Computer Networks
Computer Networks
Computer Networks
Introduction
• A computer network is a collection of two or more connected
computers. When these computers are joined in a network,people
can share files and peripherals such as modems, printers, tape
backup drives, or CD-ROMdrives.
• When networks at multiple locations are connected using services
available from phone companies, people can send e-mail, share links
to the global Internet, or conduct video conferences in real time with
other remote users.
• Every network includes:
At least two computers Server or Clientworkstation.
Networking Interface Card's (NIC)
A connection medium, usually a wire or cable, although wireless
communication between networked computers and peripherals isalso
possible.
Network Operating system software, such as Microsoft Windows NT or 2000,
Novell NetWare, Unix and Linux.
Types of Networks
• LANs (Local Area Networks)
LANs are networks usually confined to a geographic area, such as a single building
or a college campus. LANs can be small, linking as few as three computers, but
often link hundreds of computers used by thousands of people. The development
of standard networking protocols and media has resulted in worldwide
proliferation of LANs throughout business and educational organizations.
• WANs (Wide AreaNetworks)
Wide area networking combines multiple LANs that are geographically
separate. This is accomplished by connecting the different LANsusing
services such as dedicated leased phone lines, dial-up phone lines
(both synchronous and asynchronous), satellite links.
• Internet It is a network of interconnected networks.
The Internet is a system of linked networks that are worldwide in scope
and facilitate data communication services such as remote login, file
transfer, electronic mail, the World Wide Web and newsgroups.
• Intranet An intranet is a private network utilizing Internet-type tools,
but available only within that organization. For large organizations, an
intranet provides an easy access mode to corporate information for
employees.
Cloud Computing
• Cloud Computing can be defined as delivering computing power
( CPU, RAM, Network Speeds, Storage OSsoftware) a service over a network
(usually on the internet) rather than physically having the computing resources at
the customer location.
• Example: AWS, Azure, Google Cloud
Let’s learn Cloud computing with an example-
Whenever you travel through a bus or train, you take a ticket for your destination
and hold back to your seat till you reach your destination. Likewise other
passengers also takes ticket and travel in the same bus with you and it hardly
bothers you where they go. When your stop comes you get off the bus thanking
the driver. Cloud computing is just like that bus, carrying data andinformation for
different users andallows to use its service with minimal cost.
Why the NameCloud?
Cloud computing
comprises of two
components front end
and back end. Front
end consist client part
of cloud computing
system. It comprise of
interfaces and
applications that are
required to access the
cloud computing
platform.
IoT(Internet of Things)
• The phrase Internet of Things (IoT) refers to connecting
various physical devices and objects throughout the world
via internet. The term IoT was firstly proposed by Kevin
Ashton in 1999.
• For example, when the household devices of our daily life
connect with the internet the system can be calleda Smart-
Home in IoT environment
• The Internet of Things (IoT) is the network of physical
objects—devices, instruments, vehicles, buildings and other
items embedded with electronics, circuits ,software,sensors
and network connectivity that enables these objects to
collect and exchange data.
Looking at the evolution of the Internet we can classify it into five eras:
In the past few years, IoT has been developed rapidly and a large number of enabling
technologies have been proposed.
The IoT has been the trend of the next Internet. Every available thing is getting smart. There
is a wide scope for re-search in IoT. Many new technologies will emerge in the upcoming
years taking a us to a whole new level of a smart world. . The future of IoT is very bright.
From our bills to vehicles everything would be connected providing a better lifestyle.
Wired Networks
• As we know "wired" is the term refers to any physical medium consisting of
cables. The cables can be copper wire, twisted pair or fiber optic. Wired
network is used to carry different forms of electrical signals from one end to
other.
The following classes of wired technologies are used in computernetworking.
• Coaxial Cable
It has a single copper conductor in the middle. A plasticlayer
provides insulation between the braided metal shield and
center conductor. The metal shield blocks outer interference
from motors, fluorescent lights, and othercomputers.
Coaxial cabling is extremely resistant to signal obstruction though it is compl
to install. It can handle great cable lengths between network devices than th
twisted pair cable. The two types of coaxial cables are thin coaxial and thick
coaxial.
• Fiber Optic Cable
Fiber optic cabling consists of a center glass core
surrounded by many layers of protective materials.
It removes the problem of electrical obstruction by
transmitting light rather than electronic signals. This makes them
perfect for certain atmospheres which contain huge amount of
electrical interference. It has become the standard for connecting
networks between buildings because of its resistance to lighting and
moisture.
• Twisted pair Cable
Twisted pair is the ordinary copper wire that connects home and many
business computers to the telephone company. To reduce crosstalk
or electromagnetic induction between pairs of wires, t w
insulated copper wires are twisted aroundeach other. o
Each connection on twisted pair requires bothwires.
Wireless Network
•Radio Wave: Radio waves are used to transmit television and radio
programmes. All radios today, use continuous sine waves to transmit
information(audio,video,data). WiFi that has become a common word
today also used radio wave to transmit data among connected devices.
• Satellite: Satellite communication is a special case of microwave relay
system. Satellite communication use the synchronous satellite to
relay the radio signal transmitted from ground station. A number of
communication satellites , owned by both government and private
organizations, have been placed in stationary orbits about 22,300
miles above the earth’s surface.
Computers: Clients and Servers
• In a client/server network
arrangement, network services
are located in a dedicated
computer whose only function is
to respond to the requests of
clients.
