Computer Networks 2024-25-1
Computer Networks 2024-25-1
Network
A Computer Network, or simply a Network, is a collection of
computers and other hardware components interconnected by
communication channels that allow sharing of resources and
information
More than one computer interconnected through a
communication medium for information interchange is called a
computer network.
Two computers are said to be interconnected if they are capable
of sharing and exchanging information.
Advantages:
Disadvantages:
✓ Expensive setup.
✓ Insecure.
✓ Rapid Spread of Computer Viruses.
✓ Depends on the Main File Server
1
EVOLUTION OF NETWORK
The network did not evolve in a single day, rather, it took decades to become more powerful,
efficient and reliable. The network has passed through several stages which are mentioned below:
Internet: In the 1990's, internet, which is a network of networks, came into existence. The internet
has evolved from ARPANET. The computers are connected through World Wide Web that
comprises a large network and shares a common communication protocol (Transmission Control
Protocol-Internet Protocol, TCP/IP). It allows computers of different types to exchange
information and is known as internet. Millions of domestic, business and government networks
are connected with each other for the purpose of sharing files, data, email, etc. Most of the
computers are not connected directly to the internet. Instead, they are connected to smaller
networks which are further connected to a backbone network through gateways.
2
Network of networks makes the internet.
HOW DOES INTERNET WORK
One of the greatest things about the internet is that nobody really owns it. It is a global collection
of networks, both big and small. These networks connect together in many different ways to form
the single entity that we know as internet. In fact, the very name comes from this idea of
interconnected networks.
The Internet Society, a non-profit group established in 1992, oversees the formation of the
policies and protocols that define how we use and interact with the internet.
Every computer that is connected to the internet is part of a network, even the one in our home.
For example, we may use a modem and dial a local number to connect to an Internet Service
Provider (ISP). At work, a computer may be part of a Local Area Network (LAN), but it most
likely still connects to the internet using an ISP that the company has contracted with. When it
connects to the ISP, it becomes part of their network. The ISP may then connect to a larger network
and become part of their network. The internet is simply a network of networks.
Most large communication companies have their own dedicated backbones connecting various
regions. In each region, the company has a Point of Presence (POP). The POP is a place for local
users to access the company’s network, often through a local phone number or dedicated line. The
amazing thing here is that there is no overall controlling network. Instead, there are several
highlevel networks connecting to each other through Network Access Points or NAPs.
How it functions smoothly: Every computer connected to the internet uses the same set of rules
for communication. A set of rules is called protocol. Communication protocol used by internet is
TCP/IP. The TCP (Transmission Control Protocol) part is responsible for dividing the message
into packets on the source computer and reassembling them at the destination computer. The IP
3
(Internet Protocol) is responsible for handling the address of the destination computer so that
the packet is sent to its proper destination.
IP Address:
The computers connected to a network also need to follow some rules to communicate with each
other. These sets of rules are known as protocols. Several types of protocols are used for
communication over networks. However, the most common one is the Transmission Control
Protocol/Internet Protocol or TCP/IP. A network using TCP/IP is known as a TCP/IP network.
The internet is an example of the TCP/IP network. Therefore it becomes important that each device
should have a unique address to identify it on a TCP/IP network. This unique address is known as
IP address. IP address is short for Internet Protocol (IP) address. An IP address is an Identifier for
a computer or device on a TCP/IP network. Networks using the TCP/IP protocol route messages
based on the IP address of the destination.
1 IPv4 (Internet Protocol Version 4): IPv4 is the older and more widely deployed version of IP
addressing it uses a 32-bit addressing scheme which are structured as a series of four sets of
numbers, separated by periods, for example 192.168.0.3. Each set can range from 0 to 255 Due to
the growing number of devices connecting to the internet, the available pool of IPv4 addresses is
becoming depleted
2 IPv6 (Internet Protocol Version 6): IPv6 introduced to address the limitation of IPv4 It uses
128-bit addressing scheme, represented as eight sets of hexadecimal digits separated by colons for
example. 2001: 4d10:3240:198d:0000:8a2e:0370:7334
IPv6 provides a significantly larger address space; allowing for trillions of unique IP addresses.
The IP address of a computer is assigned by the internet Service Provider (ISP) whose internet
connection is used on that computer.
4
resources. Since it does not double up as a workstation but only manages the network, so
it is known as a dedicated server and such type of networks are called master- slave
networks.
b) Non dedicated servers: In small networks, a workstation can double up as a server.
These servers are known as non-dedicated servers. The small networks using such a server
are known as Peer to Peer networks.
Network Interface Unit (NIU) (MAC Address): A network interface unit is an interpreter
that helps in establishing communication between the server and the client. It is also called
network adapter, LAN adapter or network interface controller.
IP Address: Every machine on a TCP /IP Network has a unique identifying number called
an IP Address.
Domain Name: It is a way to identify and locate the computers connected to the internet.
It must be unique.
Data Communication
The term “Data Communication” comprises two words: Data and Communication. Data can be any text,
image, audio, video, and multimedia files. Communication is an act of sending or receiving data. Thus, data
communication refers to the exchange of data between two or more networked or connected devices. These
devices must be capable of sending and receiving data over a communication medium. Examples of such
devices include personal computers, mobile phones, laptops, etc.
Sender: A sender is a computer or any such device which is capable of sending data over a network.
It can be a computer, mobile phone, smartwatch, walkie-talkie, video recording device, etc.
Receiver: A receiver is a computer or any such device which is capable of receiving data from the
network. It can be any computer, printer, laptop, mobile phone, television, etc. In computer
communication, the sender and receiver are known as nodes in a network.
5
Message: It is the data or information that needs to be exchanged between the sender and the
receiver. Messages can be in the form of text, number, image, audio, video, multimedia, etc.
Communication media (Transmission Medium): It is the path through which the message travels
between source and destination. It is also called medium or link which is either wired or wireless.
For example, a television cable, telephone cable, Ethernet cable, satellite link, microwaves, etc.
Protocols: It is a set of rules that need to be followed by the communicating parties in order to
have successful and reliable data communication.
Network Switching
A network is made up of several interconnected nodes. There can be a point-to-point connection
or star topology between pairs of devices, but both are not relevant for a large network. Hence,
various switching techniques are used to transfer packets of data from one port of a node to another.
A switched network is made up of a series of interconnected nodes called switches.
Switching Techniques
The main goal of networking is the reliable exchange of data or information among several
interconnected nodes. For the delivery of data with accuracy, various types of switching techniques
are used, namely:
1. Circuit Switching 2. Packet Switching 3. Message Switching
The technique of sending data across the network is known as Switching technique. The three
types of techniques used are circuit switching, packet switching and message switching.
Circuit Switching
This provides end-to-end connection between two computers. Circuit switching is established
usually in a telephone network where one person is making a call and another is receiving a call.
In telephone system, the communication must be established between the two participants, i.e., the
sender and the receiver. The circuit is established between these two participants before the transfer
of data takes place.
Circuit Switching
6
In this technique, the entire link remains dedicated and no other user can use it even if the path
remains idle. The following actions take place during circuit switching:
1. A request signal is sent by the sender to set up the connection with the receiver. It
establishes a physical connection between the two participants.
2. All intermediate nodes are identified. These nodes are also called switching nodes.
3. If the destination node is available, it sends back the acknowledgement of receiving a
signal. Hence, data transmission begins.
