Iti Unit-Ii
Iti Unit-Ii
Internet Connectivity
There are various type of connectivity to get hook on to internet.
They all can be broadly classified into following category.
Level one connection
Level two connection
Level three connection
Level One Connectivity
Level One Connectivity is also known as Gateway access.
It is the access to the Internet from a network that is not on the Internet.
The gateway allows the two networks to "talk" to each other, but
the users of the Gateway internet are limited in their ability to fully
access all of the tools available on the Internet.
With Level One connectivity, users are limited in what they can
access on the Internet by what their service provider allows them
to access.
Good examples of networks with Level One connectivity are
America Online (AOL), CompuServe, Prodigy, and many of the
other commercial on-line services.
AOL is in effect, it has a great number of different programs that
its subscribers can use (like the chat rooms), but all of these
programs run only on the AOL network.
AOL subscribers, and subscribers to most of the other commercial
on-line services, are lucky in that they can access some of the
tools on the Internet through their gateway.
Many people with Level One connectivity only have e-mail access.
Shell Connection
TCP/IP Connection
ISDN
Shell Connection
In this type of Internet Connection, the user will get only textual
matter of a Web Page.
TCP/IP Connection
The major difference between Shell and TCP/IP account is
that, Shell account can only display text and does not
support graphics display, whereas TCP/IP can display both.
ISDN
Computer
Modem
Telephone Connection
Setting up a connection
Hardware Requirement
Operating System
Windows XP Pro or Home Edition
Securit
This is a very important concern. There will be those who will try
to gain access to the PC, perhaps by finding a way to crash the
AED software and get to the Desktop.
Here are six security measures that can be taken.
Minimal, Non-Administrator account
Anti-Virus
AED loop-forever script
PC lock down software
NO LINKS in content (that you create and add to your display)
Hide the keyboard.
Internet Accounts
Click on Start and point to Control Panel.
Click on Network and Internet Connections.
Click on Network Connections.
Click on Create a new connection.
Click on Next.
Select Connect to the Internet and Click Next.
Select Set up my connection manually and Click Next.
Select Connect using a dial-up modem and Click Next.
In the open field type in “Setarnet” and Click Next.
Type in the phone number for ISDN dialup and Click Next.
Type in the “Username” and “Password” and Click Next.
Click Finish and the Internet setup are complete.
Dedicated Access
Dedicated Internet Access is a reliable and scalable worldwide
Internet access service.
It is specifically designed to maximize today’s business-
critical VPN connectivity needs.
The ISPs managed Internet connectivity with a comprehensive
suite of services features, all at the fair market price required by
global businesses.
The key benefit of dedicated access is that it is cost effective and
it provides reliable internet access.
ISDN Connection
ISDN is abbreviation of Integrated Services Digital Network.
ISDN is an international communications standard for sending
voice, video and data over digital telephone lines or normal
telephones wires.
ISDN supports data transfer rates of 64 Kbps (i.e., 64000 bits per
seconds).
It is mostly designed for leased lines.
Configuration allows for multiple types of terminations. It uses a
Terminal Adapter (TA) for termination and it is not a modem.
There are two types of ISDN.
ISDN Services
ISDN telephony
ISDN telecopy
ISDN and analog terminals
Call forwarding
Call waiting
CLIP (Calling Line Identification Presentation)
CLIR (Calling Line Identification Restriction)
Three-party conference
Advice of change
Malicious call identification
Advantages of ISDN
Digital services with less error.
Direct fast connection with no dialing.
Higher bandwidth (Takes less time in downloading material).
Supports multiple users.
Able to use ISDN for more than one task.
Disadvantages of ISDN
ISDN is more expensive to install than a standard telephone.
Not easy to set up.
All exchanges do not provide ISDN service.
Internet Accounts by ISP
1.Protocol Options
Secure Shell (SSH)
Secure Shell or SSH is a network protocol that allows data to be
exchanged using a secure channel between two networked
devices.
It is used primarily on Linux and Unix based system to access shell
accounts, SSH was designed as a replacement for Telnet and other
in secure remote shells, which send information, notably
passwords, in plain text, leaving them open for interception.
The encryption used by SSH provides confidentially and integrity of
data over an insecure network, such as the Internet.
SSH is typically used to log into a remote machine and execute
commands
SLIP:
1. Service
Options E-mail
E-mail (electronic mail) is the exchange of computer stored
messages by telecommunication.
E-mail is a system of worldwide communication in which a
computer user can compose a message at one terminal that can be
regenerated at the recipient’s terminal when user Logs in.
Thus E-mail is a system of sending and receiving messages
electronically over a network, as between personal computers.
WWW:
Firewall:
They work as filters for network traffic by blocking incoming
packets of information that are seen as unsafe.
In large corporations, if a firewall is not in place, thousands of
computers could be vulnerable to malicious attacks.
Firewalls should be placed at every connection to the internet
and are also used to control outgoing web traffic as well in large
organizations.
Chapter 4
4.1Network Definition
4.1.1Network Definition
4.2Common
Terminologies 4.3.1
LAN
4.3.2LAN Applications
4.3.3 WAN
4.3.4 WAN Connection Types
4.3.5Node
4.3.6Host
4.3.7 Workstation
4.3.8Bandwidth
4.3.9Interoperability
4.3.10 Network Administrator
4.3.11 Network Security
4.3Network
Components 4.4.1
Severs
4.4.2Clients
4.4.3Communication Media
4.4Types of Network
4.4.1Peer to Peer
4.4.2Client Server
4.5Addressing in Internet
4.5.1DNS
4.5.2Domain Name and their Organization
4.5.3Understanding the Internet Protocol Address
4.6Network Topologies
4.6.1Bus
4.6.2Star
4.6.3Ring
4.7Ethernet
4.7.1Ethernet
4.8FDDI
4.8.1FDDI
4.9 ATM
4.9.1 ATM
4.9.2Star
4.9.3Ring
4.10 Ethernet
4.10.1 Ethernet
4.11 FDDI
4.11.1 FDDI
4.12ATM
4.12.1 ATM
Network Definition:
A network is any collection of independent computers that
communicate with one another over a shared medium.
