0% found this document useful (0 votes)
9 views26 pages

Computer Network Class 12 - 083438

The document provides an overview of computer networks, including their uses, applications, and the evolution of networking terminology. It details various types of networking hardware, transmission media (both guided and unguided), network devices, topologies, and protocols. Additionally, it discusses the advantages and disadvantages of different communication methods and technologies such as Wi-Fi, Wi-MAX, and Bluetooth.

Uploaded by

jeetsardar.delhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
9 views26 pages

Computer Network Class 12 - 083438

The document provides an overview of computer networks, including their uses, applications, and the evolution of networking terminology. It details various types of networking hardware, transmission media (both guided and unguided), network devices, topologies, and protocols. Additionally, it discusses the advantages and disadvantages of different communication methods and technologies such as Wi-Fi, Wi-MAX, and Bluetooth.

Uploaded by

jeetsardar.delhi
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 26
Unit II; Introduction to Computer Networks Visit to website: https://www learnpythonacbse.com Chapter 12 - Introductions to Computer Networks COMPUTER NETWORK- USES & APPLICATION TERMINOLOGY & EVOLUTION OF NETWORKING NETWORKING HARDWARE - TRANSMISSION MEDIA 1. GUIDED (WIRED) MEDIA- 1) TWISTED PAIR CABLE 2) CO-AXIAL CABLES 3) OPTICAL FIBER 2. UNGUIDED (WIRE-LESS) MEDIA- INFRARED , RADIO, MICRO WAVE AND SATELLITE LINK WI-FI, WI-MAX & BLUETOOTH NETWORK DEVICES 1. MODEM (MODULATOR DEMODULATOR) _2. RI-45 CONNECTOR: 3. ETHERNET CARD OR NIC OR NIU: 4, HUB: 5. SWITCHES 6. REPEATERS 7. ROUTER 8, BRIDGE 9. GATEWAY 10. Wi-fi CARD NETWORK TOPOLOGIES AND TYPES- 1. BUS TOPOLOGY 2. THE STAR TOPOLOGY 3. RING TOPOLOGY 4. THE TREE TOPOLOGY 5. THE MESH TOPOLOGY TYPES OF NETWORKS 1) LAN (LOCAL AREA NETWORK) 2) MAN (METROPOLITAN AREA NETWORK) 3) WAN (WIDE AREA NETWORK) 4) PAN (PERSONAL AREA NETWORK) NETWORK PROTOCOL 4) TCP/IP 2) FTP 3) PPP 4) SMTP 5) POPS 6) TELNET 7)HTTP Page 1 of 26 ‘Unit I; Introduction to Computer Networks Visit to website: https://www.learnpythonacbse.com Chapter 12 - Introductions reais Ney oe A Computer Network, or simply a Network, is a collection of computers and other hardware components interconnected by communication channels that allow sharing of resources and information Simply, more than one computer interconnected through a communication medium for information interchange is called a computer network, > Resource Sharing > File and data sharing e > Data security and centralized GN ee security |e > High Reliability > Communication Media > High Speed > Flexible working environment > Cost factor > Sharing of data, services and resources : = We can share resources such as printers and scanners and other peripherals devices. = Can share data and access file from any machine. > Access to remote database > Communication facilities = Can communicate with each other via email or chatting. Page 20f 26 Uniti: Introduction to Computer Networks Visit to website: hitps/wraw learnpythonacbse.com Chapter 12 - Introductions to Computer Networks 1. Threat to data: A computer network may be used by unauthorized users to steal or corrupt the data and even to deploy computer virus or worms on the network, 2. Difficult to set up: 1. Nodes (Workstations):- The term nodes refer to the computers that are attached to a network and are seeking to share the resources. Server: - A computer that facilitates the sharing of data, software and hardware resources on the network Network Interface Unit (NIU) (MAC Address):- A network interface unit is interpreter that helps in establishing the communication between the server and the client. IP Address:- Every machine on a TCP bar IP Network has a unique identifying no. called an IP Address. Domain Name:-It is a way to identify and locate the computers connected to the internet. It must be unique. Page 3 of 26 Unit I: Introduction to Computer Networks Visit to website: hitps//wraw learnpythonscbse.com Chapter 12 - Introductions to Computer Networks PRP In 1969, The US govt. formed an agency named ARPANET to connect computers at various universities and defense agencies. The main objective of ARPANET was to develop a network that could continue to function efficiently even in the event of a nuclear attack. 