0% found this document useful (0 votes)
30 views59 pages

Computer Network 2

The document provides an overview of various networking devices and components, including modems, RJ-45 connectors, NICs, hubs, switches, repeaters, bridges, routers, gateways, and Wi-Fi cards. It explains their functions, types, and applications in computer networks, as well as guidelines for building a small LAN and choosing appropriate cabling. Additionally, it discusses network protocols like HTTP, HTTPS, and FTP, highlighting their roles in communication and data transfer.

Uploaded by

ym7572973
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views59 pages

Computer Network 2

The document provides an overview of various networking devices and components, including modems, RJ-45 connectors, NICs, hubs, switches, repeaters, bridges, routers, gateways, and Wi-Fi cards. It explains their functions, types, and applications in computer networks, as well as guidelines for building a small LAN and choosing appropriate cabling. Additionally, it discusses network protocols like HTTP, HTTPS, and FTP, highlighting their roles in communication and data transfer.

Uploaded by

ym7572973
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 59

Computer

Networks - 11
Network
1) Modem
Devices
 Modem stands for Modulator/Demodulator.
 The modem is defined as a networking device that is used to
connect devices connected in the network to the internet.
 The main function of a modem is to convert the analog
signals that come from telephone wire into a digital form (0s
and 1s).
 The modem can perform both the task of modulation and
demodulation simultaneously.
 The modem is also known as a signal translator as it
translates one signal into another signal by modulating
the digital signal into an analog signal for transmission and
then demodulates receiving analog signals into digital
signals.
 Modulation is the process of sending data on a wave, 3
types of modulation techniques are used:
 AM (Amplitude Modulation)
 FM (Frequency Modulation)
 PM (Phase Modulation)
 Modems are in 2 varieties:
 Internal Modems
 External Modems
 An internal modem is a modem that fits inside of a computer.
Internal modems typically ship with the computer and come
pre-installed.

 An external modem is a network device that is in a self-


contained enclosure external to a computer. External
modems have lights indicating various modem functions and
they can easily be moved from one computer system to
another. The do, however, require one COM or USB port to
operate.
2) RJ-45
 RJ45 stands for Registered Jack 45 (listing number) and is the
most commonly used connector in wired networks.
 The jacks are mainly used to connect to the Local Area
Network (LAN).
 It was earlier devised for telephones but is now widely used
in Ethernet Networking.
 The width of RJ45 is usually greater than that of the
telephone cables or other Registered Jacks.
 Compared to additional jacks the bandwidth provided by
these is high and the range is usually 10 Gbps.
 Because of speed and enhanced security, they are used to
connect personal computers to servers, routers etc.
 These jacks are mostly used in Star Topology.
3) NIC (Network Interface Card)
 It is a network card attached to a host to establish
connection.
 Every NIC has a unique physical address called Mac address,
6 bytes (48 bits) and is assigned by NIC manufacturer.
(Click Start > Control Panel > Network and Internet > Network
and
Sharing Center. OR ipconfig/all in cmd prompt)
 NIC is also called as NIU / TAP (Network Interface Unit /
Terminal Access Point)
 The MAC address refers to the physical address assigned by
NIC manufacturer.
3.a) Ethernet Card
 Ethernet card is a type of NIC, which is specific to Ethernet
technology.
 Ethernet uses bus or star topology and can support data
transfer rates of up to 10 Gbps.
 The computers that are part of Ethernet, have to install a
special card called Ethernet card.
 Ethernet card contains connections for either coaxial or
twisted pair or both.
 If it is designed for coaxial cable, the connection will be BNC.
 If it is designed or twisted pair, then it will be RJ-45
connection.
 Some ethernet card also contains an AUI connector
(Attachment Unit Interface)
 BNC Connector (Bayone-Neil-Concelman) – it is a standard
connector used to connect 10Base2 coaxial cable (thin
coaxial cable)