A computer network is a collection of two or more connected computers.
When these computers are joined in a network, people can share
files and peripherals such as modems, printers and tape backup
drives.
Common Terminologies:
1.Local Area Network (LAN):
LAN is a group of computers and network communication devices
within a limited geographical area such as home, school and office
building.
The devices used in this network can be connected via wired cable
or wireless links.
LAN Applications
LANs are mostly used in office environment.
In an office environment it is mainly used for three purposes.
Sharing
Interoffice Communication
Internet Communication
Sharing
Sharing Hardware
Users can be connected through Local Area Network to the
single printer or data storage.
Jobs from each user are queued in that single printer.
Sharing Software
Through LAN connection users can share programs such as
accounting programs, which is stored in a single machine.
Sharing Data
Sharing of large database between the users is also another
big advantage.
4 .3.3 Wide Area Network (WAN):
Dedicated connection.
Circuit switching.
Packet switching.
Dedicated connection
Interoperability
Network Administrator
Network Security
Servers
Server is just like any other computer of the network however it can
be distinguished with its large storage capacity and the role that is
assigned to it.
This is the administrator that controls functioning of other computers
and responsible for the division of labor among computers in a shared
network.
Main computer that provides services to other computers, which holds
stored files, programs and network operating system.
Clients
Any computer that is the part of a common network other than the
server is called as Client.
The division is based on the storage capacity and responsibility of the
computer.
For example, a server has a large storage area and its responsibilities
are pretty different than client computers.
The client computer access network and shared resources provided
by the server.
It is less powerful than server computer.
Communication Media
Advantages
INTERNET
Internet TECHNOLOGY
domain names ANDby
are organized WEB
theirDESIGN
levels, with the
higher levels on the right.
Every domain name ends with a top-level domain label.
For example, for the domain "www.twenty.net", the top-level domain is
"net".
Some of the Top-level Domains are
gov - Government sites
edu - Educational institutions
org - Organizations (nonprofit)
mil - Military sites
com - Commercial business
net - Network organizations
Second-level domains
Top-level Internet domains like ".com" are shared by all the
organizations in the domain.
Second-level domain names like "yahoo.com" and
"livinginternet.com" are registered by individuals and
organizations.
E-Content of
To view the IP address user can use the ipconfig (IPCONFIG) command
line tool.
Ipconfig displays all current TCP/IP network configuration values and
refreshes Dynamic Host Configuration Protocol (DHCP) and Domain
Name System (DNS) settings.
User can also use Google search to find the IP address. Type what is my
IP address as a search box and Google will show the IP address of the
computer from which the query was received as the top search result.
The Format of an IP Address
A static INTERNET
IP address TECHNOLOGY AND WEB
will never change and itDESIGN
is a permanent Internet
address.
A dynamic IP address is a temporary address that is assigned each
time a computer or device accesses the Internet.
E-Content of
Bus Topology
Bus topology also called horizontal topology.
In bus topology, multiple devices are connected one by one, by
means of single cable.
When one computer sends a signal up the wire, all the computers on
the network receive the information, but only one accepts the
information, the rest discard the messages.
The central cable is the backbone of this network and is known a bus.
Bus is passive topology because it requires termination.
Advantages
Easy to use and easy to install.
Needs fewer physical connectivity devices.
A repeater can also be used to extend a bus topology network.
Low cost.
Disadvantages
Heavy network traffic can slow a bus considerably.
It is difficult to troubleshoot a bus.
E-Content of
Star Topology
A star topology consists of a number of devices connected by point-to-
point links to a central hub.
In star topology, every node (computer workstation or any other
peripheral) is connected to a central node called a hub or switch.
A star network consists of one central switch, hub or router, which
acts as a conduit to transmit messages.
Ring Topology
In a ring topology, each computer is connected to the next
computer; with last one connected to the first.
Data travel from node to node, with each node along the way
handling every packet.
Because a ring topology provides only one pathway between any two
nodes, ring networks may be disrupted by the failure of a single link.
The signals travel on the cable in only one direction.
Each computer retransmits what it receives.
Ring is an active network.
In this, termination is not required.
Advantages
Cable failures are easily found.
Because every node is given equal access to the token, no one
node can monopolize the network.
E-Content of
Ethernet
Ethernet is a physical and data link layer technology for Local Area
Network (LANs).
Ethernet was invented by engineer Robert Metcalfe.
When first widely deployed in the 1980s, Ethernet supported a
maximum theoretical data rate of 10 megabits per second (Mbps).
Later, Fast Ethernet standards increased this maximum data rate to
100Mbps.
Gigabit Ethernet technology further extends peak performance up to
1000Mbps and 10 Gigabit Ethernet technology also exists.
Higher level network protocols like Internet Protocol (IP) use Ethernet
as their transmission medium. Data travels over Ethernet inside
protocol units called frames.
The run length of individual Ethernet cables is limited to roughly 100
meters, but Ethernet networks can be easily extended to link entire
schools or office buildings using network bridge devices.
E-Content of
FDDI
Features of FDDI
Intranet
Intranet, extranet, and the Internet are all networks of networks.
"Intra" means "internal" or "within," + network.
The major difference between the three classes of networks is the
aspect of network traffic control (i.e., who are the participants in the
network).