2. Internet (INTERconnection N () The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite to serve billions of users worldwide. It isa network of networks that consists of millions of private, public, academic, business, and government networks. 3. Interspaces: It is a client/server software program that allows multiple users to communicate online with real-time audio, video and text chat in dynamic 3D environments. Switching techniques are used for transmitting data across networks. Three switching techniques are: = Circuit switching = Message switching = Packet switching. Page 4 of 26 Unit I Introduction to Computer Networks Visit to website: htps://wwrw.Jearnpythondcbse.com 4 hapter 12 - Introductions Um Ae 6) PPOs ie teenies In the Circuit Switching technique, first, the complete end-to-end transmission path between the source and the destination computers is established and then the message is transmitted through the path. The main advantage of this technique is guaranteed delivery of the message. Mostly used for voice communication. 2. Message Switching: In this technique, the source computer sends data or the message to the switching office first, which stores the data in its buffer. It then looks for a free link to another switching office and then sends the data to this office. This process is continued until the data are delivered to the destination computers. Owing to its working principle, it is also known as store and forward. That is, store first (in switching office), forward later, one jump at a time. RRP eocm las ceoultersy With message switching, there is no limit on block size, in contrast, packet switching places a tight upper limit on block size. A fixed size of packet which can be transmitted across the network is specified. Another point of its difference from message switching is that data packets are stored on the disk in message switching whereas in packet switching, all the packets of fixed size are stored in main memory. Page 5 of 26 Unit I Introduction to Computer Networks Visit to website: Mipr/wrow leornpythondcbse.com Chapter 12 - Introductions to Computer Networks . Concept of Channel: - A data channel is the medium used to carry information or data from one point It is the unit to measure the data transmission speed. It is equivalent to bps (bits . Bandwidth:- The maximum volume of data that can be transferred over any communication channel at a given point of time is known as the bandwidth. In analog systems, it is measured in hertz (Hz) and in digital systems; it is measured in bits per second (bps). 4. Data transfer rate: - The amount of data transferred per second by the communication channel from one point to another is known as the data transfer rate. It is measured in bits per second (bps), bytes per second (Bps). 1 kbps = 1024 bps ( bit per second) 1 Kbps = 1024 Bps ( Byte per second) ‘mbps = 1024 kbps 1 Mbps = 1024 Kbps 1 gbps = 1024 mbps 1 Gbps = 1024 Mbps 1 thps = 102 1 Tbps = 1024 Gbps Page 6 of 26 Unit I: Introduction to Computer Networks Visit to website: Mtpr//wraw leornpythondcbse.com Chapter 12 - Introductions to Computer Networks To form a computer network a lot of hardware devices are required. Some of these devices along with their functionalities are mentioned below: Bii aC A transmission medium is a medium of data transfer over a network. Two basic formats: 1. Guided (wired) media: It is also known as the physical or conducted media. In this medium, the host and other devices are interconnected through wiring or cables and these are: a) Twisted Pair Cable b) Co-axial Cable c) Optical Fiber Cable. 2. Unguided (wireless) media: In this type of medium networks use the environment or air as medium to transfer data and these are: a) Radio Waves b) Micro Waves c) Satellite Link d) Infrared Waves e) Bluetooth f) Wi-Fi and Wi- Max Page 7 of 26 Unit IE Introduction to Computer Networks Visit to website: http://www learnpythonscbse.com - Chapter 12 - Introductions to Computer Networks 1. Guided (wired) media: 4 maine weraac west [psn cours It consists of two identical 1 mm thick copper wires insulated and twisted together. The twisted pair cables are twisted in order to reduce crosstalk and electromagnetic induction Very Inexpensive Easy to install and maintain Attenuation is very high. It is incapable to carry a signal ‘over long distances (only 100m) without the use of repeaters. Due to low bandwidth, these are unsuitable for broadband applications Low noise immunity. Susceptible to electromagnetic interference It consists of a solid wire core ‘surrounded by one or more foil or braided wire shields, each separated from the other by some kind of plastic