.
 Ensure that the prospective broadband modem is capable of
connecting to the device through one of its available interfaces
such as USB, PC card, serial port or PCI/ISA port.
 Don't overlook leasing a modem
 One easy way to make a decision about the broadband modem
is to lease one from the Internet service provider.
 The Internet service provider is able to assist user in selecting a
modem that works well with both the device and the equipment
for the best speed and performance.
 Don't forget about price considerations
 If user is set on purchasing their own modem, set a price to
pay before heading to the store.
 An internal modem is priced the lowest, while external and
USB modems are more expensive.
 PC card modems are also an inexpensive choice to gain connectivity.
 Shop around within the price range to determine which is the
best selection for the budget
 Broadband modems bring with them lots of options and variety.
 Ensure that user is knowledgeable of all the necessary components
to make a smart decision when heading out to find a suitable
modem to run the home network.
Software Requirement

 Operating System
 Windows XP Pro or Home Edition
 Securit
 This is a very important concern. There will be those who will try
to gain access to the PC, perhaps by finding a way to crash the
AED software and get to the Desktop.
 Here are six security measures that can be taken.
 Minimal, Non-Administrator account
 Anti-Virus
 AED loop-forever script
 PC lock down software
 NO LINKS in content (that you create and add to your display)
 Hide the keyboard.

Internet Accounts by ISP


Telephone line Options
Dial-up Connections
 Dial-up Internet access is a type of Internet connectivity that
operates through a standard telephone line.
 Dial-up access refers to connecting a device to a network via a
modem and a public telephone network.
 Dial-up internet access is offered through a number of
Internet Service Provider (ISP).
 Most ISPs lease a set of telephone numbers, sometimes local,
sometimes national, that dial into network pipeline that feed into
the Internet.
 Open joining a dial-up service, the subscriber chooses a user
name and password.
 Once the modem calls the phone number and makes a
connection a “handshake” takes place in which information is
exchanged between the computer modem and the remote
server.
 The user name and password is supplied by the modem.
 This grants the user access through the dial-up gate way to the Internet.
 Dial-up service is least expensive but also the slowest type
of Internet access.

Internet Accounts
 Click on Start and point to Control Panel.
 Click on Network and Internet Connections.
 Click on Network Connections.
 Click on Create a new connection.
 Click on Next.
 Select Connect to the Internet and Click Next.
 Select Set up my connection manually and Click Next.
 Select Connect using a dial-up modem and Click Next.
 In the open field type in “Setarnet” and Click Next.
 Type in the phone number for ISDN dialup and Click Next.
 Type in the “Username” and “Password” and Click Next.
 Click Finish and the Internet setup are complete.
Dedicated Access
 Dedicated Internet Access is a reliable and scalable worldwide
Internet access service.
 It is specifically designed to maximize today’s business-
critical VPN connectivity needs.
 The ISPs managed Internet connectivity with a comprehensive
suite of services features, all at the fair market price required by
global businesses.
 The key benefit of dedicated access is that it is cost effective and
it provides reliable internet access.
ISDN Connection
 ISDN is abbreviation of Integrated Services Digital Network.
 ISDN is an international communications standard for sending
voice, video and data over digital telephone lines or normal
telephones wires.
 ISDN supports data transfer rates of 64 Kbps (i.e., 64000 bits per
seconds).
 It is mostly designed for leased lines.
 Configuration allows for multiple types of terminations. It uses a
Terminal Adapter (TA) for termination and it is not a modem.
 There are two types of ISDN.

 Basic Rate Interface (BRI)

 Primary Rate Interface (PRI)

 Basic Rate Interface (BRI)


 It consists of 64 Kbps B-Channels and one D-Channels for
transmitting control information.

 Primary Rate Interface (PRI)


 It consists of 23 B-Channels and one D-Channel (U.S.)

 The original version of ISDN employs base band transmission.


