Computer Networks

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 99

Computer Networks

Introduction
• A computer network is a collection of two or more connected
computers. When these computers are joined in a network,people
can share files and peripherals such as modems, printers, tape
backup drives, or CD-ROMdrives.
• When networks at multiple locations are connected using services
available from phone companies, people can send e-mail, share links
to the global Internet, or conduct video conferences in real time with
other remote users.
• Every network includes:
At least two computers Server or Clientworkstation.
 Networking Interface Card's (NIC)
A connection medium, usually a wire or cable, although wireless
communication between networked computers and peripherals isalso
possible.
Network Operating system software, such as Microsoft Windows NT or 2000,
Novell NetWare, Unix and Linux.
Types of Networks
• LANs (Local Area Networks)
LANs are networks usually confined to a geographic area, such as a single building
or a college campus. LANs can be small, linking as few as three computers, but
often link hundreds of computers used by thousands of people. The development
of standard networking protocols and media has resulted in worldwide
proliferation of LANs throughout business and educational organizations.
• WANs (Wide AreaNetworks)
Wide area networking combines multiple LANs that are geographically
separate. This is accomplished by connecting the different LANsusing
services such as dedicated leased phone lines, dial-up phone lines
(both synchronous and asynchronous), satellite links.
• Internet It is a network of interconnected networks.
The Internet is a system of linked networks that are worldwide in scope
and facilitate data communication services such as remote login, file
transfer, electronic mail, the World Wide Web and newsgroups.
• Intranet An intranet is a private network utilizing Internet-type tools,
but available only within that organization. For large organizations, an
intranet provides an easy access mode to corporate information for
employees.
Cloud Computing
• Cloud Computing can be defined as delivering computing power
( CPU, RAM, Network Speeds, Storage OSsoftware) a service over a network
(usually on the internet) rather than physically having the computing resources at
the customer location.
• Example: AWS, Azure, Google Cloud
Let’s learn Cloud computing with an example-
Whenever you travel through a bus or train, you take a ticket for your destination
and hold back to your seat till you reach your destination. Likewise other
passengers also takes ticket and travel in the same bus with you and it hardly
bothers you where they go. When your stop comes you get off the bus thanking
the driver. Cloud computing is just like that bus, carrying data andinformation for
different users andallows to use its service with minimal cost.
Why the NameCloud?

The term “Cloud” came


from a network design
that was used by network
engineers to represent
the location of various
network devices and
there inter-
connection. The shape of
this network design was
like a cloud.
Why Cloud Computing?
•Cloud computing decreases the hardware and software demand from
the user’s side. The only thing that user must be able to run is the
cloud computing systems interface software, which can be as simple as
Web browser, and the Cloud network takes care of the rest.
•With increase in computer and Mobile user’s, data storage has
become a priority in all fields. Large and small scale businesses today
thrive on their data & they spent a huge amount of money to maintain
this data. For them Cloud Computing is a cheaper solution. Perhaps
its efficiency in storing data, computation and less maintenance cost
has succeeded to attract even bigger businesses aswell.
Benefits of CloudComputing
Following are the benefits ofcloud computing:
•Lower IT infrastructure and computer costs for users
•Improved performance
•Fewer Maintenance issues
•Instant software updates
•Improved compatibility between Operating systems
•Backup and recovery
•Increased storage capacity
•Increase data safety
Types of Clouds
•Private Cloud: Here, computing resources are deployed for oneparticular
organization. This method is more used for intra-business
interactions. Where the computing resources can be governed, owned and
operated by the sameorganization.
•Community Cloud: Here, computing resources are provided for a
community and organizations.
•Public Cloud: This type of cloud is used usually for B2C (Business to
Consumer) type interactions. Here the computing resource isowned,
governed and operated by government, an academic or business
organization.
•Hybrid Cloud: This type of cloud can be used for both type of interactions -
B2B (Business to Business) or B2C ( Business to Consumer). This
deployment method is called hybrid cloud as the computing resources are
bound together by different clouds.
Cloud Computing Services
The three major Cloud Computing Offerings are
•Software as a Service(SaaS)
•Platform as a Service(PaaS)
•Infrastructure as a Service(IaaS)
Cloud ComputingArchitecture

Cloud computing
comprises of two
components front end
and back end. Front
end consist client part
of cloud computing
system. It comprise of
interfaces and
applications that are
required to access the
cloud computing
platform.
IoT(Internet of Things)
• The phrase Internet of Things (IoT) refers to connecting
various physical devices and objects throughout the world
via internet. The term IoT was firstly proposed by Kevin
Ashton in 1999.
• For example, when the household devices of our daily life
connect with the internet the system can be calleda Smart-
Home in IoT environment
• The Internet of Things (IoT) is the network of physical
objects—devices, instruments, vehicles, buildings and other
items embedded with electronics, circuits ,software,sensors
and network connectivity that enables these objects to
collect and exchange data.
Looking at the evolution of the Internet we can classify it into five eras:

1.The Internet of Documents -- e-libraries, document basedwebpages.


2.The Internet of Commerce -- e-commerce, e-banking and stocktrading
websites.
3. The Internet of Applications -- Web2.0
4. The Internet of People -- Socialnetworks.
5. The Internet of Things -- Connected devices andmachines.