insulator. It is mostly used in the cable wires. Expensive than twisted pair cables. Difficult to manage and reconfigure. Attenuation is low. Data transmission rate is better than twisted pair cables. Carries signal up to 150m to 500m Moderate bandwidth It provides a cheap means of transporting multi-channel television signals around metropolitan areas. Higher noise immunity than twisted pair. Less Susceptible to electromagnetic interference Page 8 of 26 ‘An optical fiber consists of thin glass fibers that can carry information in the form of visible light. Very Expensive as compared to other guided media. Need special care and training while installation ‘Attenuation is very low. Transmit data over very long distance with high security. Very High Bandwidth is up to 10. Gbps. Data transmission speed is very high. Immune to noise as light rays are unaffected by electrical noise. Not Susceptible to electromagnetic interference. Unit I Introduction to Computer Networks Visit to website: Bps//wraw learnpythonsebre.com Chapter 12 - Introductions to Computer Networks Short Range Communication: Infrared waves can travel from a few centimeters to several meters.(Approx. Sm ) Line of Sight Propagation: infrared Uses point to point ‘communication, both transmitter and receiver should be placed in line of sight of each other and there should not be any obstacle in between. ‘Cannot Penetrate Solid Objects : Infrared waves can propagate throughout a room but could not cross the walls of the room, so that the remote does not interfere with ‘appliances in other room. Eerrenas iced Long Range ‘Communication : Radio waves can cover distances ranging from ‘a few meters (in walkie- talkies) up to covering an entire city Omni directional: Radio waves are propagated in all directions. Therefore sending and receiving antennas do not have to be aligned. Radio waves can easily bend along mountains and reach valleys. Penetrates Solid Objects: Radio receivers can catch the signal inside buildings also. Thus it can be used for both indoor and ‘outdoor communication ieee ican Long Range Communication Microwave signals travel at a higher frequency than radio waves and are used for transmitting data over several miles orkilometers. Line of Sight Propagation: Microwaves towers transmitting and receiving antennas need to be properly aligned. ‘Cannot Penetrate Solid Objects: High towers are built and microwave antennas are put on their tops so that signal does not get blocked by building structures Page 9 of 26 sree ‘Very Long Range Communication : Satellite is a relay station in orbit above the earth that receive from one end of earth (uplink) regenerates, and redirects signals to other end of earth (downlink). Line of Sight Propagation: Since microwave signals cannot bend around the curvature of earth. Satellite act as a relay between the transmitting earth stations covering the entire surface of earth ‘Cannot Penetrate Solid Objects: Signals can get blocked by solid material or objects such as rocks, wood or solid building structures Unit I Introduction to Computer Networks Visit to website: htps://wwrw.Jearnpythondcbse.com Chapter 12 - Introductions to Computer Networks Inexpensive mode of communication: Infrared ‘communication is a ‘common, inexpensive, and easy to use wireless ‘communication technology. ‘Secure : At a time only two devices can ‘communicate therefore information passed to one device is not leaked to another device Inexpensive mode of communication: Radio waves are the most economical way of communicating. itis cheaper than laying cables and fibres. Insecure: Radio wave communication is insecure communication. Very Expensive mode of ‘communication: Signals become weak after travelling as it gets absorbed by atmosphere. So repeaters are used at regular intervals (25-30 km). Towers are expensive to bi Insecure: Microwave ‘communication is an insecure communication Multiple channels are available. It can carry 25000 voice channels at the same time. Very Expensive: Pla the satellite into orbit involves very high cost. Installation is extremely complex. But, satellite communication is very economical keeping in mind the fact that the area covered quite large. Insecure: Signals sent to asatellite are broadcasted to all receivers, so necessary security measures have to be taken to prevent tampering of data. Could not be used for long and difficult terrains Not Susceptible To Weather Conditions USES: TV remotes, Cordless mouse, and Intrusion detectors, automotive garage doors, wireless speakers etc Communication