Networking
Networking
Networking
A network is any collection of computers that communicate with one another over a
medium.
Advantages of networking
• Resource sharing - files and peripherals
o Sharing of files and software (Reduced cost of data transfer)
o Sharing Peripherals
o Sharing storage
• Communication (Easy and fast communication)
• Access to remote database and sharing of database between various application
Requirements to setup a network:
Wired media
Twisted Pair Cable
Co-axial Cable
Fiber-Optical Cable
Wireless Media
Radio waves
Microwaves
Infrared
Satellite
Transmission Medium
Guided(Wired Media):
Twisted Pair: Two insulated copper wires twisted together to reduce electrical interference called
crosstalk. Used for internal telephone wiring and short range LAN’s.
Advantage: Easy to install. Low weight and Less Expensive
Disadvantage: High Attenuation and Noise, Low bandwidth so not suitable for broadband applications
Co-Axial Cable: A copper wire surrounded by insulating material, which is encased by conducting
braided mesh. Conducting mesh is enclosed in protective plastic sheet. Used for cable television
networks.
Advantage: higher bandwidth and better data transmission characteristics than Twisted Pair Cable. It
can be used for broadband applications.
Disadvantage: Expensive than Twisted Pair Cable
Optical Fiber: Glass fibers are used as media to transmit the data in the form of light waves. The glass
fibers are covered in plastic jackets. At the transmitting end of optical fiber, the laser or light emitting
diodes are used and the receiving end has detectors to detect the signal.
Advantage: Immune to electrical and magnetic interference, High transmission Capacity, Used for
broadband applications.
Disadvantage: Expensive, difficult to connect and install.
Ethernet Cable: LAN Architecture by Xerox corp. in association with DEC &
Intel .It is used to directly connect two network devices such as modems,
routers and adapters. It transmits data a very high speed using Ethernet
protocol. It is commonly used for temporarily networking two devices in
the absence of a network router, switch or hub. Computers that are part
of Ethernet, have to install a special card called Ethernet Card. It has
connections for Co-axial (BNC), twisted (RJ 45) or optical Fiber (AUI)
LAN (Local area Network) : Private network within home, office , a building or across
buildings within a small area. Can be setup using Twisted pair, coaxial cable, infrared
or radio waves. Wireless LAN is called WLAN.
MAN (Metropolitan Area Network): To connect devices spread across a city. eg. Cable
TV network, various offices of a MSC spread across a city.
WAN (Wide area Network): Spreads over a large geographical area across the world.
Connectivity through Satellites.
STAR TOPOLOGY : Consists of central node to which all other nodes are connected
Advantages :
Ease of Service ➢ One device per connection
Centralized control / Problem diagnosis ➢ Simple access protocols.
Disadvantages :
Long cable length ➢ Difficult to expand
Central Node Dependency
BUS TOPOLOGY : Consists of single cable on which all the nodes are connected
Advantages :
Short cable length ➢ Simple wiring layout
Resilient Architecture ➢ Easy to extend
Disadvantages :
Fault Diagnosis Difficult ➢ Fault Isolation Difficult
Nodes must be intelligent ➢ Repeater Configuration
Networking Topologies:
RING/CIRCULAR TOPOLOGY : Nodes are connected in the form of ring. Each node is connected to two
neighboring nodes.
Advantages :
Short Cable Length ➢ Suitable for Optical Fibers
No wiring closet space req.
Disadvantages :
Node failure causes network failure
Difficult to Diagnose faults
Network re-config. is difficult
TREE TROPOLOGY: Modified form of bus topology. Forms inverted tree like structure.
Advantages :
Easy to extend i.e. new nodes can be added easily.
Fault isolation in easy.
Disadvantages :
If the root node fails, whole network is down.
Networking Devices
■ Modem
■ RJ-45 connector
■ Ethernet Card (NIC)
■ Router
■ Switch
■ Gateway
■ Wi-Fi Card
MODEM : Modulator Demodulator - Computer
peripheral that allows to connect one Computer
with other via telephone lines. Telephone lines
carries the analog signals. Modem is a device that
can convert the digital signals to analog signals
(i.e. modulation) and convert that signals back to
digital (i.e. demodulation). Modem is the device
that converts digital signals to analog and vice-
versa.
RJ45 Port
•Switch: It is a device used to segment network into different sub networks called subnets or
LAN segments. The main advantage is it prevents traffic overloading in a network. It is distinct
from a hub that it only forwards the data to the ports involved in the communications rather
than all ports.