In the past few years, IoT has been developed rapidly and a large number of enabling
technologies have been proposed.
The IoT has been the trend of the next Internet. Every available thing is getting smart. There
is a wide scope for re-search in IoT. Many new technologies will emerge in the upcoming
years taking a us to a whole new level of a smart world. . The future of IoT is very bright.
From our bills to vehicles everything would be connected providing a better lifestyle.
Wired Networks
• As we know "wired" is the term refers to any physical medium consisting of
cables. The cables can be copper wire, twisted pair or fiber optic. Wired
network is used to carry different forms of electrical signals from one end to
other.
The following classes of wired technologies are used in computernetworking.
• Coaxial Cable
It has a single copper conductor in the middle. A plasticlayer
provides insulation between the braided metal shield and
center conductor. The metal shield blocks outer interference
from motors, fluorescent lights, and othercomputers.
Coaxial cabling is extremely resistant to signal obstruction though it is compl
to install. It can handle great cable lengths between network devices than th
twisted pair cable. The two types of coaxial cables are thin coaxial and thick
coaxial.
• Fiber Optic Cable
Fiber optic cabling consists of a center glass core
surrounded by many layers of protective materials.
It removes the problem of electrical obstruction by
transmitting light rather than electronic signals. This makes them
perfect for certain atmospheres which contain huge amount of
electrical interference. It has become the standard for connecting
networks between buildings because of its resistance to lighting and
moisture.
• Twisted pair Cable
Twisted pair is the ordinary copper wire that connects home and many
business computers to the telephone company. To reduce crosstalk
or electromagnetic induction between pairs of wires, t w
insulated copper wires are twisted aroundeach other. o
Each connection on twisted pair requires bothwires.
Wireless Network

• As we know "Wireless" is the term refers to medium made of


electromagnetic waves (i.e. EM Waves) or infrared waves. All the wireless
devices will have antenna or sensors. Typical wireless devices include
cellular mobile, wireless sensors, TV remote, satellite disc receiver, laptops
with WLAN card etc. Wireless network does not use wires for data or voice
communication; it uses radio frequency waves as mentioned above. The
other examples are fiber optic communication link and broadband ADSL
etc.
• EXAMPLESof wirelessnetwork:
1.Outdoor cellular technologies such as GSM, CDMA, WiMAX, LTE,
Satellite etc.
2.Indoor wireless technologies such as Wireless LAN(or WiFi), Bluetooth,
IrDA, Zigbee, Zwave etc.
Most commonly used transmission media inwireless networks are:
•Microwave: Microwaves are high frequency waves that can be usedto
transmit data wirelessly over long distances. The microwave
transmission consists of a transmitter, receiver and atmosphere.
Microwave radiation can be used to transmit signals such as mobile
calls.

•Radio Wave: Radio waves are used to transmit television and radio
programmes. All radios today, use continuous sine waves to transmit
information(audio,video,data). WiFi that has become a common word
today also used radio wave to transmit data among connected devices.
• Satellite: Satellite communication is a special case of microwave relay
system. Satellite communication use the synchronous satellite to
relay the radio signal transmitted from ground station. A number of
communication satellites , owned by both government and private
organizations, have been placed in stationary orbits about 22,300
miles above the earth’s surface.
Computers: Clients and Servers
• In a client/server network
arrangement, network services
are located in a dedicated
computer whose only function is
to respond to the requests of
clients.

• The server contains the file,


print, application, security, and
other services in a central
computer that is continuously
available to respond to client
requests.
Concept of Client and Server
• A client and server networking model is a model in which computers
such as servers provide the network services to the other computers
such as clients to perform a user based tasks. This model is known as
client-server networking model.
• The application programs using the client-server model should follow
the given below strategies:
• An application program is known
as a client program, running on the
local machine that requests for a
service from an application
program known as a server
program, running on the remote
machine.
• A client program runs only when it
requests for a service from the
server while the server program
runs all time as it does not know
when its service isrequired.
• A server provides a service for
many clients not just for a single
client. Therefore, we can say that
client-server follows the many-to-
one relationship. Many clients can
use the service of oneserver.
• Client
A client is a program that runs on thelocal machine requesting service
from the server. A client program is a finite program means that the
service started by the user and terminates when the service is
completed.
• Server
A server is a program that runs on the remote machine providing
services to the clients. When the client requests for a service, then
the server opens the door for the incoming requests, but it never
initiates the service.
A server program is an infinite program means that when it starts, it
runs infinitely unless the problem arises. The server waits for the
incoming requests from the clients. When the request arrives at the
server, then it responds to the request.
Advantages of Client-servernetworks
•Centralized: Centralized back-up is possible in client-server networks, i.e., all the data is
stored in aserver.
•Security: These networks are more secure as all the shared resources are centrally
administered.
•Performance: The use of the dedicated server increases the speed of sharingresources.
This increases the performance of the overallsystem.
•Scalability: We can increase the number of clients and servers separately, i.e., the new
element can be added, or we can add a new node in a network at any time.
Disadvantages of Client-Server network:
•Traffic Congestion is a big problem in Client/Server networks. When a large numberof
clients send requests tothe same server may cause the problem of Traffic congestion.
•It does not have a robustness of a network, i.e., when the server is down, then the client
requests cannot be met.
•A client/server network is very decisive. Sometimes, regular computer hardware doesnot
serve a certain number of clients. In such situations, specific hardware is required at the
server side to complete thework.
•Sometimes the resources exist in the server but may not exist in the client. For example, If
the application is web, then we cannot take the print out directly on printers without
taking out the print view window on the web.
Network Devices
NIC
•A network interface controller (NIC, also known as a network
interface card, network adapter, LAN adapter or physical network
interface, and by similar terms) is a computer hardware component
that connects a computer to a computer network.
•Early network interface controllers were commonlyimplemented
on expansion cards that plugged into a computer bus. The low costand
ubiquity of the Ethernet standardmeans
that most newer computers have anetwork
interface built into themotherboard.
Switch: A network switch is a computer networking device that
connects devices on a computer network by using packet switching to
receive, process, and forward data to the destination device.