 Another version, called B-ISDN, uses broadband transmission and is
able to support transmission rates of 1.5 Mbps. -ISDN requires fiber
optic cables and is not widely
FIG 3.7: ISDN Connection

ISDN Services

 ISDN telephony
 ISDN telecopy
 ISDN and analog terminals
 Call forwarding
 Call waiting
 CLIP (Calling Line Identification Presentation)
 CLIR (Calling Line Identification Restriction)
 Three-party conference
 Advice of change
 Malicious call identification

Advantages of ISDN
 Digital services with less error.
 Direct fast connection with no dialing.
 Higher bandwidth (Takes less time in downloading material).
 Supports multiple users.
 Able to use ISDN for more than one task.
Disadvantages of ISDN
 ISDN is more expensive to install than a standard telephone.
 Not easy to set up.
 All exchanges do not provide ISDN service.
Internet Accounts by ISP

1.Protocol Options
Secure Shell (SSH)
 Secure Shell or SSH is a network protocol that allows data to be
exchanged using a secure channel between two networked
devices.
 It is used primarily on Linux and Unix based system to access shell
accounts, SSH was designed as a replacement for Telnet and other
in secure remote shells, which send information, notably
passwords, in plain text, leaving them open for interception.
 The encryption used by SSH provides confidentially and integrity of
data over an insecure network, such as the Internet.
 SSH is typically used to log into a remote machine and execute
commands

FIG 3.8: Secure Shell (SSH)

SLIP:

 The Serial Line Internet Protocol (SLIP) is a mostly obsolete


encapsulation of the Internet Protocol designed to work over serial
ports and modem connections.
 SLIP (on PCs) has been largely replaced by the Point-to-Point
Protocol (PPP), which is better engineered, has more features and
does not require its IP address configuration to be set before it is
established.
 SLIP does not provide error detection and it is a protocol for
connection to the Internet via a dial-up connection
PPP
 Point-to-Point Protocol or PPP is a data link protocol commonly used to
establish a direct connection between two networking nodes.
 PPP originally emerged as are encapsulation protocol for transporting
IP traffic over Point-to-Point links.
 It is a protocol for communication between two computers using a serial
interface, typically a personal computer connected by phone line to a
server.

 PPP is a full duplex protocol that can be used on various


physical media, including twisted pair or fiber optic lines or
satellite transmission.
 It can handle synchronous as well as asynchronous
communication.
 PPP can share a line with other users and it has error detection
that SLIP lacks.

FIG 3.10: Point-to-Point Protocol

Internet Accounts by ISP:

1. Service
Options E-mail
 E-mail (electronic mail) is the exchange of computer stored
messages by telecommunication.
 E-mail is a system of worldwide communication in which a
computer user can compose a message at one terminal that can be
regenerated at the recipient’s terminal when user Logs in.
 Thus E-mail is a system of sending and receiving messages
electronically over a network, as between personal computers.
WWW:

 The World Wide Web (commonly abbreviated as WWW) is a


system of interlinked hypertext documents accessed via the
Internet.
 The World Wide Web enabled the spread of information over
the Internet through an easy-to-use and flexible format.

Firewall:

 A firewall is a program or device that acts as a barrier to block or


prevent unauthorized access to a network.


 They work as filters for network traffic by blocking incoming
packets of information that are seen as unsafe.
 In large corporations, if a firewall is not in place, thousands of
computers could be vulnerable to malicious attacks.
 Firewalls should be placed at every connection to the internet
and are also used to control outgoing web traffic as well in large
organizations.
Chapter 4

4.1Network Definition
4.1.1Network Definition
4.2Common
Terminologies 4.3.1
LAN
4.3.2LAN Applications
4.3.3 WAN
4.3.4 WAN Connection Types
4.3.5Node
4.3.6Host
4.3.7 Workstation
4.3.8Bandwidth
4.3.9Interoperability
4.3.10 Network Administrator
4.3.11 Network Security
4.3Network
Components 4.4.1
Severs
4.4.2Clients
4.4.3Communication Media
4.4Types of Network
4.4.1Peer to Peer
4.4.2Client Server
4.5Addressing in Internet
4.5.1DNS
4.5.2Domain Name and their Organization
4.5.3Understanding the Internet Protocol Address
4.6Network Topologies
4.6.1Bus
4.6.2Star
4.6.3Ring
4.7Ethernet
4.7.1Ethernet
4.8FDDI
4.8.1FDDI
4.9 ATM
4.9.1 ATM
4.9.2Star
4.9.3Ring
4.10 Ethernet
4.10.1 Ethernet
4.11 FDDI
4.11.1 FDDI
4.12ATM
4.12.1 ATM

Network Definition:
 A network is any collection of independent computers that
communicate with one another over a shared medium.
 A computer network is a collection of two or more connected computers.
 When these computers are joined in a network, people can share
files and peripherals such as modems, printers and tape backup
drives.