4. When the data transmission is complete, the call can be terminated.
Circuit switching is a connection-oriented service. In this technique, there is a dedicated link
‘between the sender and the receiver and no other call can be made during this link, even if
the link remains idle.
Packet Switching
In packet switching technique, the entire data is divided into small fragments called packets. Each
packet is of a fixed size, usually 128 bytes or 512 bytes. Packet switching is similar to post office
operation. Each packet has a source address as well as destination address (IP address) for being
transmitted, in the same way as a postman delivers a letter to a specific destination address. As
there is no direct connection established between the sender and the receiver, each packet follows
different routes and, therefore, the packets are delivered in a random order at the destination
address. It is the TCP protocol which then arranges all received packets in a sequential order.
During the transfer of packets, each packet has to pass through several intermediate nodes, so each
intermediate node checks for destination IP address. If the packet matches with the node address,
it is received; otherwise it is passed on to the next node until it reaches the destination IP address.
Packet Switching
Packet switching offers a connectionless service. Data is fragmented into small packets and
each packet is of fixed size in packet switching technology.
Message Switching
In message switching, the sender sends the data to a switching office first, which is then stored in
its buffer. It then checks the available link and if it is free, the data is relayed to another switching
office. This process goes on until the data is sent to the destination (receiver). As the data is first
stored in a buffer and then sent to the next switching office, it is also called store and forward
switching technique.
Message switching is a store and forward switching technique where there is no direct
7
connection between the sender and the receiver.
Channel: A channel is a communication path through which the data is transmitted from the
sender device to the receiver device.
Baud: The number of changes in a signal per second is known as baud. It is the measuring unit of
the data transfer rate. Technically, baud refers to a number of discrete signal elements transmitted
per second. 1 baud represents only 1 signal change per second and is equivalent to 1 bit per second.
Bits per second: It is the measuring unit of speed at which data transfer takes place.
Bandwidth: The amount of data that can be passed along a communication channel in a given
period of time (1 second) is termed as bandwidth. The measuring unit is hertz (Hz), where 103 Hz
= 1 Kilo Hertz (KHz), 103 KHz = 1 Mega Hertz (MHz).
If the highest frequency is 80 Hz and lowest frequency is 50 Hz then the bandwidth of a signal:
B=80-50
=30 Hz
Data and Signals: Information that is stored within computer systems and transferred over a
computer network can be divided into two categories—data and signals. Data are entities that are
stored in the form of 0’s and 1’s, which convey some special meaning to the computer system.
When this data is transmitted from one place to another, it is converted into signal. Signals are the
electric or electromagnetic encoding of data and are used to transmit data.
8
Communication/Transmission Media: It is a means of communication or access (lignes of
communication) set up between two organizations to exchange data/information. Communication
media is the way of transmitting the signal from one place to another. Communication media is
also known as transmission media. It plays an important role in sending and receiving of data to
and from the sender and receiver.
Data Transfer Rate: It is the amount of data transferred in one direction over a link divided by
the time taken to transfer it in bits per second (bps). The various measuring units are bits per second
(bps) and bytes per second (Bps) or baud, kilobits per second (kbps), megabits per second (mbps),
gigabits per second (gbps), terabits per second (tbps.)
NETWORK DEVICES
Working of Modem
We know that computers store and process data in terms of 0s and 1s. However, to transmit data
from a sender to a receiver, or while browsing the internet, digital data is converted to an analog
signal and the medium (be it free-space or a physical media) carries the signal to the receiver.
There are modems connected to both the source and destination nodes. The modem at the sender's
end acts as a Modulator that converts the digital data into analog signals while the modem at the
receiver's end acts as a Demodulator that converts the analog signals into digital data for the
destination node to understand.
RJ-45 Connector: RJ-45 is a standard type of connector for network cables. The RJ-45
(Registered Jack) connectors are the plug-in devices used in networking and telecommunications
applications. They are used primarily for connecting LANs, particularly Ethernet.
RJ-45 Connector
RJ-45 is a short term for Registered Jack-45. It is an eight-wire connector used to connect
computers on LANs, especially Ethernets.
9
Ethernet Card: It is a hardware device that helps in the connection of nodes within a network.
Ethernet card is also known as a network card, network adapter or NIC (network interface card).
It is a card that allows computers to communicate over a computer network. On Ethernet card, a
physical address of each communicating computer is mentioned. Physical address is known as
MAC address.
Hub: It is multi-port and unintelligent network device which simply transfers data from one port
of the network to another. A hub is a hardware device used to connect several computers together
with different ports. When the packet reaches one port, it is copied to all other ports of the hub
without changing the destination address in the frame. Rather, it simply copies the data to all of
the nodes connected to the hub.
Hubs can be either active or passive. Hubs can usually support 8, 12 or 24 RJ-45 ports.
But the problem with hub is that it is not an intelligent device. It shares bandwidth with all the
attached devices and broadcasts the data, i.e., sends the data frames to all the connected nodes, as
it does not remember devices/computers connected to it. Also, it cannot filter the data and causes
unnecessary traffic jams.
A hub can both send as well as receive information, but only one task at a time. However, a hub
is an inexpensive way to connect multiple nodes/devices to network.
Switch: A switch (switching hub) is a network device which is used to interconnect computers or
devices on a network. It filters and forwards data packets across a network. It is also a multi-port
device but with some intelligence and so the data packets received from one port of network are
refreshed and delivered to the other port of the network. The main difference between hub and
switch is that hub replicates what it receives on one port onto all the other ports, while switch keeps
a record of the MAC addresses of the devices attached to it.
Switch
Bridge: A bridge is a device that works on the physical layer as well as on data link layer. A
network bridge connects multiple network segments at the data link layer (layer 2) of the OSI
model. Bridges relay frames between two originally separate segments. When a frame enters a
10
bridge, the bridge not only regenerates the signal but also checks the physical address of the
destination and forwards the new copy only to that port.
An important advantage of using a bridge is that it is a smarter hub as it can filter network traffic
on the basis of the MAC addresses.
Bridge
A bridge is a device that links two segments together of the original network.
Gateway: A gateway is a device that connects dissimilar networks. In internet, several networks
are communicating with each other and each network has a different configuration. In order to
make reliable communication, there must be a device that helps in communicating.
Gateway is a device which establishes an intelligent connection between a local area network and
external networks with completely different structures.
Gateway
Gateway is a device which establishes an intelligent connection between a local area network
and external networks with completely different structures.
Gateway is a device that connects dissimilar networks.
Repeater: A repeater is a device that operates only on the physical layer of the OSI model. As a
signal travels a fixed distance, before attenuation of the signal, a repeater is used which amplifies
and restores signals for long-distance transmission. A repeater is an electronic device that receives
a signal before it becomes too weak and regenerates the original signal.
Also, it is a two-port network device that strengthens the signal intensity and connects two identical
networks. In most twisted pair Ethernet configurations, repeaters are required for cable runs longer
than 100 metres. A repeater does not change the functionality of the network; instead, it makes the
signal strong before it degrades. Repeaters are also extensively used in broadcasting where they
are termed as translators or boosters.
11
Working of a Repeater
Repeater is a device that amplifies a signal that is transmitted across the network so that the
signal is received in the same way as it is sent.
Router: A routers is a networking device that forwards data packets from the source machine to
the destination machine by using the shortest path. Routers are used at the network layer, which is
the third layer of the OSI model.
