Networking Extra Material

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 6

Active Hub and Passive Hub

Passive hub is just a connector which connects wire coming from other devices. Active hub is multi-point
repeater with capability of regeneration of signals. Active hub can process and monitor information while passive
hub cannot do this.
Active Hub
A central connecting device in a network that regenerates signals on the output side to keep the signal
strong. Also called a "multiport repeater." Contrast with passive hub and intelligent hub.
Passive Hub
A central connecting device in a network that joins wires from several stations in a star configuration. It
does not provide any processing or regeneration of signals. Contrast with active hub and intelligent hub.
Bridge
Bridges connects two or more different LANs that has a similar protocol and provides communication
between the devices (nodes) in them.

Router-
A router is responsible for organising communication between computer networks. A router takes data packets
from devices and directs them to the right place. Routers often use IP addresses to know where to look for
information. Routers allow your computers to access the internet or request files from a server. A router works like
a bridge but can handle different protocols.

Mesh Topology-
In a mesh topology there is no central connection point. Instead, each node is connected to at least one other node
and usually to more than one. Each node is capable of sending messages to and receiving messages from other
nodes. The nodes act as relays, passing on a message towards its final destination.
This topology provides multiple paths to succeed in the destination and tons of redundancy. It provides high
privacy and security. Data transmission is more consistent because failure doesn't disrupt its processes. Adding
new devices won't disrupt data transmissions. It is an extension to P-P network.
Advantages of Mesh Topology-
1. Each connection can carry its own data load.
2. It is robust and provides security and privacy.
3. In this topology, fault diagnosis is easy.
Disadvantages of Mesh Topology-
1. Its installation and configuration is difficult.
2. Cabling cost is more for mesh topology.
3. Bulk wiring is required for mesh topology.

Chat-
On the Internet, chatting is talking to other people who are using the Internet at the same time you are.
Usually, this "talking" is the exchange of typed-in messages requiring one site as the repository for the messages
(or "chat site") and a group of users who take part from anywhere on the Internet.

Following are the most common type of chatting:

 Instant Messaging: It is the most common way of chatting. It is text-based communication. It happens
between two people or groups of people.
 Internet Relay Chat: It is known as IRC. It is also a text-based chat. It is not owned by any company and to
use IRC we need a client program. Using IRC we can participate in discussion channels or can communicate
with only two partners or users.
 ICQ: It is known as I seek you. It is the most useful communication program. Using ICQ we can send files,
URLs, and more. It is just like instant messaging but allows you to enter into the chat room and can chat with
multiple people at a time.
 Voice Chatting: We can chat not only with text but also with sounds as well. It is known as voice chatting.
Voice chatting can be used with the internet just as a phone call. Internet voice call is free and unlimited, it
only needs a good internet connection.
 Video chatting: Video chatting is also a kind of chatting which is also done with the help of the internet and it
also requires a webcam as it is a face to face chatting. Internet speed required by video chatting is higher as
compared to text and video chatting. And a good quality camera too.
Chat Etiquette
Following are some chat etiquette that we should follow while chatting:

 Never use abusive words during a chat session.


 Don’t create too many groups unless necessary.
 Never share sensitive information on chat especially in groups.
 Don’t share viral posts unless it’s verified.
 During chats, banking details must not be shared.
 Never share private messages of user/friend/ person without asking their permission.
 Always remember no one is perfect so always respect people.

