0% found this document useful (0 votes)
2 views11 pages

Chapter 3 Networking

Chapter 3 covers the basics of internet and networking, including the World Wide Web, Local Area Networks (LAN), Wide Area Networks (WAN), and Wi-Fi technologies. It explains key concepts such as IP addresses, DNS, search engines, and email, as well as the importance of web browsing and cyber laws. Additionally, it discusses distributed systems, client-side and server-side networking, and the client-server model, highlighting their roles in modern computing and communication.

Uploaded by

dereklam786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views11 pages

Chapter 3 Networking

Chapter 3 covers the basics of internet and networking, including the World Wide Web, Local Area Networks (LAN), Wide Area Networks (WAN), and Wi-Fi technologies. It explains key concepts such as IP addresses, DNS, search engines, and email, as well as the importance of web browsing and cyber laws. Additionally, it discusses distributed systems, client-side and server-side networking, and the client-server model, highlighting their roles in modern computing and communication.

Uploaded by

dereklam786
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

CHAPTER 3: INTERNET AND NETWORKING

3.1 Basics of Networking – WWW, LAN, WAN, Wi-Fi Technologies

It introduces the fundamental concepts of computer networking and describes how data and
information are shared locally and globally through different network types and technologies.

A computer network is a system of interconnected computers and devices that can communicate with
each other to share data, hardware resources, and software. Networking has become an essential part of
modern computing, enabling communication, collaboration, and information access on both local and
global levels.

World Wide Web (WWW)


It is a collection of interconnected documents and resources, linked by hyperlinks and accessed via
the internet using web browsers. The WWW operates using the HTTP (Hypertext Transfer Protocol) and
was invented by Tim Berners-Lee in 1989.

• It consists of web pages, websites, multimedia, and interactive content.

• Web browsers like Google Chrome, Mozilla Firefox, and Microsoft Edge allow users to browse
and interact with web content.

• URLs (Uniform Resource Locators) are used to identify and access resources.

• Search engines like Google, Bing, and DuckDuckGo help locate information.

Example: Accessing www.wikipedia.org to read an article on computer history.

The WWW is not the internet itself, but rather a service that runs on the internet.

Local Area Network (LAN)


It is a network that connects computers and devices within a limited area, such as a home, school,
office, or building.

• It allows users to share files, printers, and internet connections.

• LANs are usually set up using Ethernet cables (wired LAN) or Wi-Fi (wireless LAN).

• LANs provide high-speed communication and data transfer (up to 1 Gbps or more).

• Devices in a LAN are managed by network switches or routers.

1
Example: All computers in a school's computer lab connected to a central printer via LAN.

LANs are secure, fast, and cost-effective for localized networking.

Wide Area Network (WAN)


It is a network that spans a large geographical area, often connecting multiple LANs across cities,
countries, or continents.

• The most well-known example of a WAN is the Internet.

• WANs use communication technologies such as fiber optics, satellite links, and leased lines.

• Data in WANs may travel across routers, modems, and public networks.

Example: A multinational company connecting its offices in different countries through a WAN to share
corporate data securely.

WANs are more complex and expensive to maintain but are essential for global communication.

Wi-Fi Technologies
It is a wireless networking technology that allows computers, smartphones, tablets, and other devices
to connect to a network and the internet without cables.

• Wi-Fi uses radio waves to transmit data.

• It operates under IEEE 802.11 standards, such as 802.11n, 802.11ac, and 802.11ax (Wi-Fi 6).

• Wi-Fi networks are managed by wireless routers or access points.

Features of Wi-Fi:

• Enables mobile and wireless access.

• Supports multiple devices simultaneously.

• Requires encryption (like WPA2 or WPA3) for security.

• Provides a range typically up to 100 meters indoors.

Example: Connecting a laptop to a home network to access the internet wirelessly.

Wi-Fi has revolutionized connectivity by allowing mobility, ease of setup, and reduced cabling costs.

2
3.2 Concept of IP Address, DNS, Search Engines, and E-mail

It describes the core technologies and services that enable communication and information
retrieval over the internet, including IP addressing, domain name resolution, online searching, and
electronic mail.

Modern computer networks rely on specific systems to identify devices, locate websites, find
information, and exchange messages. These components are the foundation of how users access
content and communicate online.

IP Address (Internet Protocol Address)


It is a unique numerical label assigned to every device connected to a computer network that uses the
Internet Protocol for communication.