A router uses IP address to connect a local area network to the internet Compared to a hub or a
switch, a router has advanced capabilities as it can analyze the data being carried over a network,
decide/alter how it is packaged, and send it to another network of a different type. For example,
suppose data has been divided into packets of a certain size and these packets are to be carried
over a different type of network which cannot handle bigger packets. In such a case, the data is to
be repackaged as smaller packets and then sent over the network by a router.
Router
A router is a networking device that helps in forwarding packets from one machine to another.
Wi-Fi Card: A Wi-Fi card is either an internal or external Local Area Network adapter with a
built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables a user
to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards as they allow
the user to set up connection without any wire. Wireless Fidelity (Wi-Fi) cards are widely used in
notebook computers due to their highly portable nature. The most common Wi-Fi cards used in
desktop computers are PCI-Express Wi-Fi cards made to fit the PCI- Express card slots on the
motherboard.
12
Firewall
A firewall is a device, or a piece of software that is placed between your computer and the rest of the
network (where the hackers are!)
If you wish to protect your whole LAN from hackers out on the Internet, you would place a firewall
between the LAN and the Internet connection.
A firewall blocks unauthorised connections being made to your computer or LAN. Normal data is
allowed through the firewall (e.g. e-mails or web pages) but all other data is blocked.
Types of Firewall
Network Firewall: If the firewall is placed between two or more networks and monitors the network traffic
between different networks, it is termed as Network Firewall.
Host-based Firewall: If the firewall is placed on a computer and monitors the network traffic to and from
that computer, it is called a host-based firewall.
Difference between Hub, Switch and Router
S. No Hub Switch Router
13
2. It functions based on It functions based on MAC It functions based on IP
broadcasting. addresses. addresses.
4. Hubs are not smart A Switch is a smart and wise Routers are basically tiny
gadgets because they pass device as it gives a message to computers that accomplish
on everything obtained on a specific device by scanning a variety of intelligent jobs.
one connection to all other the address. They can also help in
connections. building address tables that
support routing decisions.
Networks A router routes various data A gateway acts as a connection between two
packets via a similar set of very dissimilar networks.
networks.
Associated You can also call a router an You can also call a gateway a voice gateway,
Terms internet router or a wireless proxy server, or gateway router.
router.
TYPES OF NETWORKS
A computer network may be small or big depending upon the number of computers and other
network devices linked together Thus, networks vary in size, complexity and geographical spread
A computer network can be on a table, in a room, building city, country, across continents or
around the world. Computer networks can logically be divided into two types:
1. Client-Server network
14
2. Peer-to-Peer network
Client Server network: In Client-Server network, multiple clients or workstations are connected
to at least one central server. A server is a powerful computer with all applications and hardware
installed in it and a client is a computer which seeks any resource from another computer. When
clients need access to these resources, they access them from the server. This network is used for
larger networks.
Peer-to-Peer network: In Peer-to-Peer network, all nodes in the network have equivalent
capability and function as both client and server. In this network, all workstations are connected
together for sharing devices, information or data. This network is ideal for small networks where
there is no need of dedicated servers.
Personal Area Network (PAN): PANs are small networks used to establish communication
between a computer and other handheld devices in the proximity of up to 10 metres using wired
USB connectivity or wireless systems like Bluetooth or Infrared. PANs are used to connect
computers, laptops, mobiles and other IT-enabled devices to transfer files including emails, digital
photos, audio and video, etc. The Bluetooth technology implements PAN. PAN may include
wireless computer keyboard and mouse, Bluetooth-enabled headphones, wireless printers and TV
remotes.
Local Area Network (LAN): LAN is a privately owned computer network covering a small
geographical area (small physical area), like a home, office or a building such as a school. It can
cover an area spread over a few metres to a radius of a few kilometres.
Occasionally, a LAN can span a group of nearby buildings. In addition to operating in a limited
space, a LAN is owned, controlled and managed by a single person or organization. A LAN can
15
be set up using wired media (UTP cables, coaxial cables, etc.) or wireless media (Infrared, Radio
waves). If a LAN is set up using unguided media, it is known as WLAN (wireless LAN). The key
purpose of a LAN is to share resources. LAN users can share data, programs, printer, disk, modem,
etc.
Metropolitan Area Network (MAN): MAN is larger than a LAN and can cover a city and its
surrounding areas. A MAN usually interconnects a number of LANs and individual computers. It
also shares the computing resources among users. All types of communication media (guided and
unguided) are used to set up a MAN. A MAN is typically owned and operated by a single entity
such as a government body or a large corporation. A good example of MAN is the interconnected
offices of a Multinational Corporation (MNC) or cable television networks available in the whole
city.
Wide Area Network (WAN): WAN is a telecommunication network. This type of network
spreads over a large geographical area across countries and continents. WANs are generally used
to interconnect several other types of networks such as LANs, MANs, etc. They facilitate fast and
efficient exchange of information at a high speed and low cost. A WAN uses common carriers like
satellite systems, telephone lines, etc. WAN can cover an area with a radius spanning hundreds of
16
kilometres. A network of ATMs, banks, government offices, international organizations’ offices,
etc., spread over a country, continent or covering many continents are examples of WAN.
All types of communication media (guided and unguided) are used to set up a WAN. The best
known example of a WAN is the internet. The internet is the largest WAN spanning the entire
planet.
The following table summarizes the characteristics of PANs, LANs, MANs and WANs.
17
The error rate in LANs is lower than that in WANs because of the short distances involved
in LANs. The error rate in LANs is approximately one thousand times less than that in
WANs.
As LANs are limited by distance, an entire LAN is usually under the control of a single
entity, such as an organization. On the other hand, WANs are usually operated and
controlled by multiple organizations.
Thus, we can say that in comparison to WANs, LANs cover a limited area but they operate with
high speed and low error rates.
NETWORK TOPOLOGIES
Topology is a way of connecting devices with each other either physically or logically. Two or
more devices make a link and two or more links form a topology. It is basically a geometrical
representation of how a network is laid out.
Types of Topologies
Mesh Topology: In mesh topology each computer is connected with the other computer. There is
a point-to-point link between each dedicated node (workstation). In this type of topology, the link
carries traffic only between the two connected devices. A fully connected mesh network has n(n–
1)/2 links, where n is the total number of connecting nodes.
For example, if there are five computers and each is connected with the other one, then there will
be 5(5–1)/2=10 links.
Mesh Topology
Advantages of Mesh Topology
Each communicating device carries its own data through its own dedicated link, hence
eliminating traffic problems.
A mesh topology is robust. If one link becomes unusable, it does not affect the entire
system.
Expansion and modification in topology can be done without disrupting other nodes.
18
There is the advantage of privacy or security of data. When every message travels along a
dedicated line, only the intended recipient sees it. Physical boundaries prevent other users
from gaining access to messages.
Point-to-point links make fault identification and fault isolation easy. Traffic can be routed
to avoid links with suspected problems. This facility enables the network manager to
discover the precise location of the fault and aids in finding its cause and solution.
When there is a point-to-point link between each computer in a network, it forms mesh
topology.
Star Topology: In star topology, each communicating device is connected to a central controller
called hub or switch. (A hub is a hardware device used to connect several computers together).
Unlike mesh topology, the devices in star topology send and receive data indirectly; the data passes
to and from the hub. If the data is required to be sent from one computer and received by another
computer, then this can be accomplished only by the central controller as each data is first sent to
the hub, which then relays that data to the destination computer. Most popular and widely used
LAN technology, Ethernet, currently operates in Star Topology.