over difficult terrains: Since no cables are to be laid down communication and no digging is to be done, it offers ease of ‘communication over difficult terrains like | hilly areas. Susceptible To Weather : Radio wave propagation is susceptible to weather effects like rains, thunder storms etc. USES: Cordless phones, AM and FM radio broadcast, Garage door openers ete. Communication over difficult terrains: Since no cables are to be laid down and no digging is tobe done so it offers ease of communication over difficult terrains like hilly areas. ‘Susceptible To Weather : Micro wave propagation is susceptible to weather effects like rains, thunder storms etc. USES: Itis used for long distance telephonic ‘communications. No restrictions of difficult terrains: such ‘as natural mountains, tall building, towers ete. Susceptible To Weather: Transmission is affected by weather conditions like USES: Communicate anywhere in the world Unit Ir Introduction to Computer Networks “Visit to website: https_//wurw learnpythonacbse.com 4 Chapter 12 - Introductions to Computer Networks Wi-Fi (Wireless Fidelity) Wi - Fi high-speed wireless Internet technology is commonly used in the world. Uses radio signals to transmit high speed data over the wireless network with the installation of the Access Point to connect to the device. Such as mobile phones, — PDAs and notebook and so on Wi-MAX (Worldwide Interoperability for Microwave Access) WiMAX is that the radius of 30 miles, or a distance of about 48 K.M,, which means that WiMAX can provide coverage over a network, 3G mobile phones, up to 10 times more than that, it also has the speed. Data transmission of up to 75 megabits per second (Mbps), which is faster than 3G, up to 30 times faster than ever, and certainly with WiFi. Bluetooth: This technology is used for short range communication (approx. 10m) in a variety of devices for wireless communic- -ation. Baby monitors, door openers, and cell phones are some of the devices that utilize Bluetooth communication. Page 11 of 26. Unit IE Introduction to Computer Networks Visit to website: https ww learnpythondcbse.com i hapter 12 - Introd UCM Ae ey Characteristics of Bluetooth Transmission: = Line of sight between communicating devices is not required. = Bluetooth can connect upto eight devices simultaneously. = Slow data transfer rate (upto 1Mbps). 1. MODEM (MODulator DEModulator): Modem is a device that converts digital data originating from a terminal or computer to analog signals used by voice communication network such as the telephone system. At one end, modems convert the digital pulse to audible tones and convert audio tones back to digital pulses at the other 2. RJ-45 Connector: The RJ-45 is a single line jack for digital transmission over ordinary phone wire. It is a 8 wire connector which is commonly used to connect computers on the LAN(especially Ethernets). RJ — short for Registered Jack—45 Page 12 of 26. Unit IE Introduction to Computer Networks Visit to website: https/ ww learnpythondcbse.com a 3. Ethernet Card or NIC or NIU: A NiC(Network Interface card) is a computer] Chapter 12 - Introductions to Computer Networks circuit board or card that is installed in computer] so that it can connected to network. It is suitable’ for coaxial or twisted pair cables. 4. Hub: Hub is a device used to connect several computers together. It is a multi-port card. Hubs forwarded any data packets including e- mail, word processing documents or print request — they receive over one port from one workstation to all of their remaining ports. 5. Switches: Switches are smart hubs that send data directly to the destination rather than everywhere within network. When the switch receives a packet, the switch examines the destination and source hardware address and compares them to a table of a network segments and addresses. If the segments are the same the packet is dropped and if the different then the packet is forwarded to the proper segments. Page 13 of 26. Unit IE Introduction to Computer Networks Visit to website: https//wrw learnpythondcbse.com j hapter 12 - Introd OU mA ee) 6. Repeaters: A repeater is a device that amplifies a Repeater signal being transmitted on the network. Since a signal loses strength as it passes along a cable, it is often necessary to boost the signal with this device.. The repeater electrically amplifies the signal it receives and rebroadcasts it. 7. Router: A device that works like a bridge but External can handle different protocols is known Address as router. It is used to separate different segments in a network to improve performance and reliability. 