Chatting Platforms

Nowadays there are many chatting platforms available for users. Some of them are mentioned below:

 Facebook: Facebook is one of the oldest and most used platforms for chatting. It was founded in February
2004. Facebook offers text, voice, and video chat to its users. Users can also post some materials on Facebook.
Facebook is available for users in many different languages. Facebook is currently owning different chatting
applications. (WhatsApp, Instagram, Facebook Messenger).
 WhatsApp: WhatsApp is also one of the most used platforms. It is owned by the Facebook group. WhatsApp
too offers all types of chatting (Text, voice, and video). It is available in many different languages.
 Skype: Skype was initially released in August 2003. It is mostly used for live meetings. It is available in 101
different languages.
 Telegram: Telegram is a popular chatting application widely used across the world. It also allows group as
well as individual conversations. It is a multiplatform application, it can be used on different operating
systems for example mac, windows, Linux, ios, android.
 Snapchat: Snapchat is a mobile application for both Android as well as ios. One of the core concepts of
Snapchat is that the message sends to anyone whether it’s a videos message, text, or audio it will only last for
a short period.
 Hike: Hike messenger also known as hike sticker chat is a mobile application. Its main feature is that it comes
with sticker chatting which is unique as compared to other apps whatever text you want to send it can be
converted into a sticker.
Risk from Chatting

Chatting also has some risks which one should be aware of:

 During Chatting always be aware of fake profiles, fake profiles are very dangerous as they will allure you to
share some confidential information, which can be used in blackmail.
 Never use that application or platforms which don’t offer proper end-to-end encryption. Using such platforms
can lead to chat leaks.
 Cyberbullying is a major of risk chatting over the internet, it includes sending threatening messages, spreading
lies about anyone, commenting bad or abusive language on someone’s online profile, or blackmailing
someone to bash their looks or reputation.
 Never share your profile passwords with anyone, it can be missed in multiple ways ad can get down your
reputation.

How Chat Safely?

While chatting keep the following points in mind for safely chat:

 Never share personal information with any unknown user.


 Before chatting always check the profile of the user, and try to determine if it’s fake or real.
 Only chat with those users who have a genuine profile picture.
 Don’t trust anyone. Never trust any unknown user to share banking details or any personal information.
 Always keep your guard. During online chat never keep your guard off, always be aware if someone is trying
to peek into the device.
 Do complain (tell your parents) instantly if noticed some unsuspicious activity.
VoIP (Voice over Internet Protocol )-
VoIP stands for Voice over Internet Protocol. It is also referred to as IP telephony, internet telephony, or internet
calling. It's an alternative to a public switched telephone network (PSTN). While it may sound it, a VoIP phone
system is not complicated.
There are two major reasons to use VoIP:
1. Lower Cost
2. Increased functionality as it can use any Internet enabled dcvices.
Advantages:-
1. It does not cost extra as long as you have a device with an Internet connection.
2. Easily available(downloadable).
Disadvantages:-
1. VoIP is possible if both the caller and receiver have the right software and hardware.
2. No guarantee of call’s audio and video quality.
3. It uses internet protocol’s packets so if packet get dropped along the way then voice quality drops
4. It may not work for emergency numbers like Police or Fire Services numbers.
Here are the most common examples of VoIP apps:
 Nextiva
 Aircall
 Zoiper
 Skype
 WhatsApp
 Google Hangouts
 Viber
 Facebook Messenger
 Google Voice

Add-On
A software add-on or extension is any third-party software program or script that is added to a program to
give it additional features and abilities.
For example, Adobe Flash, which allowed users to watch videos or play games within an Internet browser, is an
excellent example of a software add-on.
Add-ons are often created by people or organizations not affiliated with the original developer and installed using a
program option or through a third-party website.
Browsers like Google Chrome refer to an add-on as an extension.
A add-in ("in" not "on") refers to additional software that gives a software program additional functionality. An
add-in may also be used to describe a driver.
Plug-in
plug-in, also called add-on or extension, computer software that adds new functions to a host program without
altering the host program itself. Widely used in digital audio, video, and Web browsing, plug-ins enable
programmers to update a host program while keeping the user within the program's environment.
IVR(Interactive voice response)
Interactive voice response or IVR is an automated business phone system feature that interacts with callers
and gathers information by giving them choices via a menu. It then performs actions based on the answers of
the caller through the telephone keypad or their voice response.

You might also like