 AUI Connector (Attachment Unit Interface) – A 15-pin


connector found on Ethernet card that can be used for
attaching coaxial, fibre optic, or twisted pair cable.
4) Hub:
 Hub in networking plays a vital role in data transmission
and broadcasting.
 A hub is a hardware device used at the physical layer to
connect multiple devices in the network.
 Hubs are widely used to connect LANs.
 A hub has multiple ports. Unlike a switch, a hub cannot
filter the data, i.e. it cannot identify the destination of
the packet, So it broadcasts or sends the message to
each port.
4.a) Active Hub: 4.b) Passive Hub:
 They have a power  Passive hubs are simply
supply for used to connect signals
regenerating, and from different network
amplifying the cables as they do not have
signals as it moves any computerised element.
from one device to  Passive hubs do not do any
another. processing or signal
 Active concentrators regeneration and that’s
are used like why do not require
repeaters to extend electricity the most they
the length of can do is they can copy or
network. repeat the signal.
 Active hubs are  It can’t clean the message,
expensive as and it can’t amplify or
compared to passive strengthen the signal.
5) Switch:
 The Switch is a network device that is used to segment
the networks into different subnetworks called subnets
or LAN segments.
 It is responsible for filtering and forwarding the packets
between LAN segments based on MAC address.
 Switches have many ports, and when data arrives at any
port, the destination address is examined first and some
checks are also done and then it is processed to the
devices.
 Different types of communication are supported here like
unicast, multicast, and broadcast communication.
 Switch establishes a temporary connection between
the source and destination for communication and
terminates the connection once the conversation is
done.
 Also, it offers full bandwidth to network traffic going to
and from a device simultaneously to reduce collision.
6) Repeater:
 Repeaters are defined as a networking device that is
used to amplify and generate the incoming signal.
 The major advantage of using a repeater is that it
provides with transfer of data with more security and
over a long distance.
 The main aim of using a repeater is to increase the
networking distance by increasing the strength and
quality of signals.
 The performance of Local Area Networks
(LANs) and Wide Area Networks (WANs) repeaters are
used.
 Using repeaters helps to reduce error, and loss of data
and provides with delivery of data at specified locations
only.
7) Bridge:
 A bridge in a computer network is a device used to
connect multiple LANs together with a larger Local Area
Network (LAN).
 The mechanism of network aggregation is known as
bridging.
 The bridge is a physical or hardware device and is also
known as a layer of two switches.
 Basically, a bridge in computer networks is used to
divide network connections into sections, now each
section has a separate bandwidth and a separate
collision domain.
 Here bridge is used to improve network performance.
8) Router:
 A Router is a networking device that forwards data
packets between computer networks.
 By sending data packets to their intended IP addresses, it
manages traffic between different networks and permits
several devices to share an Internet connection.
 A router determines a packet’s future path by examining
the destination IP address of the header and comparing it
to the routing database.
 The list of routing tables outlines how to send the data to
a specific network location. They use a set of rules to
determine the most effective way to transmit the data to
the specified IP address.

Modem Vs Hub, Switch,


Router
 Wired routers connect directly with other networking
devices such as computers, printers and more through
cables. These kind of routers are very reliable ensuring
that connection drops are minimal.

 Wireless routers don’t require to be connected with cables


through multiple devices for providing internet.
9) Gateway:
 A gateway is a network node or device that connects two
networks that use different transmission protocols.
 The gateway monitors and controls all the incoming and
outgoing traffic of the smooth communication of network.
 It works as the entry-exit point for a network because all
traffic that passes across the networks must pass through
the gateway.
10) Wi-Fi Card:
 A Wi-Fi card is either an internal or external LAN adapter
with built-in wireless radio and antenna.
 The most common WiFi cards used in desktop computers
are PCI-Express WiFi cards in PCI-Express card slot on
motherboard.
 The main benefit is that it allows you to setup your
workstation or home office without considering the
proximity or availability of hard line network access.

PCI – Peripheral Component Interconnect


11) Network Devices and Component’s Checklists:

For
Building a
Small
LAN
For
Connecting
Offices and
Department
s

(Optional)
(ISDN/Leased Line etc.)