Common Terminologies:
1.Local Area Network (LAN):
 LAN is a group of computers and network communication devices
within a limited geographical area such as home, school and office
building.
 The devices used in this network can be connected via wired cable
or wireless links.

 The resources to be shared can include hardware (e.g., a printer),


software (e.g., an application program), or data.
 The most common LAN topologies are bus, ring, and star. Early LANs
had data rates in the 4 to 16 megabits per second (Mbps) range.
 Wireless LANs are the newest evolution in LAN technology.
 LANs are configured in any one of two basic structures. Such as
 Peer-to-Peer
 Client/Server

LAN Applications
 LANs are mostly used in office environment.
 In an office environment it is mainly used for three purposes.
 Sharing
 Interoffice Communication
 Internet Communication
 Sharing
 Sharing Hardware
 Users can be connected through Local Area Network to the
single printer or data storage.
 Jobs from each user are queued in that single printer.

 Depending on the needs of an organization and the type of technology


used, a LAN can be as simple as two PCs and a printer in someone's
home office or it can extend throughout a company and include audio
and video peripherals.
 Currently, LAN size is limited to a few kilometers.
 LANs are designed to allow resources to be shared between personal
computers or workstations.

 Sharing Software
 Through LAN connection users can share programs such as
accounting programs, which is stored in a single machine.

 Sharing Data
 Sharing of large database between the users is also another
big advantage.
4 .3.3 Wide Area Network (WAN):

 Wide Area Network (WAN) spans over a large geographical area


such as a state or a country.
 A Wide Area Network is different from MAN because of the
distance between each of the network.
 The best example of a WAN could be the Internet that is the largest
network in the world.

FIG 4.6: Wide Area Network (WAN)


 The world's most popular and longest Wide Area Network is an Internet.
 It makes communication of computers and users in one location with
the computers and users in another location.
 It covers long distance via telephone lines, fiber optic cables or satellite
links.

WAN Connection Types

 The three different WAN connections that can be used to connect


the LAN's together are,

 Dedicated connection.
 Circuit switching.
 Packet switching.
 Dedicated connection

 This connection is also referred as point-to-point connection or


leased connection.
 It uses synchronous serial lines up to 45Mbps.

FIG 4.8: Dedicated connection


 No setup is made before transmission, it constantly transfers the data.
 Circuit switching

 The term circuit switching is same like a phone call.

FIG 4.9: Circuit switching


 No data can transfer before end to end connection is established.
 It is used for low-bandwidth data transfer.
 Examples of circuit-switched networks are
 Dial-up.
 ISDN (Integrated Service Digital Network).
 Packet switching

 Packet switching method allows user to share bandwidth with other


companies to save money.

FIG 4.10: Packet- switching


 The packet switching transfers packets across a carrier network.
 Speed can range from 56Kbps to T3 (45Mbps).
 Examples of packet switching are,
 Frame Relay,
 X.25 Network,
 Internet Protocol,
 Ethernet.

4.3 Common Terminologies


Node
 A node is a system or device connected to a computer network.
 Nodes can be computers, Personal Digital Assistants (PDAs), cell
phones, or various other network appliances.
 For example, if a network connects a file server, five computers, and
two printers, there are eight nodes on the network.
 Each device on the network has a network address, such as a MAC
address, which uniquely identifies each device. This helps keep track of
where data is being transferred to and from on the network.
FIG 4.11: Node
Host

 A host is one or more networked computers that have been setup to


handle each user visiting or requesting information.
 A host is responsible for many different responsibilities, for example, a
host may be responsible for handling each of the computer players in
an online game or for sending users a web page on the Internet.
 Each computer connected to the host computer is known as a client.