•Access point (Wireless access point): It is a hardware device that establishes connection of
computing devices on wireless LAN with a fixed wire network. Three types of Access points:
Bridge Router Gateway
Used to connect networks with Used to connect networks with Used to connect networks with
similar topology and similar similar topology and different different topology and different
protocol. protocol. protocol.
WIFI Card
■ Similar to Ethernet card, but it allows our computer to
connect with other device without wire i.e. for wireless
connectivity.
■ It may be internal or external with built-in wireless radio and
antenna. The most common Wi-Fi card used in desktop
computer are PCI-Express Wi-Fi card made it fit the PCI-
Express card slots on the motherboard.
■ It allow to connect our device to hotspot available.
■ Advantage is that it allows computer to become part of
network without being physically connected through wire
and can be placed anywhere.
Switching Techniques
HTTP : Hypertext Transfer Protocol . Set of rules for transferring hypertext on www.
FTP : File Transfer Protocol. Standard for exchange of files across Internet.
SLIP : Serial Line Internet Protocol. For delivering IP packets over dialup lines.
PPP: Point to Point Protocol. For transmitting IP packets over several lines.
GSM : Global System for Mobile Communication.
SIM : Subscriber Identification Module.
TDMA : Time Division Multiple Access.
CDMA : Code Division Multiple Access.
WLL : Wireless Local Loop.
UMTS : Universal Mobile Telecommunication System.
EDGE : Enhance Data rates for Global Evolution.
URL : Uniform Resource Locator. It is Unique address of a web site.
POP3 : Post Office Protocol version 3
SMTP : Simple Mail Transfer Protocol.
NNTP : Network News Transfer Protocol.
TCP/IP
5G : It is yet to be implemented in India which promises superfast data transfer rate upto
20Gbps along with energy saving.
WIRELESS FIDELITY : Protocols allows devices to connect to the
internet without a direct line from your Device to ISP (Internet
Service provider). Its maximum coverage area is 100 meters.
Transmission speed upto 54 mbps. It is mostly used in LAN
Application. It uses Radio wave spectrum
Wi-Fi HOTSPOT : a hotspot is a venue that offers Wi- Fi access.
We can share out internet through Wi-Fi hotspot. We can set
Hotspot with or without password. With mobile we can connect
upto 10 devices with hotspot (However it depends upon type of
device)
Network security is any activity designed to protect the usability and integrity of your
network and data. It includes both hardware and software technologies. Effective
network security manages access to the network. It targets a variety of threats and
stops them from entering or spreading on your network.
Worms : A worm is a self-replication programs which eats up the entire disk space or memory. A
Worm keeps on creating its copies until all the disk space or memory is filled. Worms harm to a
computer or a computer network by consuming bandwidth and slow down the network speed.
After the worm has infected a system, it can propagate to other systems via internet or while
copying files from one system to another without user interaction.
Trojan Horse: It is a program that appears harmless (such as text editor or a utility program) but
actually performs malicious functions such as deleting or damaging files.
With help of Trojan, harm that could be done by hacker on target computer systems are:
• Data theft
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. And many more…
Firewall
A firewall is a technique used in a secured computer system or network to block unauthorized
access and allow only the authorized user.
Firewalls can be implemented in either hardware or software, or a combination of both. It is a
device or set of devices or software running on a computer, which is configured to permit or
deny computer
India IT Act
The IT Act, 2000 is an Act of the Indian parliament (No.21 of
2000) notified on 17 October, 2000. It is the primary law in India
dealing with cybercrime and electronic commerce.
The original Act contained 94 sections, divided into 13 chapters
and 4 schedules. The law apply to the whole of India.
Persons of other nationalities can also be indicted under the law
if the crime involves a computer or network located in India.
A major amendment was made to the IT Act in 2008.
If any cyber crime happens, one must report it firstly to parents, school authorities and then to
police.
Web Browser: It is a www client that navigates through the World
Wide Web and displays Web pages.
Web Server: It is a www server that responds to the requests
made by web browsers.
Domain Name: An Internet address which is character based is
called a Domain Name.
Web Page : A document that uses HTTP is called a Web Page.
Web Hosting : Means of hosting web – server application on a
computer system through which electronic content on the
Internet is readily available to any web browser client.
HTML : Hypertext Markup Language
XML: eXtensible Markup Language
DHTML : Dynamic HTML
Crackers : Malicious programmers who break into secure
systems.
Hackers : Interested in gaining knowledge about computer
system and possibly using this knowledge for playful pranks.
Script : List of commands embedded in a web-page
scripts are interpreted and executed by a certain
program or scripting engine.
TYPE OF CLOUD