For
Connecting
Dispersed
Office Sites

Each location for


WAN connection
Where to place Server in a Network:
 Ideally, client computers should be placed on the same
“logical” network as the servers they access most often.

 Good rule of thumb: in a properly designed small to medium-


sized network environment, 80% of the traffic on a given
network segment is local, and not more than 20% of network
traffic should need to move across a backbone.

 Example: network connects the computer of 3 buildings


having number of computers as:
 Building A: 120 Computers
 Building B: 20 Computers
 Building C: 25 Computers
Building A: 120 Building B: 20 Building C: 25
Computers Computers Computers

As per 80:20 rule, server should be placed in Building A as it


hosts the maximum number of computers.
Choose twisted pair when………:
 Low cost
 Easy installation
 No High Speed data requirements (limited data
rate - 100 MHz, limited bandwidth(1 MHz))

 Other factors………
 Analog transmissions (amplifiers required every
5 to 6 km).
 Digital transmissions (repeaters required every
2 or 3 km).
 Susceptible to interference and noise.
Choose Coaxial cable when………:
 Television signal distribution (Ariel to TV, Cable
TV)
 Long distance telephone transmission – can carry
10000 voice calls simultaneously.
 Short distance computer system links required.
 LAN to be formed among some computers.

 Other factors………
 Analog transmissions (amplifiers required every
5 to 6 km).
 Digital transmissions (repeaters required every
1 km).
Choose Radio waves
Choose Fiber Optics when………:
 Long distances are to
when………:
 Greater data capacity be covered.
 Signals must be able to
required – Data rates of
hundreds of Gbps penetrate walls,
 Lower attenuation is buildings
 Transmission must be
required.
 Secure transmission. omnidirectional.
 Most expensive
 Other factors………
 Other factors………  Health
Choose Infrared
hazards
 Greater repeater when………:
 No license needed to
spacing – 10s of km
at least transmit
 Other factors………
 Cannot penetrate
Choose Microwave Choose Satellite
when………: when………:
 Transmission should be  Transmission has to
in directional. take place over a very
 Cheaper than other large area of earth.
unguided media.  Long distance
 Long distance television distribution
telephone service. and telephone
transmission.
 Other factors………
 Requires Repeater  Other factors………
every 30 miles  Expensive tower and
because of Line-of- repeaters.
sight transmission.  Subject to
interference such as
passing airplanes
Example:
Fantastic corporation caters to many high profile clients and
has 5 buildings where it runs its operations

[185]
[55] [60]

50 mts Grey 30 mts Wiz


Pro Cell ard
35 mts
45
m 65 m
ts ts
ts
120 m
mts 30
Rob Mas
o ter
40 mts
[55] [70]
The distance between buildings are shown through in a
diagram. The numbers in [ ] indicate number of computers in
each building i.e,

Building Pro has 55 computers


Building Grey Cell has 185 computers
Building Wizard has 60 computers
Building Robo has 55 computers
Building Master has 70 computers

Answer the following questions on the basis of given


information:
1) Suggest the possible cable layouts for the buildings.

Answer: 190 m, 155 m


1

50 mts 30 mts 2
Grey Wiz
Pro Cell ard
Total cable length
required to connect

65
ts buildings through this

m
m
layout = 155 m

ts
45
Rob Mas
o ter

Grey Wiz
Total cable length Pro Cell ard
required to connect
buildings through this
layout = 190 m
Rob Mas
o ter
Answer the following questions on the basis of given
information:

2) Where would you suggest the placement of server?

Answer: as per 80-20 rule, the server should be placed in the


building with maximum number of computers. Thus, we suggest
that server should be placed in Grey Cell building.

3) Suggest the cable type that should be used.

Answer: Thicknet coaxial cable as these can support networks


of upto 500 mts (1640 ft)
4) The management wants that the network traffic should
be minimized. For this which network device would you
suggest out of the following devices and why?
i) Hub ii) repeater iii) bridge

Answer:
To minimize traffic, we should try to stop data broadcast
and for this bridge is ideally suited. This is because a bridge
does not broadcast data rather it identifies the destination
segment depending upon the receiver MAC address.