FIG 4.12: Host


Workstation

 Workstation, a high-performance computer system that is basically


designed for a single user and has advanced graphics capabilities,
large storage capacity, and a powerful microprocessor (Central
Processing Unit).
 A workstation is a name given to a single computer that is connected
to another computer or network.
 A workstation is more capable than a Personal Computer (PC) but is
less advanced than a mid-range computer.

FIG 4.13: Workstation


Bandwidth
 The amount of information that can be transmitted through a
communications channel in a given amount of time that is, the
capacity of the channel.
 It is often uttered in bits per second, or alternatively bytes per second,
leading to lots of confusion.
 Bandwidth figures are used to express the capacity of a network link or
interface (e.g., a 100Mbps Ethernet interface) or the rate of
information transfer (e.g. a file downloading at 3.2KB/s).
 When referring to user's own connection, bandwidth,
communication speed or connection speed is the total maximum
capacity of the network or modem connection.
 The more bandwidth a computer has, the faster it will be able to
receive and send information.
 A modem with a connection of 56kbps is nearly twice as fast as one
28.8kbps and users with a broadband connection can get transfers
speeds of several MB every second, which is more than triple the
speed of the fastest modem.

Interoperability

 Interoperability is the ability of different networks or programs to work


or communicate together without the need of additional tools or
interfaces required by the user.
 For example, most networks use TCP/IP, which is available on all
operating systems, computers and supported with most networks.
 In this current Internet age, it is important that networks of different
type are able to communicate with other types of network.
 Not being able to transfer data between networks may isolate a
network and decrease efficiency.

Network Administrator

 A network administrator is an individual or group of individuals


responsible for the maintenance and operation of a network or server.
 A network administrator may be responible for maintaining a network
and may be assigned to one or more of the below tasks.
 Network administrator responsibilities.
 Allocating and adding disk storage space.
 Designing or redesigning the network.
 Expanding the network.
 Helping employees with computer questions.
 Installing and upgrading computers and network equipment on the
network.
 Managing filters and rules (e.g. ACL's, firewalls, QoS, SPAM filters).
 Monitoring the network.
 Resetting user names and passwords.
 Setting up a network, network device, or computers on the network.
 Testing a network for security vulnerabilities.

Network Security

 A specialized field in computer networking that involves securing a


computer network infrastructure.
 Network security is typically handled by a network administrator or
system administrator who implements the security
policy, network software and hardware needed
to protect a network and the resources accessed through the network
from unauthorized access and also ensure employees to have
adequate access to the network and resources to work.
 A network security system typically relies on layers of protection and
consists of multiple components including networking monitoring and
security software in addition to hardware and appliances.
 All components work together to increase the overall security of the
computer network.
4.4 Network Components

Servers

 Server is just like any other computer of the network however it can
be distinguished with its large storage capacity and the role that is
assigned to it.
 This is the administrator that controls functioning of other computers
and responsible for the division of labor among computers in a shared
network.
 Main computer that provides services to other computers, which holds
stored files, programs and network operating system.

Clients

 Any computer that is the part of a common network other than the
server is called as Client.
 The division is based on the storage capacity and responsibility of the
computer.
 For example, a server has a large storage area and its responsibilities
are pretty different than client computers.
 The client computer access network and shared resources provided
by the server.
 It is less powerful than server computer.
Communication Media

 Communication media interconnect the computers in a network.


 Different types of transmission media are,
 Wired or Bounded
 Twisted-pair wire
 Coaxial cable
 Optical fiber cable
 Wireless or Unbounded
 Wi-Fi
 Bluetooth
 Transmitter, Receiver

4.5 Types of Network:

Peer to Peer Network


 In Peer-to-Peer networking, there are no dedicated servers or hierarchy
among the computers.
 All of the computers are equal and therefore known as peers.
 Normally each computer serves as Client/Server and there is no one
assigned to be an administrator responsible for the entire network.
 Peer-to-peer networks are good choices for needs of small
organizations where the users are allocated in the same general area,
security is not an issue and the organization and the network will have
limited growth within the foreseeable future.