Switch is also used to connect multiple computers together in a LAN


workgroup, just like hub. Switches are available with 4,8,12,24,48,64
ports. Switch makes their switching decisions by using application
specific integrated circuits (ASICs).Due to switching decisioncapability,
switch sends signal to recipient only and that’s why switches are called
as intelligent hub. In below diagram leftmost node sending signal to
rightmost node.
With a switch, multiple stations
may transmit simultaneously:
no congestion as traffic grows. Switch

Station
Station
Connection 1 C
A
A-C

Connection 1
A-C Station
Station Connection 2 D
B B-D

Connection 2
Amit Kumar Pandey, PGT-CS,KVAliganj B-D
Hub: – It is used to connect multiple computers in a single LAN network of
one workgroup. Generally HUBs are available with 4,8,12,24,48 ports.When
a hub receives signal on its port, it repeats the signal and forwards that
signal from all ports except the port on which the signal arrived.
There are two types of HUB
Passive HUB:- It only forwards the signal on all ports without amplifying the
signal.
Active HUB:- it forwards the signal with improvement in the quality of data
signal by amplifying it. That why such hubs need additional powersupply.
Based on port type, there are two types of HUB:-
Ethernet HUB :- All ports have RJ-45connectors.
Combo HUB :- Several different types of connectors such RJ-45, BNC, and
AUI available as ports in such HUB.
Router: Router is a networking device which chooses the best optimal
path from available paths to send the signals. It interconnects different
networks. The simplest function of a router is to received packets from
one connected network and pass them to second connected network.
Access Point:
An access point(AP), also called wireless access point(WAP), is a
hardware device that establishes connection(s) of computing devices
on wireless LAN with a fixed wire network.
The APis connected to a fixed wire network and it than broadcast
wireless signals that computing devices having Wi-Fi cards candetect;
using these wireless signals, the computing devices get connected to
fixed wire network.
Modulation:
•In radio communication, a radio signal is ‘modulated’ so that it can be
transmitted over long distances. In the simplest terms, this means that
the radio signal (or input signal), i.e. the signal carrying audio
information, is added with a carriersignal.
•Unlike a radio signal (which usually has a very low frequency), acarrier
signal has a constant amplitude and frequency, i.e. a constant
waveform, which helps to carry the radio signal over long distances.
The process of ‘mounting’ the original signal to a carrier wave is called
modulation.
•The main function of carrier wave is to carry the audio or video signal
from the transmitter to the receiver. The superimposition of message
signal and carrier wave results into a new wave called modulated
wave.
Major Types ofModulation
Amplitude Modulation(AM):
Amplitude Modulation, commonly abbreviated as AM, is acommon
method of broadcasting radio signals.
In AM, the amplitude of the carrier wave is modified in order to
transmit the input signal (the one that carries information).
In AM, the amplitude of the carrier wave is modified proportionally
according to the amplitude of the input signal
AM involves the alteration of the amplitude of the carrier wave
The typical frequency range in which AM works is 535 to 1705 Kilohertz
Frequency Modulation(FM):
Frequency Modulation, often referred to as FM, is another, relatively
newer method of modulation where the carrier wave is modified
proportionally according to the input signal. In FM, the instantaneous
frequency of the carrier wave is altered according to the amplitude of
the input signal.
In FM, the frequency of the carrier wave is modified proportionally
according to the amplitude of the input signal
FM involves changes in the frequency of the carrier wave.
The frequency range is around 88-108 Megahertz for FM.
AM