Star Topology
19
It is easy to detect faults in this network as all computers are dependent on the central hub.
This means that any problem which makes the network non-functioning can be traced to
the central hub.
The rate of data transfer is fast as all the data packets or messages are transferred through
central hub.
As the nodes are not connected to each other, any problem in one node does not hamper
the performance of other nodes in the network.
Removal or addition of any node in star topology can take place easily without affecting
the entire performance of the network.
Bus Topology
Bus topology is a multipoint configuration, i.e., several devices are connected to a main long cable
which acts as a backbone. Nodes are connected by drop lines and taps. A drop line is a connection
between the long cable and devices and taps are the connectors that are punctured inside the main
cable. The data flows from one end of the cable to the other.
However, as the signal travels a long distance, it becomes weaker and weaker.
Bus Topology
20
When the network is required in more than one building, bus network cannot be used.
The signal becomes weaker if number of nodes becomes large.
Performance degradation occurs with the increased number of nodes.
Collision of data can take place because several nodes can transmit data to each other at
one time.
There is a main cable which is connected to several workstations through taps. Collision of
data can take place in bus topology.
Ring Topology
In ring topology, each node is connected to two other nodes on either side of it, forming a ring
network. It shows the line configuration in which each node is connected to one predecessor node
and one successor node. Signal is transmitted only in one direction along the entire ring in a circular
fashion. In ring topology, each device is incorporated with a repeater to strengthen the signal as a
signal passes through all nodes in the entire network. When the data is transmitted from one node
to its recipient node, then the intermediate node regenerates the signal and passes the signal to the
destined node.
21
Transmission speed becomes slower with an increase in the number of nodes.
If there is a fault or break in a cable to which all other nodes are connected, the entire
network shuts down.
For proper communication between each node, it is required that each computer must be
turned on.
In ring topology, each workstation is connected with the predecessor node as well as with the
successor node and, thus, forms a ring. Data is transmitted only in one direction.
Tree Topology
In tree topology, all or some of the devices are connected to the central hub, called an active hub,
and some of the devices are connected to the secondary hub, which may be an active hub or passive
hub. An active hub contains the repeater that regenerates the signal when it becomes weaker with
longer distances. A passive hub simply provides a connection between all other connecting nodes.
Tree Topology
Advantages of Tree Topology
The tree topology is useful in cases where a star or bus cannot be implemented individually.
(b) It is most suited in networking multiple departments of a university or corporation,
where each unit (star segment) functions separately, and is also connected with the main
node (root node).
The advantages of centralization that are achieved in a star topology are inherited by the
individual star segments in a tree network.
Each star segment gets a dedicated link from the central bus. Thus, failing of one segment
does not affect the rest of the network.
Fault identification is easy.
The network can be expanded by the addition of secondary nodes. Thus, scalability is
achieved.
22
Owing to its size and complexity, maintenance is not easy and costs are high. Also,
configuration is difficult in comparison to other topologies.
Though it is scalable, the number of nodes that can be added depends on the capacity of
the central bus and on the cable type.
In tree topology, the main central hub is connected to the secondary hub through which all
devices are connected with each other. Tree topology is just like a parent-child relationship.
Factors are taken into consideration before selecting a topology which are as follows:
Cost
Flexibility
Reliability
For better performance, the transmit and receive operations can occur over separate cables or wires,
or they can occur in turns over the same wire by using different transmission techniques. A P-P
link can be established in several ways. The simplest way is to install a P-P link between each pair
of computers over a network.
COMMUNICATION MEDIA
Communication media is also known as transmission media through which data or signal is
transferred between two communicating devices, i.e., from one system to another system, through
wires or without wires. If the data is sent across network through wires, it is called guided media
and if the data is sent without wires, it is called unguided media.
Communication media is a transmission media used for sending data or signal across the
network.
23
Guided Media (Wired Media): Guided media is also known as physical or conducted
media. These media use wires for transmitting data. Various wired connections are twisted
pair wire, coaxial cable and fibre optic cable.
Unguided Media (Wireless Media): A transmission media that does not require the use of
cables for transmission of data is known as unguided media. Wireless transmission is also
known as unguided media or non-physical media as the transmission takes place through
various types of electromagnetic waves, such as radio waves, terrestrial microwave
transmissions, satellite transmissions, cellular radio systems, infrared transmissions, etc.
24
Unshielded twisted pair (UTP): UTP has seven categories, each suitable for a specific use.
In computer networks, mostly Cat-5, Cat-5E and Cat-6 cables are used. UTP cables are
connected by RJ-45 connectors.
Coaxial Cable
A coaxial cable is generally called a coax wire. It consists of insulated copper wires surrounded
by a braided metal shield and covered in a plastic jacket. Coax cables are capable of carrying
higher frequency signals than that of twisted pair cables. The wrapped structure provides it a good
shield against noise and crosstalk. Coaxial cables provide high bandwidth rates of up to 450 mbps.
Coaxial cable also comes in two primary physical types: thin coaxial cable and thick coaxial cable.
There are three categories of Coax cables, namely RG-59 (Cable TV), RG-58 (Thin Ethernet) and
RG-11 (Thick Ethernet). RG stands for Radio Guide. Coax cables are widely used for internet
connections and cable televisions.
Coaxial Cable
Advantages of Coaxial Cable
Coaxial cable can support greater cable lengths between network devices than twisted pair
cable.
25
It is useful for transmitting analog as well as digital data across the network. For analog
data transmission, 75 ohm broadband coaxial is used and for digital transmission, 50 ohm
baseband cable is used.
It is widely used for cable television and internet connections.
Coax are used for transmitting several channels simultaneously, i.e., they are helpful in
broadband transmission.
Coaxial cable has excellent noise immunity because of thick covering outside the insulated
wires.
Thick coaxial cable has an extra protective plastic cover that helps keep moisture away.
It is relatively inexpensive as compared to fibre optic cable.
Disadvantages of Coaxial Cable
Thick coaxial cables do not bend easily and thus are difficult to install.
It is expensive as compared to twisted pair cable.
26
Disadvantages of Fibre Optic
A highly skilled labour is required for its installation and maintenance.
It is relatively expensive as compared to other guided media.
As fibre optic is made of glass, they can be easily broken.
As light travels in a straight line, two fibres are needed if we need bidirectional
communication.
Microwave
Microwave signals are used to transmit data without the use of cable. It is a line-of-sight
transmission as signal travels in a straight line. In microwave communication, two directional
parabolic antennas are mounted on towers, buildings or hills to send and receive signals through
air. However, they must be properly aligned with each other, otherwise the signal will not be
focused well at the receiving antenna.
Microwave
Advantages of Microwave Transmission
It is a cheaper source of communication as it avoids using cables and maintaining repeaters.
Communication through microwave is much easier over difficult terrain.
Microwave system permits data transmission rate of about 16 gigabits per second.
Disadvantages of Microwave Transmission
It is an insecure mode of communication.
Signals can be split and propagated in different directions in air and received by the
receiver antenna with a reduced strength.
Microwave propagation is affected by weather conditions such as rain, thunderstorm, etc.
The cost of implementing towers, antennas is relatively high.
Radio Waves
27
Radio waves use radio frequencies which are allocated to private businesses for direct voice
communication. A radio set-up uses transmitter and receiver. A transmitter sends radio waves and
encodes them into sine waves which, when received by a receiver, are decoded and the message is
received. Both the transmitter and receiver use antennas to radiate and fetch radio signals. They
are not line-of-sight transmission and, hence, can penetrate buildings easily.