Network
Protocols
A protocol is a formal description of message formats and
the rules that two or more machines must follow to
exchange those messages.
HTTP:
 HTTP provides a standard between a web browser and a
web server to establish communication.
 Data such as text, images, and other multimedia files are
shared on the World Wide Web. Whenever a web user
opens their web browser, the user indirectly uses HTTP.
 It is an application protocol that is used for distributed,
collaborative, hypermedia information systems.
Hypertext Transfer Protocol Secure (HTTPS)
 It is used for secure communication.
 In most cases, the HTTPS protocol must be used while
entering bank account information.
 The HTTPS protocols based on distinct markings like
padlock and secure https.
 HTTPS employs an encryption mechanism called Secure
Sockets Layer (SSL), also known as Transport Layer
Security, to enable encryption.
FTP:
 File transfer protocol (FTP) is an Internet tool provided by
TCP/IP.
 It helps to transfer files from one computer to another by
providing access to directories or folders on remote
computers and allows software, data, text file to be
transferred between different kinds of computers.
 The end-user in the connection is known as localhost and
the server which provides data is known as the remote
host.

The goals of FTP are:


•It encourages the direct use of remote computers.
•It shields users from system variations (operating system,
directory structures, file structures, etc.)
•It promotes sharing of files and other types of data.
Advantages of FTP:
 Multiple transfers: FTP helps to transfer multiple large
files in between the systems.
 Efficiency: FTP helps to organize files in an efficient
manner and transfer them efficiently over the network.
 Security: FTP provides access to any user only through
user ID and password. Moreover, the server can create
multiple levels of access.
 Simple: FTP is very simple to implement and use, thus it
is a widely used connection.
 Speed: It is the fastest way to transfer files from one
computer to another.
TCP/IP (Transmission Control Protocol / Internet Protocol):
 The main work of TCP/IP is to transfer the data of a computer
from one device to another.
 The main condition of this process is to make data reliable
and accurate so that the receiver will receive the same
information which is sent by the sender.
 TCP/IP model divides its data into packets and combines
them at the other end, which helps in maintaining the
accuracy of the data while transferring from one end to
another end.
TCP/IP is responsible for full-fledged data connectivity and
transmitting the data end-to-end by providing other functions,
including addressing, mapping and acknowledgement.

Addressing:
TCP sends the messages through packets and equips them with
address at destination and traverse through transport layer.

Mapping:
It deliver the packets best by mapping to destination address
like IP address which might be lost or delayed sometimes.