FM

Amit Kumar Pandey, PGT-CS,KVAliganj


Collision in Wireless Network
•In a computer network, collision is a specific condition that occurs
when two or more nodes on a network transmit data at the same time.
•But in wireless networks, if collision occurs, the transmitting nodes
cannot detect it. This is because the nodes in a wireless network
cannot listen while transmitting(such type ofcommunication is called
HALF-DUPLEX).
•Thus for wireless networks strategies are adopted thatavoid collission
rather than detecting it.
•Wireless networks implement it using a special protocol called
CSMA/CA(Carrier Sense Multiple Access/Collision Avoidance) as wired
networks are FULLDUPLEXhence collision detection method used is
CSMA/CD(Carrier Sense Multiple Access/Collision Detection) .
How CSMA/CAworks?
The basic working principle of CSMA/CA is described in following lines:
1. Node ready to transmit/talk.
2. Listen for other nodes, if any transmission is taking place. One of the two
possibilities are:
1. Busy. A transmission is taking plave. Now do the following
1. Increase back off or wait time
2. Sleep as per wait time
3. Wake up and go to step1.
2. Free. No transmission is taking place. Now do the following:
1. Send message
2. Verify if proper transmission has taken place using one of the
following method
(a) ACK(Acknowledgement) Method
(b) Request to Send/Clear to Send(RTS/CTS)Method
Thus there are two versions of CSMA/CA:
1. CSMA/CA with ACK(Acknowledgement) Method
In this method, as soon as a node transmits data to another node,the
receiving node must send an acknowledgement signal called ACK,
once it has received the data. The ACKsignal must reach to the
sender node with in a specifictime-frame.
If the sender node does not receive ACKin specific time, it considers it
as a failed transmission and retransmits the data.
2. CSMA/CA with RTS/CTS(Ready to Send/Clear to Send)
In this method, the sender node first sends an RTSsignal to receiver.
Receiver confirms its readiness to receive by sending a CTSsignal to
the sender aswell asall other nodes.
• Other nodes upon receiving a CTSwill now not transmit(will wait) as
they now know that some transmission taking place and
communicate channel asBUSY.
• The sender node upon receiving a CTSgoes ahead with transmission.
Once the transmission ends, the receiver node sends ACKsignal to all
nodes:
• The sender nodes take it(ACK) as confirmation of successful
transmission.
• Other nodes take ACKsignal as end of transmission. Now they can
transmit, if they need to as now channel if FREE.
Error Checking (Error Detection)
Error
A condition when the receiver’s information does not matches with
the sender’s information. During transmission, digital signals suffer
from noise that can introduce errors in the binary bits travelling from
sender to receiver. That means a 0 bit may change to 1 or a 1 bit may
change to 0.
• Error Detecting Codes Whenever a message is transmitted, it may
get scrambled by noise or data may get corrupted. To avoid this, we
use error-detecting codes which are additional data added to a given
digital message to help us detect if any error has occurred during
transmission of the message.

• Basic approach used forerror detection is the use of redundancy bits,


where additional bits are added to facilitate detection of errors.
Some popular techniques for error detectionare:
1. Simple Parity check
2. Two-dimensional Parity check
3. Checksum
4. Cyclic redundancy check
1. Simple Parity check
Blocks of data from the source are subjected to a check bit or parity
bit generator form, where a parity of :
• 1 is added to the block if it contains odd number of 1’s, and
• 0 is added if it contains even number of 1’s
This scheme makes the total number of 1’s even, that is why it is called
even parity checking.
2. Two-dimensional Parity check
Parity check bits are calculated for each row, which is equivalent to a
simple parity check bit. Parity check bits are also calculated for all
columns, then both are sent along with the data. At the receiving end
these are compared with the parity bits calculated on the received
data
• 3. Checksum
• In checksum error detection scheme, the data is divided into k
segments each of m bits.
• In the sender’s end the segments are added using 1’scomplement
arithmetic to get the sum. The sum is complemented to get the
checksum.
• The checksum segment is sent along with thedata segments.
• At the receiver’s end, all received segments are added using 1’s
complement arithmetic to get thesum. The sum is complemented.
• If the result is zero, the received data is accepted; otherwise
discarded.
Idea of Routing
• routing is the process of moving data packets between different
networks. By default two different IP networks cannot communicate
with each other. They need a mediator device thatcan switch packet
between them. Router takes this responsibility. Routers interfaces
are associated with different networks. This association is kept in
routing table. Routers use it to take switching decision.
Following figure illustrates a simple routing example.
• 10.0.0.0/8 Network is connected on router’s F0/1
interface.
• 20.0.0.0/8 Network is connected with router’s
F0/2 interface.
• Laptop sends a packet to PC.
• Router receives this packet in F0/1 interface.
• Router checks destination address field in packet.
• Packet has 20.0.0.2/8 address in destination
address field.
• IP address 20.0.0.2/8 belongs to 20.0.0.0/8
network.
• Router checks routing table for matching network.
• Routing table has an entry for 20.0.0.0/8 network.
• 20.0.0.0/8 Network is associated with F0/2
interface of router.
• Based on this information router moves this packet
from F0/1 to F0/2.
• F0/2 interface sends this packet to itsdestination.
Addresses on a Network
n a network, various types of addresses play roles. Different addresses used on a
etwork are:
a)Web Address(URL) (b) IPAddress
eb Address(URL): A Location on a net server is called a URL(Uniform Resource
ocator). Each website has a unique address called URL. Ex. The website address or
RLfor Kendriya Vidyalaya Sangathan is https://www.kvsangathan.nic.in.
verview of URL:

ttps://www.kvsangathan.nic.in/academic/admission-guidelines

rotocol Subdomain address of server Directory web-page


• http:// or https://
The "http"stands for Hypertext Transfer Protocol and is what enables
the browser to know what protocol it is going to use to access the information
specified in the domain. An "https" protocol is short for "Hypertext Transfer
Protocol Secure" and indicates that information transmitted over HTTPis
encrypted and secure. After the http or https is the colon ( : ) and two forward
slashes ( / / ) that separate the protocol from the remainder of the URL.
• www.
Next, "www" stands for World Wide Web and is used to distinguish the content.
This portion of the URLis not required and many times can be left out.
• kvsangathan.nic.in
Next, "kvsangathan.nic.in" is the domain name for the website. The last portion of
the domain is known as the domain suffix and is used to identify the type or
location of the website.
• academic
Next, the “academic" portion of the above URLis the directory of
where on the server theweb page is located.
• admission-guidelines
It is web page stored in academic directory that will be displayed in
browser.
IPAddress
• IP address is a unique numerical label as a string of numbers
separated by dots, used to identify a device on the internet.
• IP address is short for Internet Protocol (IP) address. Each network
device on a TCP/IP network needs to have a unique address on the
network. Yhis unique address on a TCP/IP network is IP address.
• IP address are needed so that different networks can communicate
with each other.
• Ip addresses can be thought of as a unique series of numbers,
uniquely identifying a computer on a network. Each IP address is
actually a series containing four numbers separated by dots or periods
ex. 192.168.1.1 and 20.123.61.124 are IPaddresses
• IP addresses are normally written in dotted decimal formbut
computers internally convert them intobinary form
Internal Protocol Versions
There are currently two versions ofIP.
1. IPv4: It is most widely deployed Internet protocol used to connect devices to
the Internet. IPv4 uses a 32-bit address scheme allowing for a total of 232
addresses. With the growth of the internet it is expected that the number of
unused IPv4 addresses will eventually run out because every deviceincluding
computers, smart phones and game consoles-that connects to internet
requires an address.
An IPv4 address has following format: x.x.x.x, where x is calles an octet andmust
be a decimal value between 0 and 255.An IPv4 address must contain three
periods and four octets.
2. IPv6 Address: A new Internet addressing system Internet Protocol version6 is
being deployed to fulfill the need for more internet addresses. IPv6 utilizes 128-
bit Internet Addresses.
The IPv6 address can have either of the following two formats:
(i) Normal IPv6 Address: This has following format:
y:y:y:y:y:y:y:y, where y is called a segment and can be
any hexadecimal value between 0 and FFFF.The segments are separated by
colons- not periods. An IPv6 normal address must have eightsegment.
(ii) IPv6(Dual) Address. An IPv6(Dual) address combines an IPv6 and
IPv4 address and has the IPv6 portion of the address(indicated with
y’s) is always at the beginning, followed by the IPv4
portion(indicated with x’s).
y: y: y: y: y:y:x.x.x.x
Ex.
i. 1001:ab4:2222:4444:1111:4567:2.3.4.5
ii. ::12.13.14.15 (implies all six IPv6 segment are zero)
iii. ::1234:5678:192.168.1.1 (first four IPv6 segment are zero)
iv. 1001:ab4::192.188.2.2 (first four IPv6 segment are zero)
v. 2001:ab4::1234:5678:1.2.3.4( middle two IPv6 segment arezero)
Routing Table
• Arouting table is a set of rules, often viewed in table format, that is
used to determine where data packets traveling over an Internet
Protocol (IP) network will be directed. All IP-enabled devices,
including routers and switches, use routing tables.
• A routing table contains the information necessary to forward a
packet along the best path toward its destination. Each packet
contains information about its origin and destination. When a packet
is received, a network device examines the packet and matches it to
the routing table entry providing the best match for its destination.
The table then provides the device with instructions for sending the
packet to the next hop on its route across the network.
A basic routing table includes the following information:
• Destination: The IP address of the packet's final destination
• Next hop: The IP address to which the packet isforwarded
• Interface: The outgoing network interface thedevice should use
when forwarding the packet to the next hop or final destination
• Metric: Assigns a cost to each available route so that the most cost-
effective path can be chosen
• Routes: Includes directly-attached subnets, indirect subnets that are
not attached to the device but can be accessed through one or more
hops, and default routes to use for certain types of traffic or when
information is lacking. Routing tables can be maintained manuallyor
dynamically.
• In the example below we have a network of two computers and a
router. Host A wants to communicate with Host B. Because hosts are
on different subnets, Host A sends its packet to the default gateway
(the router). The router receives the packet, examines thedestination
IP address, and looks up into its routing table to figure out which
interface the packet will be sentout.
To Display the route table inWindows
Type netstat –rn from command
DNS
• The Domain Name Systems (DNS) is the phonebook of the Internet.
Humans access information online through domain names, like
yahoo.com or espn.com. Web browsers interact through Internet
Protocol (IP) addresses. DNStranslates domain names to IP
addresses so browsers can load Internet resources.