Advantages

 Easy and simple to set up, only requiring a hub or a switch to


connect all computers together.
 You can access any file on the computer -long as it is set to a shared folder.
 If one computer fails to work, all the other computers connected to it
still continue to work.
Disadvantages
 Security is not good other than setting passwords for files that you
don't want people to access.
 If the connections are not connected to the computers properly, then
there can be problems accessing certain files.
 It does not run efficient if you have many computers, it is best to use
two to eight computers.

Client Server Network


 The term Client/server refers to the concept of sharing the work
involved in processing data between the client computer and the most
powerful server computer.
 A client is the computer running a program that request the service
from the server.
 A server is a computer running a process that provides a service to
other computers when they request it.
 Client/server networks are more suitable for larger networks.
 A central computer or ‘server’ acts as the storage location for files and
applications shared on the network.
 Usually the server is a higher than average performance computer.
 The server also controls the network access of the other computers,
which are referred to as the 'client' computers.
 For example, a LAN-based database application stores its data on a
server, which stands by, waiting for clients to request information from
it.
 Users of workstation computers run a database client program in which
they generate queries that request specific information in the database
and transmit those queries to the server.
 The server responds to the queries with the requested information
and transmits it to the workstations, which format it for display to the
users.
 In this case, the workstations are responsible for providing a user
interface and translating the user input into a query language
understood by the server.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.6

Topic : 4.6.1 Domain Name System (DNS)

Domain Name System (DNS)


 The Domain Name System (DNS) was originally invented to support
the growth of email communications on the ARPANET, and now
supports the Internet on a global scale.
 The DNS as a whole consists of a network of servers that map Internet
domain names like www.livinginternet.com to a local IP addresses.
 The DNS enables domain names to stay constant while the underlying
network topology and IP addresses change.
 This provides stability at the application level while enabling network
applications to find and communicate with each other using the
Internet protocol no matter how the underlying physical network
changes.
 DNS uses a client/server network architecture.
 The Domain Name System (DNS) servers distribute the job of mapping
domain names to IP addresses among servers allocated to each
domain.

Chapter : 4.6 Addressing in Internet

Topic : 4.6.2 Domain Name and their Organization

Domain Name and their Organization

 Internet domain names are the alphanumeric identifiers, people use


to refer to hosts on the Internet, like "LivingInternet.com".
 The structure of Internet domain names was first described in RFC 819,
and their syntax was first described in RFC 822.
 Domain Names come in four main types as follows
 Top-level domains,
 Second-level domains,
 Third-level domains,
 Country domains.
 Top-level domains
E-Content of

INTERNET
 Internet TECHNOLOGY
domain names ANDby
are organized WEB
theirDESIGN
levels, with the
higher levels on the right.
 Every domain name ends with a top-level domain label.
 For example, for the domain "www.twenty.net", the top-level domain is
"net".
 Some of the Top-level Domains are
 gov - Government sites
 edu - Educational institutions
 org - Organizations (nonprofit)
 mil - Military sites
 com - Commercial business
 net - Network organizations
 Second-level domains
 Top-level Internet domains like ".com" are shared by all the
organizations in the domain.
 Second-level domain names like "yahoo.com" and
"livinginternet.com" are registered by individuals and
organizations.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 Second-level domains are the addresses commonly used to host
Internet applications like web hosting and email addressing.
 Excluding the top-level domain portion, second-level domain names
can have up to 61 characters. For many years, character were
restricted to the 26 letters, 10 numbers, or the hyphen character,
except the hyphen can't be the first or last character.
 Third-level domains
 Third-level domain names are created by those that own second-
level domains.
 Third-level domains can be used to set up individual domains for
specific purposes, such as a domain for web access and one for
mail, or a separate site for a special purpose like
 www.livinginternet.com
 mail.livinginternet.com
 rareorchids.livinginternet.com
 Fourth-level and even higher Internet domains like
"www2.un.news.media.twenty.net" can be also be established.
Three of four levels is usually sufficient for most purposes.
 Country domains
 Each country in the world has its own top-level Internet domain
with a unique alphabetic designation.
 A few country domains are shown below.
 .in - India
 .au - Australia
 .ca - Canada
 .us - United States
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.6 Addressing in Internet

Topic : 4.6.3 Understanding the Internet Protocol Address

Understanding the Internet Protocol Address


 Internet Protocol (IP) address is shortly called as IP address.
 An IP address is an identifier for a computer or device on a TCP/IP network.
 Networks using the TCP/IP protocol route messages based on the IP
address of the destination.
What is My IP Address?