8. Bridge: A bridge is a network device that connects two or more LANs. When a data-frame oO oO arrives, software in the bridge extracts a the destination address (MAC) and looks A network with a bridge it up in a table to see where to send the frame. Bridges can filter network traffic. Page 14 0f 26, Unit IE Introduction to Computer Networks Visit to website: https//wrww learnpythondcbse.com hapter 12 - Introd UMN e 6) 9. Gateway: Gateway is a device, which is used to connect dissimilar networks and perform the necessary translation so that the connected networks can communicate properly. A gateway can translate information between different network data formats and network architectures. It can translate TCP/IP to AppleTalk so computers supporting TCP/IP can communicate with Apple brand computers. 1. BUS Topology: - The bus topology uses a common single cable to connect all the workstations. Each computer performs its a task of sending messages without the help of the central server. However, only one workstation can transmit a message at a particular time in the bus topology. Unit Ir Introduction to Computer Networks ‘Visit to website: ttps://wonw learnpythonacbse.com a Chapter 12 - Introductions to Computer Networks Advantages and Disadvantages of Bus Topology PVN Peale toed i) Easy to connect and install. i) The entire network shuts down if ii) Involves a low cost of installation time. there is a failure in the central Can be easily extended. cable. ii) Only a single message can travel at a particular time. iii) Difficult to troubleshoot an error. 2. The STAR Topology: - A STAR topology is based on a central node which acts as a hub. A STAR topology is common in homes networks where all the computers connect to the single central computer using it asa hub. Advantages and Disadvantages of Star Topology Peel ote Tiny 1) Ehay to ToUbeaNGo i) Easy to troubleshoot ii) A single node failure does not affect the | ii) A single node failure does not entire network. affect the entire network. iii) Fault detection and removal of fauity| ™) jie detection and removal of parts is easier. faulty parts is easier. iv) In case a workstation fails, the network is| *¥)!n case @ workstation fails, the not affected. network is not affected Page 16 of 26. Unit I Introduction to Computer Networks Visit to website: https://wrww learnpythonécbse.com Chapter 12 - Introductions to Computer Networks 3. Ring Topology: - A Ring network is circular in shape and every node will have one node on either side of it. Advantages and Disadvantages of Star Topology PX Nee sry eye Nett i) The failure of a single node of the network can cause the entire network to fail. ii) The movement or changes made to network nodes affects the performance of the entire network. i) The data being transmitted between two nodes passes through all the intermediate nodes. ii) A central server is not required for the management of this topology. 4. The TREE Topology: - The tree topology combines the characteristics of the linear bus and the star topologies. It consists of groups of star - configured workstations connected toa bus backbone cable. Advantages: i) Eliminates network congestion. ii) The network can be easily extended. Faulty nodes can easily be isolated from the rest of the network. Disadvantages: {i) Uses large cable length. (ii) Requires a large amount of hardware components and hence is expensive. (iii) Installation and reconfiguration is very difficult. Page 17 of 26 Unit I Introduction to Computer Networks Visit to website: https://wwrw.leernpythondcbse.com 4 omputer Networks 5. The MESH Topology: - In a true mesh topology every node has a connectionto every other node in the network. Each computer not only sends its own signals but also relays data from other computers. - Advantages of a mesh topology « Manages high amounts of traffic, because multiple devices can transmit data simultaneously. « A failure of one device does not cause a break in the network or transmission of data. « Adding additional devices does not disrupt data transmission between other devices. Disadvantages of a mesh topology « The cost to implement is higher than other network topologies, making it a less desirable option. ¢ Building and maintaining the topology is difficult and time consuming. « The chance of redundant connections is high, which adds to the high costs and potential for reduced efficiency. Unit I: Introduction to Computer Networks Visit to website: hitps//wrww learnpythondcbse.com