Radio Waves
Advantages of Radio Waves
They can be used indoors or outdoors.
They are omnidirectional and can travel in any direction.
Transmitter and receiver antenna do not need to be physically aligned.
Radio wave transmission offers mobility.
It is cheaper than laying cables and fibres.
It offers ease of communication over difficult terrain.
Disadvantages of Radio Waves
Radio wave communication is an insecure mode of communication.
Radio wave propagation is susceptible to weather effects like rain, thunderstorm, etc.
Satellite Link
Satellite transmission is also a kind of line-of-sight transmission that is used to transmit signals
throughout the world. When the frequency is greater than 3 GHz, the transmission is known as
microwave. Satellite is a special type of microwave transmission medium.
It provides various types of services such as transmitting fax, voice data, video, email and other
internet applications. In satellite communication, an earth station has a satellite dish, which
functions as an antenna to transmit and receive data from satellites.
When data is transmitted from an earth station to a satellite, it is known as uplink and when
transmission takes place from a satellite to an earth station, it is known as downlink. In satellite,
there are transponders that send and receive signals from/to the earth station.
28
The area covered is quite large.
No line-of-sight restrictions such as natural mountains, tall buildings, towers, etc.
Earth station which receives the signals can be at a fixed position or can be relatively
mobile.
Disadvantages of Satellite Link
It is very expensive as compared to other transmission mediums.
Installation is extremely complex.
Signals sent to the stations can be interrupted by external interference.
Low antenna gains result in overcrowding of available bandwidth.
Infrared
The type of transmission that uses infrared light to send data is known as infrared transmission.
The data is transmitted through air and can propagate in the open space; however, it cannot
penetrate the walls of the room. It is an example of short range wireless network. Infrared speed
varies from 2.4 kbps to 16 mbps. A very good example of infrared transmission is a handheld
remote control such as remote control of a TV or AC, etc.
Wireless Technology
Wireless technology is the process of sending information through invisible waves in the air.
Information such as data, voice and video are carried through the radio frequency of the
electromagnetic spectrum. Thus, wireless communication is the transfer of information between
two or more points that are not connected by an electrical conductor. The various wireless
technologies available are described as follows:
Wi-Fi (Wireless Fidelity): Wi-Fi is wireless fidelity where communication takes place
without wires. The users share the data with each other by connecting to the broadband
internet service without using cables. As it is not a secured media of transmitting data, the
user must use privacy methods such as using passwords and make the connection security
enabled so that it does not become susceptible to hackers. For transmission of data through
Wi-Fi, a user must have a broadband connection, a wireless router and a laptop or desktop.
29
Wi-Max (Worldwide Interoperability for Microwave Access): Wi-Max is a wireless
communication system that provides broadband internet accessibility up to 30 miles. The
data transmission takes place without wires. It provides data rates up to 30 to 40 megabit-
per-second and up to 1 Gbit/s for fixed stations. Wi-Max is based on standard IEEE 802.16
technology that provides users with access to high-speed voice, data and internet
connectivity. Wi-Max uses broadband internet connection and requires a tower known as
base station to communicate with the user. Instead of wires, it uses a microwave link to
establish a connection. Internet connectivity to end-user is provided by a microwave link
between the tower and the end-user.
30
Network Protocol: A protocol is an agreement between the communicating parties on how
communication is to proceed. Protocol means a set of rules that governs a network. A protocol is
a formal description of message formats and the rules that two or more machines must follow to
exchange those messages over a network.
Types of Protocols
Protocol specifies what is communicated and how. Let us take an example to explain this concept.
In India, different people speak different languages. Now, a person from Tamil Nadu and a person
from Punjab may not be able to communicate with each other because of the language difference.
However, they can exchange their ideas and communicate with each other using English as their
common language. Similarly, in case of computers, the hardware, software or even a combination
of the two might be required to implement and carry out the protocol. Thus, the protocol will help
in setting up a channel of communication or a connection between two computers; in other words,
a hardware connection between two computers. There are multiple protocols defined for computer
networks, which are as follows:
IP (Internet Protocol)
IP is the primary protocol present in the internet layer of the internet protocol suite. It is responsible
for delivering packets from the source host to the destination host based on the IP addresses
mentioned in the packet headers. IP forwards each packet based on a four byte destination address
(the IP number). The packets are moved randomly from source to destination, which are then
assembled in a sequential order at the destination computer. IP stores destination addresses in the
form of IP addresses so that the packets will move to the destined address only by following the
shortest route.
31
FTP (File Transfer Protocol)
FTP is the simplest and most secure way to exchange files over the internet. The main objectives
of FTP are:
• Transmitting and sharing of files (computer programs and/or data).
• Indirect or implicit use of remote computers.
• To shield a user from variations in file storage systems agmong different hosts.
• To transfer data reliably and efficiently.
• FTP uses the internet’s TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the internet or to upload a file
to a server (e.g., uploading a web page file to a server).
While sharing files from one system to another, we may encounter several problems— two systems
may have different directory structures, two systems may have different filenaming conventions,
or two systems may have different ways to represent text and data. All these problems are solved
by FTP.
File transfer protocol is used to transfer files from server system to requesting node,
primarily for information sharing.
PPP is the most commonly used data link protocol. It is a protocol used to establish a direct
connection between two nodes. It can provide connection authentication, transmission encryption
and compression. It is used to connect the Home PC to the server of ISP. The communication takes
place through high speed modem. PPP is used to connect telephone dial-up lines to the internet.
Internet service provider may provide you with a PPP connection so that when you send any
request, the provider’s server can respond to your requests, forward it to the internet server, and
then forward responses back to you. For communicating through PPP, the user needs to install PPP
drivers assigned by the internet to the computer.
32
SMTP (Simple Mail Transfer Protocol)
As the name suggests, SMTP is used for sending email messages to other networks or computers.
It handles only outgoing messages and not incoming messages. SMTP does not create messages:
rather, it helps in forwarding messages between client servers. It uses TCP to send messages to
another host. For receiving messages, another protocol POP (post office protocol) is used. Thus,
email clients require addresses of both SMTP server and another server that processes incoming
messages (usually POP or IMAP). SMTP uses TCP port number 25 for standard communication.
IMAP (Internet Mail Access Protocol) is used for accessing and storing email from a mail server
over a TCP/IP connection.
Most servers these days actually use a slightly updated version of the SMTP protocol called
ESMTP (Extended Simple Mail Transfer Protocol). This was created to allow transmission of
multimedia through email. When someone sends a picture or music file through their email
program, ESMTP communication codes are used to identify the kind of data being transferred.
Multipurpose Internet Mail Extension (MIME) is a supplementary protocol that allows non ASCII
data to be sent through SMTP. Please note that MIME is not a protocol and cannot replace SMTP.
33
HTTP (Hyper Test Transfer Protocol)
HTTP is used to transfer all files and other data (collectively called resources) from one computer
to another on the World Wide Web. This protocol is used to transfer hypertext documents over the
internet. HTTP defines how the data is formatted and transmitted over the network. When an HTTP
client (a browser) sends a request to an HTTP server (web server), the server sends responses back
to the client. This transfer of requests and responses is done following HTTP protocol.
• The browser (client) sends request to the server, the server processes it and sends responses
to the client.
• It is used for displaying web pages on the screen.