Station
Station
Connection 1 C
A
A-C
Connection 1
A-C Station
Station Connection 2 D
B B-D
Connection 2
Amit Kumar Pandey, PGT-CS,KVAliganj B-D
Hub: – It is used to connect multiple computers in a single LAN network of
one workgroup. Generally HUBs are available with 4,8,12,24,48 ports.When
a hub receives signal on its port, it repeats the signal and forwards that
signal from all ports except the port on which the signal arrived.
There are two types of HUB
Passive HUB:- It only forwards the signal on all ports without amplifying the
signal.
Active HUB:- it forwards the signal with improvement in the quality of data
signal by amplifying it. That why such hubs need additional powersupply.
Based on port type, there are two types of HUB:-
Ethernet HUB :- All ports have RJ-45connectors.
Combo HUB :- Several different types of connectors such RJ-45, BNC, and
AUI available as ports in such HUB.
Router: Router is a networking device which chooses the best optimal
path from available paths to send the signals. It interconnects different
networks. The simplest function of a router is to received packets from
one connected network and pass them to second connected network.
Access Point:
An access point(AP), also called wireless access point(WAP), is a
hardware device that establishes connection(s) of computing devices
on wireless LAN with a fixed wire network.
The APis connected to a fixed wire network and it than broadcast
wireless signals that computing devices having Wi-Fi cards candetect;
using these wireless signals, the computing devices get connected to
fixed wire network.
Modulation:
•In radio communication, a radio signal is ‘modulated’ so that it can be
transmitted over long distances. In the simplest terms, this means that
the radio signal (or input signal), i.e. the signal carrying audio
information, is added with a carriersignal.
•Unlike a radio signal (which usually has a very low frequency), acarrier
signal has a constant amplitude and frequency, i.e. a constant
waveform, which helps to carry the radio signal over long distances.
The process of ‘mounting’ the original signal to a carrier wave is called
modulation.
•The main function of carrier wave is to carry the audio or video signal
from the transmitter to the receiver. The superimposition of message
signal and carrier wave results into a new wave called modulated
wave.
Major Types ofModulation
Amplitude Modulation(AM):
Amplitude Modulation, commonly abbreviated as AM, is acommon
method of broadcasting radio signals.
In AM, the amplitude of the carrier wave is modified in order to
transmit the input signal (the one that carries information).
In AM, the amplitude of the carrier wave is modified proportionally
according to the amplitude of the input signal
AM involves the alteration of the amplitude of the carrier wave
The typical frequency range in which AM works is 535 to 1705 Kilohertz
Frequency Modulation(FM):
Frequency Modulation, often referred to as FM, is another, relatively
newer method of modulation where the carrier wave is modified
proportionally according to the input signal. In FM, the instantaneous
frequency of the carrier wave is altered according to the amplitude of
the input signal.
In FM, the frequency of the carrier wave is modified proportionally
according to the amplitude of the input signal
FM involves changes in the frequency of the carrier wave.
The frequency range is around 88-108 Megahertz for FM.
AM
FM
ttps://www.kvsangathan.nic.in/academic/admission-guidelines
nj
FTP (File Transfer Protocol)
File Transfer Protocol (FTP) is a standard Internet protocol for
transmitting files between computers on the Internet
over TCP/IP connections. FTPis a client-server protocol where a client
will ask for a file, and a local or remote server will provide it.
How FTPworks
• FTPis a client-server protocol that relies on two communications
channels between client and server: a command channel for
controlling the conversation and a data channel for transmitting file
content. Clients initiate conversations withservers by requesting to
download a file.
• Using FTP, a client can upload, download, delete, rename, move and
copy files on a server. A user typically needs to log on to the FTP
server, although some servers make some or all of their content
available without login, known as anonymousFTP.
Session Control Protocol (SCP)
• Several heavily used Internet applications such as FTP, GOPHER, and
HTTPuse a protocol model in which every transaction requires a
separate TCPconnection. Since clients normally issue multiple
requests to the same server, this model is quite inefficient, as it
incurs all the connection start up costs for every single request.
• SCPis a simple protocol which lets a server and client have multiple
conversations over a single TCPconnection. The protocol is designed
to be simple to implement, and is modelled after TCP.
Secure Shell (SSH)
• Secure Shell (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network. Typical applications include
remote command-line, login, and remote command execution, butany network
service can be secured with SSH.
• SSHprovides a secure channel over an unsecured network in aclient–
server architecture, connecting an SSHclient application with an SSHserver.The
protocol specification distinguishes between two major versions, referred to as
SSH-1 and SSH-2. The standard TCPport for SSHis 22. SSHis generally used to
access Unix-like operating systems, but it can also be used on Microsoft
Windows. Windows 10 uses OpenSSH as its default SSHclient.
• SSHwas designed as a replacement for Telnet and
for unsecured remote shell protocols. The encryption used by SSHis intended to
provide confidentiality and integrity of data over an unsecured network, such as
the Internet.
POP (Post Office Protocol)
• POP3 (Post Office Protocol 3) is the most recent version of a standard
protocol for receiving e-mail. POP3 is a client/server protocol in
which e-mail is received and held for you by your Internet server.
• POP3 is designed to delete mail on the server as soon as the userhas
downloaded it. However, some implementations allow users or an
administrator to specify that mail be saved for some period of time.
POPcan be thought of as a "store-and-forward" service.