Chapter 12 - Introductions to Computer Networks 1) LAN (Local Area Network): LAN's are private networks, not subject to tariffs or other regulatory controls. LAN's operate at relatively high speed when compared to the typical WAN. There are different types of Media Access Control methods in a LAN, the prominent ones are Ethernet, Token ring. It connects computers in a single building, block or campus, i.e. they work in a restricted geographical area Applications of LAN le One of the computer in a network can become a server serving all the remaining computers called clients. Software can be stored on the server and it can be used by the remaining clients. Connecting Locally all the workstations ina building to let them communicate with each other locally without any internet access. Sharing common resources like printers etc are some common applications of LAN. Disadvantages of LAN Advantages of LAN Resource Sharing Software Applications Sharing Easy and Cheap Communication Centralized Data High Setup Cost Privacy Violations Covers Limited Area Data Security Threat Unit I Introduction to Computer Networks Visit to website: htps://www Jearnpythondcbse.com omnes SPS UOMO Mey ema e cs 2) MAN (Metropolitan Area Network): MAN is the networks cover a group of x nearby corporate offices or a city and ili might be either private or public. AREHOUSE ™ al A network with in a city is known is ab Le ay BRANCH OFFICE oe Central Office MAN. Example: Cable operators aa AMetropolitan Area Network + Itgenerally covers towns and cities (50 km) + Communication medium used for MAN are optical fibers, cables etc. + Data rates adequate for distributed computing applications. Advantages of MAN Disadvantages of MAN © Extremely efficient and provide fast + More cable required for a communication via high-speed carriers, such as MAN connection from one fibre optic cables. place to another. It provides a good back bone for large network Itis difficult to make the and provides greater access to WANs. system secure from hackers The dual bus used in MAN helps the and industrial Spying transmission of data in both directions graphical regions. simultaneously. A MAN usually encompasses several blocks of a city or an entire city. Page 20 of 26. Unit Ik Introduction to Computer Networks Chapter 12 - Introductions to Computer Networks 3) WAN (Wide Area Network): These are the networks spread over large distances, say across countries or even continents through cabling or satellite uplinks are called WAN. 6 .¢ e #@: e Itgenerally covers large distances(states, countries, continents). Communication medium used are satellite, public telephone networks which are connected by routers. Advantages of WAN Disadvantages of WAN Covers a large geographical area so long distance business can connect on the one network. Need a good firewall to restrict outsiders from entering and disrupting the network. Shares software and resources with connecting workstations. Setting up a network can be an expensive, slow and complicated. The bigger the network the more expensive itis. Messages can be sent very quickly to anyone else on the network. These messages can have picture, sounds or data included with them (called attachments). Once set up, maintaining a network is a full-time job which requires network supervisors and technicians to be employed. Expensive things(such as printers or phone lines to the internet) can be shared by all the computers on the network without having to buy a different peripheral for each computer. Security is a real issue when many different people have the ability to use information from other computers. Protection against hackers and viruses adds more complexity and expense. Everyone on the network can use the same data. This avoids problems where some users may have older information than others. Page 21 of 26. Unit If Introduction to Computer Networks Visit to website: https //worw.learnpythondcbse.com jn Chapter 12 - Introductions to Computer Networks 4) PAN (Personal Area Network): A Personal Area Network is computer % 3 network organized around an individual OS person. It generally covers a range of less s/ ‘ Se aay —— than 10 meters. Personal Area Networks can be constructed with cables or wirelessly. Wi- fi CARD: > Similar to Ethernet card, but it allows our computer to connect with other device without wire i.e. for wireless connectivity. > It may be internal or external with built-in wireless radio and antenna. The most common Wi-Fi card used in desktop computer are PCI- Express Wi-Fi card made it