 To view the IP address user can use the ipconfig (IPCONFIG) command
line tool.
 Ipconfig displays all current TCP/IP network configuration values and
refreshes Dynamic Host Configuration Protocol (DHCP) and Domain
Name System (DNS) settings.

 To launch the command prompt from a Windows-based computer click on


Start -
> All Programs -> Accessories -> Command Prompt and type ipconfig
and hit Enter.

 User can also use Google search to find the IP address. Type what is my
IP address as a search box and Google will show the IP address of the
computer from which the query was received as the top search result.
The Format of an IP Address

 The format of an IP address is a 32-bit numeric address written as four


numbers separated by periods.
 Each number can be 0 to 255. For example, 1.160.10.240 could be an
IP address.
 The four numbers in an IP address are used in different ways to identify
a particular network and a host on that network.
 Within a remote network, user can assign IP addresses at random as
long as each one is unique. However, connecting a private network to
the Internet requires the use of registered IP addresses (called Internet
addresses) to avoid duplicates.
 An IP address can be static or dynamic.
E-Content of

 A static INTERNET
IP address TECHNOLOGY AND WEB
will never change and itDESIGN
is a permanent Internet
address.
 A dynamic IP address is a temporary address that is assigned each
time a computer or device accesses the Internet.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.7 Network Topologies

Topic : 4.7.1 Bus Topology

Bus Topology
 Bus topology also called horizontal topology.
 In bus topology, multiple devices are connected one by one, by
means of single cable.

FIG 4.25: Bus topology

 When one computer sends a signal up the wire, all the computers on
the network receive the information, but only one accepts the
information, the rest discard the messages.
 The central cable is the backbone of this network and is known a bus.
 Bus is passive topology because it requires termination.
Advantages
 Easy to use and easy to install.
 Needs fewer physical connectivity devices.
 A repeater can also be used to extend a bus topology network.
 Low cost.
Disadvantages
 Heavy network traffic can slow a bus considerably.
 It is difficult to troubleshoot a bus.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 Failure of a cable affects all devices on the network.
 Difficult to add new node.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.7 Network Topologies

Topic : 4.7.2 Star Topology

Star Topology
 A star topology consists of a number of devices connected by point-to-
point links to a central hub.
 In star topology, every node (computer workstation or any other
peripheral) is connected to a central node called a hub or switch.
 A star network consists of one central switch, hub or router, which
acts as a conduit to transmit messages.

FIG 4.26: Star topology

 All peripheral nodes may thus communicate with all others by


transmitting to, and receiving from, the central node only.
 The star topology reduces the damage caused by line failure by
connecting all of the systems to a central node.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 This is easy to control and traffic flow is simple.
 Data travels from the sender to central hub and then to the receiver.
Advantages
 Isolation of devices
 Each device is inherently isolated by the link that connects it to the hub.
 This makes the isolation of individual devices straightforward and
amounts to disconnecting each device from the others.
 This isolation also prevents any non-centralized failure from
affecting the network.
 Benefits from centralization
 It is easy to modify and add new nodes to a star network without
disturbing the rest of the network.
 Centralization also allows the inspection of traffic through the network.
 Easy to detect faults and to remove parts.
 No disruptions to the network when connecting or removing devices.
 Installation and configuration is easy.
 Failures of any node do not bring down the whole star network.
Disadvantages
 If the central hub fails, the whole network fails to operate.
 Each device requires its own cable segment.
 Installation can be moderately difficult, especially in the hierarchical
network.
 Requires a large amount of cable to be connected.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.7 Network Topologies

Topic : 4.7.3 Ring Topology

Ring Topology
 In a ring topology, each computer is connected to the next
computer; with last one connected to the first.