There are two main types of IP addresses:

1. IPv4 (Internet Protocol Version 4)

o Format: Four numbers separated by dots (e.g., 192.168.1.1)

o Range: 0.0.0.0 to 255.255.255.255

o Limited to about 4.3 billion addresses

2. IPv6 (Internet Protocol Version 6)

o Format: Eight groups of four hexadecimal digits separated by colons (e.g.,


2001:0db8:85a3:0000:0000:8a2e:0370:7334)

o Designed to handle trillions of devices on the internet

Uses of IP Address:

• Identifies a device on the network

• Routes data from source to destination

• Tracks users or devices in network diagnostics

Types of IP Address:

• Public IP (assigned by the ISP and used on the internet)

• Private IP (used within a local network, like 192.168.0.1)

3
DNS (Domain Name System)
It is the system that translates human-friendly domain names (like www.google.com) into machine-
readable IP addresses.

Why DNS is important:

• Humans find names easier to remember than numbers

• Computers need IP addresses to locate resources

How DNS Works:

1. User types a website URL into the browser.

2. The browser asks the DNS server to resolve the domain name.

3. The DNS server returns the corresponding IP address.

4. The browser connects to the website using that IP address.

Example:

• Typing www.facebook.com → DNS resolves it to 157.240.1.35

DNS servers are provided by Internet Service Providers (ISPs), Google (8.8.8.8), or Cloudflare (1.1.1.1).

Search Engines
It is a software system designed to search information on the World Wide Web and display the most
relevant results based on the user's query.

Popular Search Engines:

• Google

• Bing

• Yahoo

• DuckDuckGo

• Baidu (China)

Functions of a Search Engine:

1. Crawling – Automatically scans web pages using bots.

2. Indexing – Stores information in large databases for quick retrieval.

3. Ranking – Sorts results by relevance, popularity, or freshness.

4
4. Displaying Results – Shows a list of clickable links, previews, and sometimes advertisements.

Example:
Typing “What is a motherboard?” into Google brings a list of relevant articles, images, and videos.

Search engines are essential tools for research, learning, and online navigation.

E-mail (Electronic Mail)


It is a method of exchanging digital messages between people using electronic devices over the
internet.

Structure of an E-mail Address:

• Format: [email protected]

• Example: [email protected]

Components of an E-mail System:

• Email Client: Software or app to read/send emails (e.g., Outlook, Thunderbird)

• Webmail Interface: Browser-based services (e.g., Gmail, Yahoo Mail)

• SMTP (Simple Mail Transfer Protocol): Used to send emails

• POP/IMAP: Used to receive emails

Basic Features of E-mail:

• To: Main recipients

• CC (Carbon Copy): Secondary recipients

• BCC (Blind Carbon Copy): Hidden recipients

• Subject: Short summary of the email

• Body: Main content/message

• Attachments: Files like documents, images, or PDFs

Advantages of E-mail:

• Fast and instant communication

• Can include multimedia and attachments

• Provides written records and history

• Free and accessible from anywhere

5
3.3 Browsing and Cyber Laws

It describes how users access websites using browsers and explains the importance of cyber laws
that govern digital behavior and protect internet users.

Web Browsing
It is the process of viewing and exploring websites and online content using a web browser. Browsing
allows users to retrieve information, watch videos, fill out forms, and interact with content on the World
Wide Web (WWW).

Web Browser is the software used to open and display web pages. Common browsers include Google
Chrome, Mozilla Firefox, and Microsoft Edge.

Key Features:

• Address bar to enter URLs (e.g., www.google.com)

• Tabs to open multiple pages

• Back/Forward buttons to navigate

• History to view previously visited sites

• Private Mode to browse without saving history

Steps in Browsing:

1. Enter website address in the browser.

2. Browser contacts DNS to get IP address.

3. Webpage is loaded from the server.

4. User interacts with the page.

Safe browsing includes using secure websites (https), avoiding suspicious links, and keeping the browser
updated.

Cyber Laws
It refers to the rules and laws that control the use of internet and digital technologies to ensure
safety, privacy, and ethical behavior online.