• Each device connected to the Internet has a unique IP addresswhich


other machines use to find the device. DNS servers eliminate the
need for humans to memorize IP addresses such as 192.168.1.1 (in
IPv4), or more complex newer alphanumeric IP addresses such as
2400:cb00:2048:1::c629:d7a2 (in IPv6).
• How Domain Name Resolution Works?
The domain name resolution takes place behind the scene and the user would not
be able to notice it. Lets see what all happens behind the scenes in DNS.
(i)You enter the domain name in a browser in order to reach there.
(ii)Browser now issue a command to Operating system asking to provide
corresponding IP address of given domain.
(iii) Operating system try toresolve the domain name as depicted below:
(a)Refers to its HOSTSfile to obtain corresponding address.Every
O.S maintains HOSTSfile that stores IP addresses of some
domains.
(b)If previous method fails connects to DNS Server on Internet. The DNS
Server on internet maintains directory of all domain names registered on
Internet.
Command to view IP address of a website is: tracertwebsitename
Ex: c:\> tracert google.com
TCP: basic idea of retransmission
• The TCPretransmission mechanism ensures that data is reliably sent from endto
end. If retransmissions are detected in a TCPconnection, it is logical to assume
that packet loss has occurred on the network somewhere between client and
server.
• Retransmission is a very simple concept. Whenever one party sends something to
the other party, it retains a copy of the data it sent until the recipient has
acknowledged that it received it. In a variety of circumstances the
sender automatically retransmits the data using the retained copy. Reasons for
resending include:
• if no such acknowledgment is forthcoming within a reasonable time, the time-out
• the sender discovers that the transmission wasunsuccessful
• if the receiver knows that expected data has not arrived, and so notifies the
sender
• if the receiver knows that the data has arrived, but in a damaged condition, and
indicates that to thesender
rate modulation when there iscongestion
• Rate modulation –Symbol rate /baud rate/modulation rate is the
number of symbol / signalling changes during transmission per time
unit .it is measured in baud(Bd)/symbol per second
• Rate modulation in congestion: Congestion occurs when the number
of packets being transmitted through the network approaches the
packet handling capacity of the network. Whenever there is a
timeout, TCPassumes congestion in the network and starts to reduce
its sending rate.
Protocols: 2G, 3G, 4G, WiFi.
• Protocols –
Cellular technology refers to having many small interconnected transmitters as
opposed to a single big one, and uses multiplexing(multiple access) to send
information. Various multiplexing options available tocommunication channel
are:
1.Frequency Division Multiple Access(FDMA): Available bandwidth is divided into
frequency bands. Each user is assigned a different frequency from thecomplete
spectrum.
2.Time Division Multiple Access(TDMA): The station share the bandwidth of the
channel in time. Asingle radio frequency is divided into multiple slots and each
slot is assigned to a different user. Somultiple users can be supported
simultaneously.
3.Code Division Multiple Access(CDMA): Here several users share the same
frequency spectrum simultaneously. They are differentiated by assigningunique
codes to them.
Simply, the "G" stands for "GENERATION" . While you connected to
internet, the speed of your internet is depends upon the signal
strength that has been shown in alphabets like 2G, 3G, 4G etc. right
next to the signal bar on your home screen.
1G: Voice Only
•Remember analog phones back in the day? Cell phones beganwith
1G technology in the 1980s. 1G is the first generation of wireless
cellular technology. 1G supports voice only calls.
•1G is analog technology, and the phones using it had poor battery
life and voice quality, little security, and were prone to dropped calls.
•The maximum speed of 1G technology is 2.4 Kbps.
• 2G: SMS andMMS
• Cell phones received their first major upgrade when their technology
went from 1G to 2G. This leap took place in Finland in 1991
on GSM networks and effectively took cell phones fromanalog to
digital communications.
• The 2G telephone technology introduced call and text encryption,
along with data services such as SMS, picture messages, and MMS.
• Although 2G replaced 1G and is superseded by later technology
versions, it's still used around the world.
• The maximum speed of 2G with General Packet Radio Service (GPRS)
is 50 Kbps. The speed is 1 Mbps with Enhanced Data Rates for GSM
Evolution (EDGE).
• 3G: More Data, Video Calling, and Mobile Internet
• The introduction of 3G networks in 1998 ushered in faster data-
transmission speeds, so you could use your cell phone in more data-
demanding ways such as for video calling and mobile internet access.
The term "mobile broadband" was first applied to 3G cellular
technology.
• Like 2G, 3G evolved into the much faster 3.5G and 3.75G as more
features were introduced to bring about 4G.
• The maximum speed of 3G is estimated to be around 2 Mbps for non-
moving devices and 384 Kbps in moving vehicles.
• 4G: The Current Standard
• The fourth generation of networking, which was released in 2008, is
4G. It supports mobile web access like 3G does and also gaming
services, HD mobile TV, video conferencing, 3D TV, and other
features that demand highspeeds.
• The max speed of a 4G network when the device is moving is 100
Mbps. The speed is 1 Gbps for low-mobility communication suchas
when the caller is stationary orwalking.
• Most current cell phone models support both4G and 3G
technologies.
Wi-Fi
WiFi is a technology for wireless local area networking with devices
based on the IEEE802.11 standards. Devices that can use Wi-Fi
Technology include PC, smart phones and tablets etc. Wifi compatible
devices can connect to the internet via a WLAN and a wireless access
point.
What makes a protocol have a higher bandwidth
A number of factors are responsible for a protocol tohave a higher
bandwidth:
1.With the digitization of the signal over generations of mobile
communications, data traffic already exceeds voice traffic andis
growing exponentially.
2.The telephone, computer and entertainment industries have allgone
digital and have almost converged into one. Smartphones nowadays
act as a telephone, music and video player, gaming etc and more, with
all worldwide wireless connectivity to the internet at high band.
Basic Network Tools
The network tools/commands are primarily used:
a.For network configuration
b.For network troubleshooting
c.To identify network status
d.To identify users
e.Following are the commonly used networktools:
1.Traceroute: It is a network diagnostic tool to track the pathway taken by a packet
on an IP network from source to destination.
Ex> c:\>tracert google.com
2.Ping: Ping command is a command prompt command used to test the ability of
the source computer to reach a specified destination computer.
Ex c:\>ping 192.168.1.1-t
3.ipconfig: It is an extensively used networking troubleshooting
command. It is often used to display the basic networking
information(addresses etc.) on a given computer but can do much
more than that. It can release and renew IP addresses for any adapter,
it can refresh DHCPleases for dynamic adapters it can also flush the
DNScache, and much more.
If you type ipconfig/? At command prompt you will see a list of the
ipconfig parameters and their use.
4.nslookup: (name server lookup) is a network utilityprogram used to
obtain information about internet servers. It finds name server
information for domains by querying theDomain Name System.
Type nslookup IPaddress
5. Whois: It is a query and response protocol that is widely used for
querying databases that store the registered users or assignees of an
internet resource, such as a domain name, an IP address block, or an
autonomous system, but is also used for a wider range of other
information.
•Running Whois onWindows
•Download and install whois software. Windows does notcome with
whois by default.
6.Speed Test:
OSIModel
• OSI (Open Systems Interconnection) is a reference model for how
applications communicate over anetwork.
• OSI Model is:
• i) logical models.
• ii) define standards for networking.
• iii)divide the network communication process inSeven layers.
• In this architecture, each layer serves the layer above it and, in turn,
is served by the layer below it. So, in a given message between users,
there will be a flow of data down through the layers in the source
computer, across the network, and then up through the layers in the
receiving computer. Only the application layer, at the top of the
stack, doesn’t provide services to a higher-levellayer.
Function of Layers of OSI Model
Application Layer
• Application Layer is the top most layer of OSI(Open System
Interconnection) which is responsible for generatingand receiving
data that can be transported on thenetwork.
• Manipulation of data in various ways is done in this layer which
enables a user to get access to thenetwork.
• Some service provided by this layer include e-mail, transferringfiles,
directory services, network resources etc.
HTTP
• HTTP stands for Hyper Text Transfer Protocol. Communication
between client computers and web servers is done by sendingHTTP
Requests and receiving HTTPResponses.
• HTTPis the underlying protocol used by the World Wide Web and
this protocol defines how messages are formatted and transmitted,
and what actions Web servers and browsers should take inresponse
to various commands.
• For example, when you enter a URLin your browser, this actually
sends an HTTPcommand to the Web server directing it to fetch and
transmit the requested Web page. The other main standard that
controls how the World Wide Web works is HTML, which covers how
Web pages are formatted and displayed.
E-mail System
E-mail system comprises of the followingthree components:
i) Mailer
ii) Mail Server
iii) Mailbox
• Mailer
It is also called mail program, mail application or mail client. It allows us to
manage, read and compose e-mail.
• Mail Server
The function of mail server is to receive, store and deliver the email. It is must for
mail servers to be Running all the time because if it crashes or is down, email can
be lost.
• Mailboxes
Mailbox is generally a folder that contains emails and information about them.
Following example will take you through the basic steps involved in sending and receiving emails :
Suppose person A wants to send an email message to person B.
• Person A composes the messages using a mailer program i.e. mail client and then select Sendoption.
• The message is routed to Simple Mail Transfer Protocol toperson B’s mail server.
• The mail server stores the email message on disk in an area designated for personB.
• Now, suppose person Bis running a POPclient and knows how to communicate with B’s mailserver.
• It will periodically poll the POPserver to check if any new email has arrived for B.As in this case, person B
has sent an email for person B, so email is forwarded over the network to B’s PC.This is message is now
stored on person B’s PC.