FIG 4.27: Ring topology

 Data travel from node to node, with each node along the way
handling every packet.
 Because a ring topology provides only one pathway between any two
nodes, ring networks may be disrupted by the failure of a single link.
 The signals travel on the cable in only one direction.
 Each computer retransmits what it receives.
 Ring is an active network.
 In this, termination is not required.

Advantages
 Cable failures are easily found.
 Because every node is given equal access to the token, no one
node can monopolize the network.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 Performs better than a bus topology under heavy network load.
 Does not require a central node to manage the connectivity between
the computers.
 Point to point line configuration makes it easy to identify and isolate faults.
 Due to the point to point line configuration of devices with a device on
either side (each device is connected to its immediate neighbor), it is
quite easy to install and reconfigure since adding or removing a
device requires moving just two connections.
Disadvantages
 Adding or removing nodes disrupts the network.
 It is difficult to troubleshoot a ring network.
 Failure of one node on the ring can affect the whole network.
 Cost of cable is more in ring network.

Chapter : 4.8 Ethernet

Topic : 4.8.1 Ethernet

Ethernet
 Ethernet is a physical and data link layer technology for Local Area
Network (LANs).
 Ethernet was invented by engineer Robert Metcalfe.
 When first widely deployed in the 1980s, Ethernet supported a
maximum theoretical data rate of 10 megabits per second (Mbps).
 Later, Fast Ethernet standards increased this maximum data rate to
100Mbps.
 Gigabit Ethernet technology further extends peak performance up to
1000Mbps and 10 Gigabit Ethernet technology also exists.
 Higher level network protocols like Internet Protocol (IP) use Ethernet
as their transmission medium. Data travels over Ethernet inside
protocol units called frames.
 The run length of individual Ethernet cables is limited to roughly 100
meters, but Ethernet networks can be easily extended to link entire
schools or office buildings using network bridge devices.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 Ethernet Port
 An Ethernet port is an opening on computer network equipment
that Ethernet cables plug into.
 These ports are alternatively called jacks or sockets.
 Ethernet ports accept cables with RJ-45 connectors.
 Ethernet Card
 An Ethernet card is one kind of network adapter. These
adapters support the Ethernet standard for high-speed network
connections via cables.
 Ethernet cards are sometimes known as Network Interface Cards (NICs).

Chapter : 4.9 FDDI

Topic : 4.8.1 FDDI

FDDI

 FDDI (Fiber Distributed Data Interface) is a set of ANSI and ISO


standards for data transmission on fiber optic lines in a Local Area
Network (LAN) that can extend in range up to 200 km (124 miles).
 The FDDI protocol is based on the token ring protocol.
 In addition to being large geographically, an FDDI local area network
can support thousands of users.
 FDDI is frequently used on the backbone for a Wide Area Network (WAN).
 An FDDI network contains two token rings, one for possible backup in
case the primary ring fails.
 The primary ring offers up to 100 Mbps capacity. If the secondary
ring is not needed for backup, it can also carry data, extending
capacity to 200 Mbps.
 The single ring can extend the maximum distance, a dual ring can
extend 100 km (62 miles).
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN

FIG 4.31: FDDI

Features of FDDI

 Number of stations: Up-to 1000 connections are allowed (500 and


connected
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


stations).
 Total fiber path: Up-to 200 km of total fiber length is allowed.
 Data transmission rate: 100 Mbps.
 Optical transmission media: FDDI specifies multi-mode
optical fiber. Typical parameters of transmission medium are-
 Optical source-1300 nm LED
 Core diameter-62.5 micron
 Cladding diameter-125 micron
 Numerical aperture-0.275
 Bandwidth-500 MHz/km
Advantages
 High bandwidth.
 Security.
 Physical durability.
 Use of multiple tokens.
 System fault tolerance.
Disadvantages
 FDDI is a complex technology.
 FDDI is costly.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.10 ATM

Topic : 4.10.1 Asynchronous Transfer Mode (ATM)

Asynchronous Transfer Mode (ATM)