Purpose of Cyber Laws:

6
• Prevent cybercrimes like hacking and fraud

• Protect personal and financial data

• Control misuse of social media

• Support online business and secure transactions

Common Cyber Crimes:

• Hacking – Unauthorized access to systems

• Phishing – Fake emails to steal personal info

• Cyberbullying – Harassing people online

• Spreading viruses or malware

• Identity theft and data breach

Cyber Laws in Pakistan:

• Governed under the Prevention of Electronic Crimes Act (PECA), 2016

• Managed by the FIA Cybercrime Wing

• Offenses may lead to fines, imprisonment, or device confiscation

3.4 Distributed System in Networking

It refers to a computer system where multiple independent computers work together over a
network to achieve a common goal, often appearing to users as a single system.

Definition

A distributed system is a collection of computers or nodes connected through a network that


communicate and coordinate with each other to perform tasks. These systems share resources, data,
and processing power.

The goal is to improve performance, reliability, scalability, and availability of services, especially for
large-scale or complex operations.

Key Characteristics of Distributed Systems

1. Multiple Independent Nodes

7
o Each node (computer) has its own processor and memory.

o Nodes may be located in different geographic areas.

2. Network Communication

o Nodes communicate over LAN, WAN, or the Internet using protocols like TCP/IP.

3. Resource Sharing

o Computers share hardware (e.g., printers), software, or data files.

4. Transparency

o The system appears as a single unit to the user, even though multiple machines are
working in the background.

5. Fault Tolerance

o If one node fails, others continue working, providing high availability.

Examples of Distributed Systems

• Google Search Engine – Uses thousands of servers around the world.

• Cloud Computing (e.g., AWS, Azure) – Runs services across multiple data centers.

• Online Banking Systems – Distributes operations for speed and reliability.

• Social Media Platforms – Content and services are hosted on multiple servers.

Advantages of Distributed Systems

1. Improved Performance

o Workload is shared among multiple machines, resulting in faster processing.

2. Scalability

o New computers can be added easily to handle more users or data.

3. Fault Tolerance

o Failure of one node does not stop the entire system.

4. Resource Sharing

o Systems can use hardware and data from other nodes.

5. Geographical Distribution

8
o Nodes can serve users from different locations efficiently.

Challenges in Distributed Systems

1. Complex Management

o Managing multiple systems and keeping them in sync is complex.

2. Security Risks

o More nodes mean more entry points for attackers.

3. Network Dependency

o The entire system relies heavily on network stability.

4. Data Consistency

o Keeping data updated across all nodes is difficult.

Applications of Distributed Systems


• E-commerce platforms like Amazon

• Online multiplayer games with global players

• Scientific research systems for simulations

• Banking networks for secure and fast transactions

• Email services that synchronize data across devices

3.5 Client-Side and Server-Side Networking

It refers to the two main roles in a computer network—where the client sends requests and the
server responds—forming the foundation of how communication and data exchange happen over
the internet and other networks.

Client-Side Networking
It is the part of the network where the user’s device (client) initiates communication by sending
requests to a server. The client can be a computer, smartphone, tablet, or any internet-connected device.

9
Characteristics:

• Requests services like web pages, files, or data

• Sends input data to the server

• Waits for and receives responses

• Operates on the user’s end

Examples of Client Devices:

• Web browser (Google Chrome requesting www.google.com)

• Email application (sending or receiving messages)

• Mobile apps (like WhatsApp or Facebook)

Client-Side Technologies:

• HTML, CSS, JavaScript – These run in the user’s browser to display and control content

• Client-Side Scripts – Validate forms, interact with users, and manage UI

Server-Side Networking
It is the part of the network where a central computer (server) processes incoming requests from
clients and sends back the appropriate response. The server hosts data, applications, or services.

Characteristics:

• Listens for requests from clients

• Processes data, runs applications, or retrieves files

• Sends responses back to clients

• Runs continuously to serve multiple clients at once

Types of Servers:

• Web Server – Hosts websites (e.g., Apache, Nginx)

• File Server – Stores and delivers files

• Database Server – Stores and manages databases (e.g., MySQL)

• Mail Server – Handles email sending and receiving

Server-Side Technologies:

• PHP, ASP.NET, Python, Java, Node.js – These languages run scripts on the server

10
• Databases – Like SQL, Oracle, MongoDB to store backend data

Client-Server Model
It is the most common architecture used in networking, where multiple clients connect to a central
server to request services.

Workflow:

1. Client sends a request (e.g., a user types a URL)

2. Server receives the request, processes it

3. Server sends the result (e.g., the web page)

4. Client displays or uses the received content

Example:

• When a student opens www.wikipedia.org:

o The browser (client) sends a request.

o The Wikipedia server processes the request.

o The server sends the page content.

o The browser displays it.

11

You might also like