HTTPS (Hyper Text Transfer Protocol Secure) HTTPS stands for Hyper Text Transfer Protocol
Secure. It is a protocol for securing communication between two systems, eg, the browser and the
web server HTTP transfers data between the browser and the web server in the hypertext format.
whereas https transfers data in the encrypted format. Thus, https prevents hackers from reading
and modifying data during the transfer between the browser and the web server. Even if hackers
manage to intercept a communication, they will not be able to use it because the message is
encrypted.
IRC is used for chatting by sending and receiving text messages. The sender sends request
to IRC server, which then forwards this request to another client to communicate with each
other.
34
VoIP (Voice over Internet Protocol)- Protocol For Audio
VoIP stands for Voice over Internet Protocol. For transferring of voice, voice over internet protocol
is used. The voice calls are first digitized, compressed and then fragmented into small packets,
which are then relayed by Internet Protocol (IP) cross network. Voice-over-IP (VoIP)
implementation enables users to carry voice traffic (For example, telephone calls and faxes) over
an IP network. So, VoIP can be achieved on any data network that uses IP, like the internet,
intranets and Local Area Networks (LAN). As the data is transmitted in the form of packets, VoIP
uses packet switching technology where each packet follows best route to reach its destination.
VoIP allows both voice and data communications to be run over a single network, which can
significantly reduce infrastructure costs.
There are 3 main causes for the evolution of the voice-over IP market:
• Low-cost phone calls
• Add-on services and unified messaging
• Merging of data/voice infrastructures
VoIP is a protocol that is used for transmitting voice data and multimedia data over internet
protocol. It uses high speed broadband internet connection.
Video conferencing is a communications technology that integrates video and audio to connect
users anywhere in the world as if they were in the same room. This term usually refers to
communication between three or more users who are in at least two locations, rather than one- on-
one communication and it often includes multiple people at each location. Each user or group of
users who is participating in a video conference typically must have a computer, a camera, a
microphone, a video screen, a sound system and internet connectivity.
Basically, this is a system that allows us to conduct meetings or trainings in different places
simultaneously. So, this technology is especially popular in the field of business because it allows
meetings or conferences to be held without the need for all the participants to travel to a single
location, saving time and money.
The most popular software used for video conferencing are: Google Meet, Ekiga , Zoom etc.
H.323
H.323 is a protocol that provides communication for multimedia services such as audio video and
data communication over packet-based network. It specifies the standards and protocols for all
these services. As H.323 provides various communication facilities, it can be applied in a wide
variety of areas-consumer, business and entertainment applications.
35
SIP
The expanded form of SIP is Session Initiation Protocol. SIP is a communication protocol (more
specifically, a signaling protocol) originally developed in 1996. It uses IP protocol that establishes,
modifies and terminates VoIP telephone calls. It provides video conferencing service to the users,
so that a user can communicate with more than one person at a time.
IP phones - IP phones appear much like an ordinary telephone or cordless phone. They are
directly connected to the router or the LAN. They have all the hardware and software necessary
right onboard to handle the IP call. IP Phones are sometimes calledVoIP telephones, SIP phones
or Soft phones.
WEB SERVICES
WWW (World Wide Web)
WWW is an information service that can be used for sending and receiving information over the
internet through interlinked hypertext documents. Web pages may contain text, images, videos and
other multimedia components as well as web navigation features consisting of hyperlinks. The
documents are formatted in a markup language called HTML (Hyper Text Markup Language) that
provides links to other documents as well as graphics, audio and video files. The World Wide Web
is based upon client-server architecture where a client sends a request and the server processes that
request and sends responses. A WWW client is called a web browser and a WWW server is called
a web server.
WWW is a set of programs and protocols that allows the user to create and display
multimedia web pages and is linked to the internet.
Hyper Text Markup Language (HTML)
HTML is a language that is used to create web pages which are then displayed by web browsers.
This language tells the browser how to display text, pictures and links on the screen. HTML is a
language that supports multimedia documents and consists of audio, video, graphics, pictures, etc.
It also helps in creating hyperlinks so that various documents can be linked together. When a
person clicks on a specified link, the document related to that link displays. HTML is a document
layout and hyperlink specification language, i.e., a language that uses various coded elements
known as tags for formatting the document and to specify the hyperlinks. HTML document can be
written using any text editor such as NOTEPAD or NOTEPAD2 and save a file with extension
either .HTM or .HTML.
HTML is a Markup language that enables users to create web pages and format them using
predefined tags. Tags are called coded elements.
DHTML- It stands for Dynamic Hyper Text Markup Language. DHTML refers to Web content
that changes each time it is viewed. For example, the same URL could result in a different page
depending on any number of parameters, such as:
geographic location
time of the day
previous pages viewed by the user
profile of the reader
36
Extensible Markup Language (XML)
Extensible Markup Language is a text-based Markup Language that allows the user to create their
own tags to store data in a structured format. However, these structured formats can be represented
in different ways. In XML, the tags are not predefined; rather, they are created by the user for their
own purpose. Unlike HTML, in XML, tags are case-sensitive and each tag must have a
corresponding closing tag. It is a general-purpose specification that allows users to create custom
Markup language. XML was designed to carry data and not to display data. For formatting data, a
separate style sheet known as cascading style sheet is used. XML is recommended by the World
Wide Web Consortium (W3C). It is a free open standard.
XML is a Markup Language for creating documents in a structured format. Users can create
their own tags along with predefined tags already defined by HTML.
Domain Names
To communicate over the internet, we can use IP addresses. But it is not possible to remember the
IP address of a particular website or computer every time. Domain names make it easier to resolve
IP addresses into names, for example, cbse.nic.in, google.com, meritnation.com, etc. It is the
system which assigns names to some computers (web servers) and maintains a database of these
names and corresponding IP addresses. Domain names are used in URLs to identify particular web
servers, for example, in the URL https://www.cbse.nic.in/welcome.htm, the domain name is
cbse.nic.in.
A domain name consists of the following parts.
1. Top-level domain name or primary domain name, and
2. Sub-domain name(s).
For example, in the domain name cbse.nic.in:
in is the primary domain name
nic is the sub-domain of in
cbse is the sub-domain of nic.
The top-level domains are categorized into following domain names:
Generic Domain Names
·com - commercial business
·edu - Educational institutions
·gov - Government agencies
·mil - Military
·net - Network organizations
·org - Organizations (non-profit)
Country Specific Domain Names
.in - India
·au - Australia
·ca- Canada
.ch- China
.nz- New Zealand
.pk- Pakistan
.jp- Japan
.us - United States of America
37
URL
URL stands for uniform resource locator that helps in locating a particular website or a web page,
for example, http://www.cbse.nic.in/academics.html is a URL for a specific website. In this URL,
‘http’ stands for hypertext transfer protocol, and ‘www.cbse.nic.in’ indicates the IP address or the
domain name where the source is located. ‘academics.html’ specifies the name of the specified
html document on the website of CBSE.
URL stands for uniform resource locator that stores the address of a web page.
IP Address
The computers connected to a network also need to follow some rules to communicate with each
other. These sets of rules are known as protocols. Several types of protocols are used for
communication over networks. However, the most common one is the Transmission Control
Protocol/Internet Protocol or TCP/IP. A network using TCP/IP is known as a TCP/IP network.