 Asynchronous Transfer Mode (ATM) is a streamlined packet
transfer interface. ATM also is a connection-oriented network.
 ATM uses packets of fixed size for the communication of
data. These packets are called as ATM cells.
 ATM is used for efficient data transfer over high-speed data
networks.
 ATNI provides real time and non-real time services.
 The services provided are
 Synchronous TDM streams such as T-1.
 Services using the constant bit rates.
 Compressed voice and video.
 Traffic with specific quality requirement using the non-real
time variable bit rate.
 IP based services using available bit rate (ABR) and unspecified
bit rate (UBR) services.
 The ATM needs an adaption layer for supporting the information
transfer protocols that are not based on ATM.
 Cell Relay
 ATM is also known as cell relay.
 It has advantages of better reliability and fidelity, which
allows faster packet switching than X.25.
 Applications
 ATM was developed as a part of work on ISDN.
 But now it is used in non-ISDN system where the data rates are very
high.
ATM Protocol Architecture (ATM Reference Model)
 ATM is a streamlined protocol. It has minimal error and flow control
capabilities.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 Hence the number of overhead bits required with each cell is
reduced which enables ATM to operate at high data rates.
 Also, due to the ATM cells of fixed size, the processing required at
each node is simplified. This also supports the use of ATM at high data
rates.
 FIG 4.31 shows the ATM protocol architecture for an interface between
user and network.

FIG 4.32: ATM Protocol Architecture

 Layers in the ATM protocol model are


 Physical layer
 ATM layer
 ATM Adaption layer (AAL)
 Physical Layer
 The physical layer of the protocol involves the specification of a
transmission medium and signal-encoding scheme.
 The data rates specified at this layer are between 25.6 Mbps
and 622.08 Mbps, but data rates higher and lower than these are
possible.
 ATM Layer
 This layer is common to all the services that provide the
packet transfer capabilities.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 This layer defines the transmission of data in fixed size cells
and it also defines the use of logical connections.
 ATM Adaption Layer (AAL)
 This layer is a service dependent layer. It is used for supporting
the information transfer protocol not based on ATM.
 The AAL maps the higher layer information onto the ATM cell
and cell is transported over the ATM network.
 Planes in the ATM protocol model are
 User plane
 Control plane
 Management plane
 User plane
 It is used for transferring user information along with associated
controls such as flow control, error control etc.
 Control plane
 It is supported to perform the call control and connection control
functions.
 Management plane
 It includes the plane management.
 The management plane performs management functions related to
a system. They include,
 Provision of coordination between all planes.
 Layer management.
 Management function relating to resources and parameters
residing in its protocol entities.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


Chapter : 4.11 Intranet

Topic : 4.11.1 Intranet

Intranet
 Intranet, extranet, and the Internet are all networks of networks.
 "Intra" means "internal" or "within," + network.
 The major difference between the three classes of networks is the
aspect of network traffic control (i.e., who are the participants in the
network).

FIG 4.33: Intranet

 Intranets are owned by individual organizations (i.e., intra-enterprise


systems).
 Some organizations operate their own network, and some outsource
that function to network operations groups (e.g., EDS, AT&T Data
Solutions, etc.).
 A key characteristic of intranet implementation is that protected
applications are not visible to the Internet at large.
 Intranet access control relies heavily on the physical access point to
the corporate LAN.
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


 Once physical access is gained into a corporate site, application access
controls are the only constraint on access to corporate resources.
 Secure intranets are separated from the Internet by means of a firewall
system.
 Inbound Internet traffic is NOT allowed into the corporate security
perimeter except for e-mail.
 Outbound network traffic destined to the Internet from the intranet is
not usually filtered. Some corporations constrain outbound traffic to
allow only Web-based protocols (e.g., HTTP, FTP and IIOP).
 Some of the difference between an Intranet and Internet are the
Quality of Service (QoS) or lack of Service Level Agreements (SLAs)
which describe availability, bandwidth, latency and response time.
 Most Internet Service Providers (ISPs) and networking device vendors
are developing an Internet level of service capability
E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN


E-Content of

INTERNET TECHNOLOGY AND WEB DESIGN

You might also like