Amit Kumar Pandey, PGT-CS,KVAliganj


HTTPS
• Hypertext Transfer Protocol Secure (HTTPS) is an extension of the Hypertext
Transfer Protocol (HTTP). It is used for secure communication over acomputer
network, and is widely used on the Internet. In HTTPS, the communication
protocol is encrypted using Transport Layer Security(TLS).
• The principal motivation for HTTPSis authentication of the accessed website and
protection of the privacy and integrity of the exchanged data while in transit. It
protects against man-in-the-middle attacks. The bidirectional encryption of
communications between a client and server protects
against eavesdropping and tampering of thecommunication
• Historically, HTTPSconnections were primarily used for payment transactions on
the World Wide Web, e-mail and for sensitive transactions in corporate
information systems. Since 2018, HTTPSis used more often by web users than
the original non-secure HTTP, primarily to protect page authenticity on all types
of websites; secure accounts; and keep user communications, identity, and web
browsing private.
Network Applications
• Remote Desktop:Remote desktop is a program or an operating
system feature that allows a user to connect to a computer in
another location, see that computer's desktop and interact with it as
if it were local.
People use remote desktop access capabilities to do a variety ofthings,
including the following:
• Access a workplace computer from home or whentravelling.
• Access a home computer from other locations.
• Fix a computer problem.
• Perform administrative tasks.
• Demonstrate something, such as a process or a software application
• Remote desktop protocols
A remote desktop connection relies upon any of a number of protocols, including
Remote Desktop Protocol (RDP), virtual network computing (VNC), NXtechnology
and Independent Computing Architecture (ICA).
• Remote desktop access software
• Remote desktop access software exists for most operating systems and
platforms, including hand-held computing devices. Microsoft and Apple each
have a product called "Remote Desktop." Other remote desktop products
include Citrix XenApp, CrossLoop, Jaadu (for the iPhone and iPod Touch),
GoToMyPC, pcAnywhere and Chicken of the VNC.