The internet is an example of the TCP/IP network. Therefore, it becomes important that each
device should have a unique address to identify it on a TCP/IP network. This unique address is
known as IP address. IP address is short for Internet Protocol (IP) address. An IP address is an
identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol
route messages based on the IP address of the destination. The format of IP address is a 32-bit
numeric address written as four numbers separated by periods. Each number can be 0 to 255. Some
examples of IP addresses are: 192.168.1.2, 10.324.1.3 and 109.134.2.2.
As seen in the above examples, the numbers in an IP address are in the decimal form. When an IP
address is processed, the computer converts these numbers into binary form internally. The
following is an example of IP address in the decimal form: 192.168.1.10
The preceding IP address in its binary form is: 11000000.10101000.00000001.00001010
The IP address of a computer is assigned by the Internet Service Provider (ISP) whose internet
connection is used on that computer.
We can find out the IP address of your computer by performing the following steps:
1. Click the Start button. A pop-up menu containing various options appears.
2. Open the Run dialog box. Type cmd in the Run dialog box and press Enter. The command
prompt (cmd) window opens.
3. Type ipconfig and press Enter. The output appears, displaying the IP address of your computer
Website
A website is a collection of various web pages, images, videos, audios or other kinds of digital
assets that are hosted on one or several web servers. The first page of a website is known as home
page where all the links related to other documents are displayed. The web pages of a website are
written using HTML and the information is transferred over the internet through HTTP protocol.
The HTML documents consist of several hyperlinks that are accessed through HTTP protocol.
Examples of various websites are: cbse.nic.in, google.com, amazon.in, etc.
A website is a collection of several web pages which are related to each other through
hyperlinks.
Web Page
A web page is an electronic document/page designed using HTML. It displays information in
textual or graphical form. Traversal from one web page to another web page is possible through
hyperlinks.
38
A web page can be classified into two types:
• Static web page: A web page which displays same kind of information whenever a user
visits it is known as a static web page. A static web page generally has .htm or .html as
extension.
• Dynamic web page: An interactive web page is a dynamic web page. A dynamic web page
uses scripting languages to display changing content on the web page. Such a page
generally has .php, .asp, or .jsp as extension.
Web Browser
It is a software that helps in accessing web pages and, thus, is also called web client. It helps the
user to navigate through the World Wide Web and display web pages. Some popular web browsers
are: Mozilla Firefox, Opera, AOL, Webkit, Iceweasel, etc.
A web browser is a WWW client that navigates through the WWW and displays web pages.
Web Server
A web server is a server that stores web pages and when a web client is sending any request to a
server, a server responds to the request and displays the requested web pages. A web server is a
program that runs on a computer connected to the internet. Web server waits for a request, finds
the documents and generates information, if required, and sends back to the browser that requested
for it. A single web server may support multiple websites, or a single website may be hosted on
several linked or mirrored web servers.
Some popular web servers are: Apache web server, Netscape enterprise web server, Microsoft
internet information server, etc.
A web server stores web documents and responds to the requests made by web browsers.
Web Hosting
Web hosting is a service which is provided by companies to its clients to allow them to construct
their own websites which are accessible to the internet users via World Wide Web. Such companies
are known as web host. These companies provide space on a web server they own for use by their
clients as well as provide internet connectivity. The websites which are constructed display
information for their organization in the form of web pages. The host may also provide an interface
or control panel for managing the web server so as to add news and events related to their
organization or for uploading some information which may be valuable for the internet users. A
client can also use control panel for installing scripts as well as other modules and service
applications like email. webhostingsitesindia.co.in is one of the top domain name registration and
web hosting companies in India. It is the only hosting company which provides support in regional
languages.
Web hosting is a service that is provided by the company to users to create web-based
applications.
39
Domain Name Resolution (DNR)
To access a particular website, you use its URL because it is much easier to remember than the IP
address. When we use the URL to access a website, our computer needs to find its matching IP
address. It find the address by using the Domain Name Resolution (DNR). DNR is the name given
to the process by which your computer finds the IP addresses of domain names.
DNS Server
Instead of remembering IP addresses, we assign a domain name to each IP. But, to access a web
resource, a browser needs to find out the IP address corresponding to the domain name entered.
Conversion of the domain name of each web server to its corresponding IP address is called domain
name resolution. It is done through a server called DNS server. Thus, when we enter a URL on a
web browser, the HTTP protocol approaches a computer server called DNS server to obtain the IP
address corresponding to that domain name. After getting the IP address, the HTTP protocol
retrieves the information and loads it in our browser.
An example is shown in which the HTTP requests a DNS server for corresponding IP address, and
the server sends back an IP address.
A DNS server maintains a database of domain names and their corresponding IP addresses. To
understand how the domain name resolution works, we have to understand how and where the
DNS servers are kept. The DNS servers are placed in hierarchical order. At the top level, there are
13 servers called root servers. Then below the root servers there are other DNS servers at different
levels. A DNS server may contain the IP address corresponding to a domain or it will contain the
IP address of other DNS servers, where this domain entry can be searched.
Web Scripting
Website Scripting is used for creating web pages to publish them on the web interactively. The
communication between web browser and web server happens through small programs called web
scripts. Script is a programming language which, when executed, displays the web page. The
written codes for a script may be used by the server side or may be used by the client side as per
the requirement. The tasks which are executed by a web server are interpreted and automated
through the web scripts written in Web Scripting Language.
40
Client-Side Web Scripting Languages
Client-side scripting enables the user to interact with web pages. The client-side scripts are
downloaded at the client end and then interpreted and executed by the web browser. The client-
side scripting is browser dependent and, therefore, the browser must be scriptingenabled that
can interpret the script code. Examples of client-side scripting where it is used are online
games, downloading data from the server, etc.
WEB 2.0
Web 2.0 is often known as World Wide Web for second generation where people collaborate with
each other through social networking sites, blogs, wikis, folksonomies, video-sharing sites, hosted
services, web applications and mashups.
41
The 80:20 Thumb Rule
This thumb rule states that in a well-organized and designed network, 80 percent of the traffic on
a given network segment is local (i.e., destined for a destination system in the same workgroup),
and not more than 20 per cent of the network traffic should move across a backbone. The backbone
in a network which violates this 80:20 rule leads to network congestion and traffic jams.
Best Cable : Twisted Pair, Ethernet Cable, coaxial cable (when distance is in metres);
For large distances—Fibre optics cable.
Best connecting technique: In hilly regions, radio waves should be used and city-to-city, state-to-
state satellite should be used.
42
WIRELESS/MOBILE COMMUNICATION
GSM is a wireless communication medium that provides the user with roaming facility, good
voice quality, SMS, etc., through digital signals.
FDMA
It stands for Frequency Division Multiple Access. In this, each user utilizes a portion of the
frequency bandwidth available. Each user has its own frequency domain.
TDMA
It stands for Time Division Multiple Access. In this, each user is allowed to transmit only within
specified time intervals. Different users transmit in different time slots. When users transmit, they
occupy the whole frequency bandwidth.
43
2.5G technology as it lies between the second (2G) and third (3G) generations of mobile telephony.
Services Provided By GPRS
• Sending and receiving text messages.
• Internet access.
• Multimedia Messaging Service (MMS).
• Internet applications for smart devices through Wireless Application Protocol (WAP).
• Networking facility with one person or with several persons in a group, i.e.,
videoconferencing.
GPRS provides high speed data transfer. A user is allowed to download video streaming,
audio files, email messages, etc.
Wireless in local loop is a system that is similar to telephone system which provides wireless
telecommunication by deploying a multiplicity of multichannel transceivers.