fit the PCI-Express card slots on the motherboard. > It allows connecting our device to hotspot available. > Advantage is that it allows computer to become part of network without being physically connected through wire and can be placed anywhere. Page 22 0f 26 Unit I: Introduction to Computer Networks Visit to website: https//wrww learnpythonscbse.com Chapter 12 - Introductions to Computer Networks A protocol is the special set of rules that two or more machines on a network follow to communicate with each other. Some of the important protocols used are as follows: > Communication between two computers on internet is done using TCP/IP protocol. TCP/IP is a two-layer protocol. > Using the TCP protocol a single large message is divided into a sequence of packets of size limits from 128 to 4096 bytes. > Each packet is independent and has the address of sender and destination. > The IP (Internet protocol) does the routing for the packets. It keeps track of all the different routes available to the destination. If one route is not available it finds the alternate route to the destination. > At the destination, the TCP protocol re-assembles the packets into the complete message. > If any packets are lost or damaged, a request is sent to retransmit the same message. Unit IE Introduction to Computer Networks Visit to website: https//wraw learnpythondcbse.com Chapter 12 - Introductions to Computer Networks FTP (File Transfer Protocol): The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files from a server to a client using the Client-server model on a computer network. The objectives of FTP are: > To promote sharing of files (computer programs and/or data). > To encourage indirect or implicit use of remote computers. > To shield a user from variations in file storage systems among different hosts. To transfer data reliably, and efficiently. PPP (Point to Point Protocol): > In computer networking, Point-to-Point Protocol (PPP) is a data link protocol used to establish a direct connection between two nodes. >The Point-to-Point Protocol (PPP) is an encapsulation protocol for transporting IP traffic across point-to-point links. > PPP is used over many types of physical networks including serial cable, phone line, trunk line, cellular telephone, radio links, and fibre optic links etc. Electronic mail > Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. ‘Uniti: Introduction to Computer Networks Visit to website: httpss/ ww learnpythonscbve.com Chapter 12 - Introductions to Computer Networks > Most e-mail systems that send mail over the Internet use SMTP to send messages from one server to another; In addition, SMTP is generally used to send messages from a mail client to a mail server. > The messages can then be retrieved with an e-mail client using either POP or IMAP. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application. Post Office Protocol Version 3 (POP3): > POP3 is a client/server protocol used for opening the remote e-mail boxes, the POP3 mail server receives e-mails, filters and holds them into the appropriate user folders. When a user connects to the mail server to retrieve his mail, the messages are downloaded from mail server to the user's hard disk. Remote Access Protocol (Telnet) : > This protocol helps a user (Telnet Client) to log in at a remote computer (Telnet Server) and function as if he/she were connected directly to that computer. > Telnet is the main internet protocol for creating a connection with a remote machine. It allows you to connect to remote computers (called remote hosts) over a TCP/IP network (such as the Internet). Once your telnet client establishes a connection to the remote host, your client becomes a virtual Page 25 of 26 ‘Uniti: Introduction to Computer Networks Visit to website: https/ www learnpythonscbse.com 4 Chapter 12 - Introductions to Computer Networks terminal, allowing you to communicate with the remote host from your computer with whatever privileges you may have been granted to the specific application and data on that host computer. > Stands for Hypertext Transfer Protocol > Used to transfer all files and other data (resources) from one computer to another on the World Wide Web. > Client(Browser) send request to Web Server using HTTP protocol and Server respond back to Client using HTTP i.e. Client and server over web communicate using HTTP protocol. > HTTP is stateless protocol, various technique applied to make HTTP as State full like Cookies. > See the format of URL: http://www.learnpython4chse.com Page 26 of 26

You might also like