nj
FTP (File Transfer Protocol)
File Transfer Protocol (FTP) is a standard Internet protocol for
transmitting files between computers on the Internet
over TCP/IP connections. FTPis a client-server protocol where a client
will ask for a file, and a local or remote server will provide it.
How FTPworks
• FTPis a client-server protocol that relies on two communications
channels between client and server: a command channel for
controlling the conversation and a data channel for transmitting file
content. Clients initiate conversations withservers by requesting to
download a file.
• Using FTP, a client can upload, download, delete, rename, move and
copy files on a server. A user typically needs to log on to the FTP
server, although some servers make some or all of their content
available without login, known as anonymousFTP.
Session Control Protocol (SCP)
• Several heavily used Internet applications such as FTP, GOPHER, and
HTTPuse a protocol model in which every transaction requires a
separate TCPconnection. Since clients normally issue multiple
requests to the same server, this model is quite inefficient, as it
incurs all the connection start up costs for every single request.
• SCPis a simple protocol which lets a server and client have multiple
conversations over a single TCPconnection. The protocol is designed
to be simple to implement, and is modelled after TCP.
Secure Shell (SSH)
• Secure Shell (SSH) is a cryptographic network protocol for operating network
services securely over an unsecured network. Typical applications include
remote command-line, login, and remote command execution, butany network
service can be secured with SSH.
• SSHprovides a secure channel over an unsecured network in aclient–
server architecture, connecting an SSHclient application with an SSHserver.The
protocol specification distinguishes between two major versions, referred to as
SSH-1 and SSH-2. The standard TCPport for SSHis 22. SSHis generally used to
access Unix-like operating systems, but it can also be used on Microsoft
Windows. Windows 10 uses OpenSSH as its default SSHclient.
• SSHwas designed as a replacement for Telnet and
for unsecured remote shell protocols. The encryption used by SSHis intended to
provide confidentiality and integrity of data over an unsecured network, such as
the Internet.
POP (Post Office Protocol)
• POP3 (Post Office Protocol 3) is the most recent version of a standard
protocol for receiving e-mail. POP3 is a client/server protocol in
which e-mail is received and held for you by your Internet server.
• POP3 is designed to delete mail on the server as soon as the userhas
downloaded it. However, some implementations allow users or an
administrator to specify that mail be saved for some period of time.
POPcan be thought of as a "store-and-forward" service.

Amit Kumar Pandey, PGT-CS,KVAliganj


IMAP (Internet MessageAccess Protocol)
• MAP (Internet Message Access Protocol) is a standard
email protocol that stores email messages on a mail server, but
allows the end user to view and manipulate the messages as though
they were stored locally on the end user's computing device(s). This
allows users to organize messages into folders, have multiple client
applications know which messages have been read, flag messagesfor
urgency or follow-up and save draft messages on theserver.
• IMAP can be contrasted with another client/server email protocol,
Post Office Protocol 3 (POP3). With POP3, mail is saved for the end
user in a single mailbox on the server and moved to the end user's
device when the mail client opens. While POP3 can be thought of as a
"store-and-forward" service, IMAP can be thought of as a remote file
server.
SMTP (Simple MailTransfer Protocol)
• SMTP(Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and
receiving e-mail. However, since it is limited in its ability to queue messages at
the receiving end, it is usually used with one of two other protocols, POP3 (Post
Office Protocol) or IMAP (Internet Message Access Protocol), that let the user
save messages in a server mailbox and download them periodically from the
server.
• In other words, users typically use a program that uses SMTPfor sending e-mail
and either POP3 or IMAP for receivinge-mail.
Voice over Internet Protocol (VoIP)
• Stands for "Voice Over Internet Protocol," and is often pronounced
"voip." VoIP is basically a telephone connection over the Internet.The
data is sent digitally, using the Internet Protocol (IP) instead of analog
telephone lines. This allows people to talk to one another long-
distance and around the world without having to pay long distance or
international phone charges.
• Because VoIP information is packetized and individual packets may
take different paths over the internet, VoIP technology makes use of
compression and encoding technology to make sure that packets are
correctly ordered when they reach the recipient; otherwise, the
transmission would be garbled.
Near-field communication (NFC)
• Near-field communication (NFC) is a set of communication
protocols that enable two electronic devices, one of which is usually a
portable device such as a smartphone, to establish communication
by bringing them within 4 cm (11⁄2 in) of each other.
• NFCdevices are used in contactless payment systems, similar to
those used in credit cards and electronic ticket smart cards and
allow mobile payment to replace or supplement these systems. This
is sometimes referred to as NFC/CTLS (contactless) or CTLSNFC.
• NFCis used for social networking, for sharing contacts, photos, videos
or files.NFC-enabled devices can act as electronic identity
documents and keycards.
• Near Field Communication (NFC) is a short-
range wireless connectivity standard that usesmagnetic
field induction to enable communication between devices when
they're touched together, or brought within a few centimeters of
each other. Jointly developed by Philips and Sony, the standard
specifies a way for the devices to establish a peer-to-peer (P2P)
network to exchange data. Here are some examples of howNFCcan
be used:
• You could take pictures with a cell phone with a built in camera, and
touch an enabled computer or television set to transmit the images
for display;
• In conjunction with another wireless technology, you could transfer
large files between two devices, such as a laptop and a desktop,
simply by touching the two together.

You might also like