Acknowledgement:
Once the packets reaches to destination, it sorts and arrange
and re transmits, if any. Finally it delivers to the port number.
SLIP/PPP:
 The SLIP is short for the Serial Line Internet Protocol and is
limited.
 It was conceived as a natural sequence to how the IP
datagrams should be forwarded across a point-to-point
serial link.
 SLIP is relatively simple and compact and therefore is well
suited for use.
PPP:
 The Point-to-Point protocol (PPP) is a data link protocol
commonly used in establishing a direct connection between
two networking nodes and establishing IP communication
over this direct connection.
 PPP allows interoperability among the remote access
software of different manufacturers.
 PPP has additional features such as authentication, error
control, and the protocol of network layer independence.
 It is most sought-after for setting up end-to-end channels
over the serial link joined in a range of networking
settings.
Similarities between SLIP and PPP
 Both are used to establish a point-to-point connection
between two network devices.
 Both are widely used in various communication systems
and have been standardized by international
organizations.
 Both are used for transmitting data over serial
connections.
 Both can be used with a variety of networking hardware,
including modems and serial cables.
IMAP:
 IMAP stands for Internet Message Access Protocol.
 It is an application layer protocol which is used to receive the
emails from the mail server.
 It also follows the client/server model. On one side, we have
an IMAP client, which is a process running on a computer. On
the other side, we have an IMAP server, which is also a
process running on another computer. Both computers are
connected through a network.
POP3:
 POP 3 stands for Post Office Protocol Version 3.
 POP3 protocol is used to provide access to the mail inbox
that is stored in the email server.
 POP3 protocol can download and delete messages.
 Once the POP3 client has established a connection with the
mail server it can easily retrieve all the messages from the
server.
 The user can access the messages locally even if the user is
offline.
 The protocol does not inherently support real-time
synchronization or automatic checking for new messages;
users can configure their email clients to check for new
messages at intervals or manually.
SMTP (Simple Mail Transfer Protocol):
 SMTP is an application layer protocol.
 The client who wants to send the mail opens a TCP
connection to the SMTP server and then sends the mail
across the connection.
 The SMTP server is an always-on listening mode.
 As soon as it listens for a TCP connection from any client, the
SMTP process initiates a connection through port 25.
 After successfully establishing a TCP connection the client
process sends the mail instantly.
VOIP:
 Voice over Internet Protocol (VoIP) is a technology that
allows voice communication over the internet.
 By converting voice signals into digital data packets, VoIP
enables users to make calls from computers, smartphones,
or VoIP phones.
 Key benefits include lower costs for long-distance
calls, additional features like video conferencing, and the
flexibility to communicate from anywhere with an internet
connection.
 VoIP has revolutionized communication by providing
versatile and cost-effective voice services.
TELNET:
 TELNET stands for Teletype Network.
 It is a client/server application protocol that provides access
to virtual terminals of remote systems on local area
networks or the Internet.
 The local computer uses a telnet client program and the
remote computers use a telnet server program.
 It is used as a standard TCP/IP protocol for virtual terminal
service which is provided by ISO (International Organization
for Standardization).

Web browser and Web Server:


A web browser is a WWW client that navigates through the
World Wide Web and display web pages.

A web server is a WWW server that responds to the requesrs


made by web browsers.
Web Sites, Web Addresses and Web Pages:
A location on a net server is called a web site.
Each web site has unique address called URL.
URL and Domain names:
A URL or Uniform Resource Locator is a Unique identifier that
is contained by all the resources available on the internet. A
URL consists of different parts like protocol, domain name, etc.
The users can access the URLs by simply typing them inside
the address bar or by clicking any button or link web page.

Syntax elements of URLs:


1) The type of server or
protocol.
2) The name/address of
server on the Internet.
3) The location of the file on
the server(location as
“path)
1) HOME PAGE:
It is the top-level web page of
a web site, when a web-site is
opened, its home page is
displayed.

2) WEB PORTAL:
It is a web site, which hosts
other website. In other words,
a web portal has hyperlinks to
many other web sites.
Types of web-hosting:

1) Free Hosting:
Free Hosting is a non-paid web hosting service. Many
prominent sites offer to host some web pages at no cost, such
as Hostinger.

2) Shared/Virtual Hosting:
Shared or Virtual Hosting is a web hosting service where
many websites reside on one web server connected to the
internet. It allows presenting oneself as a fully independent
identity to the web audience under one’s own domain name,
like www.yourname.com, with a hosting plan.
3) Dedicated Hosting:
Dedicated Hosting involves hosting on a dedicated server and
is best suited for large websites with high traffic. Companies
rent an entire web server from a hosting company for their
exclusive use. This setup is ideal for hosting larger websites,
managing others’ sites, or operating big online malls, such as
those hosted on Google Cloud.

4) Co-located Hosting:
Co-located Hosting allows you to place your own web server on
the premises of a service provider. It is similar to dedicated
hosting, but the server is provided by the user-company itself,
while its physical needs (like power and cooling) are supported
by the hosting company, similar to setups offered by AWS.
WEB 2.0:
It refers to added
features and
applications that
make the web
more interactive,
support easy
online-
information
exchange and
interoperability.
Some noticeable
features of Web
2.0 are blogs,
wikis, video-
sharing websites,
social networking
Thank
you

SAMPLE FOOTER TEXT 20XX 59

You might also like