1G Technology
1G technology was used in the first mobile phones. 1G was introduced in the 1980’s. Transmission
of voice data took place through analog radio signals. 1G network was used for voice calls and not
for transmitting text messages. For example, NMT, C-Nets, AMPS, TACS.
Salient features of 1G technology:
• It provides data rates up to 2.4 kbps.
• It uses analog signals.
• Voice quality is not very good.
• It does not support transmission of text messages.
• It does not provide security.
44
2G Technology
2G technology is the first digital cellular system that was launched in the early 1990’s that provides
high data transmission rate in digital format. 2G also introduced data services for mobiles, starting
with SMS. For example, D-AMPS, GSM/GPRS, CDMAOne.
Salient features of 2G technology:
• Good quality of sound.
• Higher data rates up to 64 kbps.
• Improved security mechanism.
• Transmission of data such as text messages in digital format.
• Support transfer of picture messages and MMS.
• It does not support transfer of complex data such as videos.
• It allows multiple users per radio channel with each user talking one at a time.
• Digital transmissions enable compressed voice and multiplexing multiple users per
channel.
3G Technology
3G technology was introduced in the year 2000 and provides much higher data rates with speed
from 144kbps to 2mbps. 3G technology has introduced more efficient ways of carrying data,
making it possible to have faster web services, live chat, fast downloading, videoconferencing,
etc., over mobile phones.
For example, CDMA2000/EV-DO,WCDMA/HSPA+,TD-SCDMA.
EDGE (Enhanced Data rates for Global Evolution) is a radio based high speed mobile data
standard.
4G Technology
Unlike previous generations of mobile technology, 4G mobile technology uses ultra-high
broadband internet services with much faster data speed, typically between 100 mbps– 1gbps.
Now, 4G rules the mobile market. Unlike previous generations of mobile technology, 4G mobile
technology is used for internet access on computers also, and it is totally wireless. 4G provides
internet access, high quality streaming video and “anytime, anywhere” voice and data transmission
at a much faster speed than 3G. The “anytime, anywhere” feature of 4G is also referred to as
“MAGIC” (Mobile multimedia; Anytime/anywhere; Global mobility support; Integrated wireless
solution; Customized personal services).
45
Salient features of 4G technology:
• It is used for internet access on computers also and is totally wireless.
• 4G provides internet access, high quality streaming video and “anytime, anywhere” voice
and data transmission at a much faster speed than 3G.
• It delivers faster and better mobile broadband experiences.
• It provides more data capacity for richer content and more connections. The “anytime,
anywhere” feature of 4G is also referred to as “MAGIC” (Mobile multimedia)
anytime/anywhere.
5G Mobile System
It is a milestone development for the success of IoT and Machine to Machine (M2M)
communications. Machine to machine (M2M) is direct communication between devices — wired
and wireless. 5G allows data transfer in Gbps, which is much faster than 4G. It is able to support
all the devices of the future such as connected vehicles and the Internet of Things.
Cookies
When the user browses a website, the web server sends a text file to the web browser. This small
text file is a cookie. Generally a cookie contains the name of the website from which it has come
from and a unique ID tag.
Some cookies last only until the browser is closed. They are not stored on your hard drive. They
are usually used to track the pages that you visit so that information can be customised for you for
that visit. On the other hand, some cookies are stored on your hard drive until you delete them or
they reach their expiry date. These may, for example, be used to remember your preferences when
you use the website.
Hacking
The term hacking was first used at M.I.T during 1950s and 1960s. The term was used for people
who engaged themselves in harmless technical experiments and fun learning activities.
A computer enthusiast, who uses his computer programming skills to intentionally access a
computer without authorization is known as hacking. The computer enthusiast involved in this
activity is known as a hacker. A hacker accesses the computer without the intention of destroying
data or maliciously harming the computer.
Another term commonly used with hacking is cracking. Cracking can be defined as a method by
which a person who gains unauthorized access to a computer with the intention of causing damage.
Depending on the intent, there are different types of hackers.
46
Grey Hats
The distinction between different hackers is not always clear. There exists a grey area in
between, which represents the class of hackers that are neutral, they hack systems by exploiting
its vulnerabilities, but they don’t do so for monetary or political gains. The grey hats take
system security as a challenge and just hack systems for the fun of it.
Denial of Service
Denial of Service (DoS) is a scenario, wherein an attacker (Hacker) limits or stops an authorised
user to access a service, device, or any such resource by overloading that resource with illegitimate
requests. The DoS attack floods the victim resource with traffic, making the resource appear busy.
If attackers carry out a DoS attack on a website, they will flood it with a very large number of
network packets by using different IP addresses. This way, the web server would be overloaded
and will not be able to provide service to a legitimate user. The users will think that the website is
not working, causing damage to the victim’s organisation. Same way, DoS attacks can be done on
resources like email servers, network storage, disrupting connection between two machines or
disrupting the state of information (resetting of sessions).
The Internet is a global network of interconnected computers and networks that spans the
entire world.
It is a public network, accessible to anyone with an internet connection.
Information and resources on the internet are typically available to the general public, and
it is designed for widespread communication and information sharing.
The internet is often used for activities like web browsing, email, online shopping, social
media, and accessing online services.
Intranet:
An intranet is a private network that is restricted to a specific organization or group of
users, such as a company, government agency, or educational institution.
It is designed for internal use and communication within the organization.
Access to an intranet is typically controlled through security measures like firewalls, login
credentials, and encryption, making it more secure and private.
Intranets are often used for purposes such as internal communication, document sharing,
collaboration, and hosting internal applications.
47
CASE STUDY BASED QUESTION
Ayurveda Training Educational Institute is setting up its centre in Hyderabad with four specialised
departments for Orthopedics, Neurology and Pediatrics along with an administrative office in
separate buildings. The physical distances between these department buildings and the number of
computers to be installed in these departments and administrative office as given as follows. You
as a network expert have to answer the queries as raised by them in (i) to (iv).
(i) Suggest the most suitable location to install the main server of this institution to get efficient
connectivity.
(ii) Suggest the best cable layout for effective network connectivity of the building having server
with all the other buildings.
(iii) Suggest the devices to be installed in each of these buildings for connecting computers
installed within the building out of the following:
● Gateway ● Modem ● Switch
(iv) Suggest the topology of the network and network cable for efficiently connecting each
computer installed in each of the buildings out of the following:
Topologies: Bus topology, Star Topology
Network Cable: Single Pair Telephone Cable, Coaxial Cable, Ethernet Cable
48
ANSWER:
(i) Server should be placed at Administrative Office as it has the maximum number of computers.
(ii)
49
Number of computers:-
As a network expert, you are required to give best possible solutions for the given queries of the
university administration:-
(a) Suggest cable layout for the connections between the various buildings,
(b) Suggest the most suitable building to house the server of the network of the university,
(c) Suggest the placement of following devices with justification:
1. Switch/Hub
2. Repeater
(d) Suggest the technology out of the following for setting-up very fast Internet connectivity
among buildings of the university
1. Optical Fibre
2. Coaxial cable
3. Ethernet Cable
ANSWER:
(a) Star topology
(b) Server should be placed at Main Building as it has the maximum number of computers.
(c) Hub/Switch each would be needed in all the buildings to interconnect the group of cables from
the different computers in each building.
A repeater needs to be placed along the wire between main building & finance building as the
distance between them is more than 70 mtr.
(d) Optical Fibre
50