Networking

Download as pdf or txt
Download as pdf or txt
You are on page 1of 47

Network

A network is any collection of computers that communicate with one another over a
medium.
Advantages of networking
• Resource sharing - files and peripherals
o Sharing of files and software (Reduced cost of data transfer)
o Sharing Peripherals
o Sharing storage
• Communication (Easy and fast communication)
• Access to remote database and sharing of database between various application
Requirements to setup a network:

1. At least two computers - Server / Client


Network Interface Cards (NIC)
2. A connection medium, (Wired / Wireless)
3. Network Operating system software, such as
Microsoft Windows NT or 2000, Novell NetWare,
Unix or Linux.
1969 - First network came into
existence. It was named ARPANET –
Advanced Research Project Agency
Network

MID 80’S - NSFNET (National Science


Foundation Network)
Internet: Internet is a network of networks that facilitate data communication
services such as remote login, file transfer, electronic mail, the World Wide Web
and newsgroups that are accessible worldwide. It connects many smaller networks
together and allows all the computers to exchange information with each other
through a common set of rules for communication. These rules are called protocols
and the internet works on a basic protocol i.e. Transmission Control
Protocol/Internet Protocol (TCP/IP).

Interspace: It is a client/server software program that allows multiple users to


communicate online with real time audio, video and text chat in dynamic 3D
environments.
Transmission media is a communication channel that carries the
information from the sender to the receiver.
It is of 2 type:

Wired media
Twisted Pair Cable
Co-axial Cable
Fiber-Optical Cable

Wireless Media
Radio waves
Microwaves
Infrared
Satellite
Transmission Medium
Guided(Wired Media):
Twisted Pair: Two insulated copper wires twisted together to reduce electrical interference called
crosstalk. Used for internal telephone wiring and short range LAN’s.
Advantage: Easy to install. Low weight and Less Expensive
Disadvantage: High Attenuation and Noise, Low bandwidth so not suitable for broadband applications

Co-Axial Cable: A copper wire surrounded by insulating material, which is encased by conducting
braided mesh. Conducting mesh is enclosed in protective plastic sheet. Used for cable television
networks.
Advantage: higher bandwidth and better data transmission characteristics than Twisted Pair Cable. It
can be used for broadband applications.
Disadvantage: Expensive than Twisted Pair Cable

Optical Fiber: Glass fibers are used as media to transmit the data in the form of light waves. The glass
fibers are covered in plastic jackets. At the transmitting end of optical fiber, the laser or light emitting
diodes are used and the receiving end has detectors to detect the signal.
Advantage: Immune to electrical and magnetic interference, High transmission Capacity, Used for
broadband applications.
Disadvantage: Expensive, difficult to connect and install.
Ethernet Cable: LAN Architecture by Xerox corp. in association with DEC &
Intel .It is used to directly connect two network devices such as modems,
routers and adapters. It transmits data a very high speed using Ethernet
protocol. It is commonly used for temporarily networking two devices in
the absence of a network router, switch or hub. Computers that are part
of Ethernet, have to install a special card called Ethernet Card. It has
connections for Co-axial (BNC), twisted (RJ 45) or optical Fiber (AUI)

Factors Twisted Pair Coaxial Cable Optical


Cable Fibre
Data Transfer Rate 10 Mbps – 10 100 Mbps >100 Gbps
Gbps
Range 100 m 185 – 500 m >10 Km
Electromagnetic More Less Nil
Interference
Cost Cheapest More than Very
Twisted Pair Expensive
Unguided(Wireless Media)

Microwaves: Wireless media that uses microwaves to transmit data.


Microwaves travel in straight line and cannot penetrate the metal structure.
Sender and receiver require to be within line of sight. Microwave transmission
can be terrestrial or through satellite. In case of terrestrial microwave high
towers are installed with transmitter is accurately aligned in the direction of
receiver on the other tower. Satellite microwave is used for long distance
transmission. The earth station sends the signal to the satellite, which
transmits it back to another earth station.

Advantage: Cheaper, Ease of communication over oceans and difficult terrains.

Disadvantage: Insecure communication, Limited bandwidth allocation,


Propagation is affected by weather conditions like rain/ thunderstorm.
Radiowaves: Radio frequencies are available to business, private citizens for
carrying voice signals over 10 miles of distance. Radio waves are omni
directional and can penetrate solid walls or buildings easily. It has a transmitter
and receiver both having antennas.
Advantage: Cheaper, Ease of communication over difficult terrains.
Disadvantage: Insecure communication, Limited bandwidth allocation,
Propagation is affected by weather conditions like rain/ thunderstorm.

Satellite : It is a special case of microwave, It is used for long distance


transmission. The earth station sends the signal to the satellite, which
transmits it back to another earth station after amplifying it.
Advantage: Large area coverage, Can be used for intercontinental
communication
Disadvantage: High investment cost , overcrowding of bandwidths.
Infrared: Short range communication 300 GHz to 400 THz (approx. 5
meters) e.g. TV Remote, cordless phones. It cannot penetrate solid walls
or obstacles. It is only line of sight communication so only two devices
can communicate at a time.
Laser: Highest most electromagnetic spectrum which can be used for
data transmission is light or optical signaling. This is achieved by means
of LASER. ... Laser works as Tx (transmitter) and photo-detectors works
as Rx (receiver). Lasers cannot penetrate obstacles such as walls, rain,
and thick fog.
Bluetooth: It is a wireless technology for creating personal networks
operational within a range of 10 meters. It uses 2.4 GHz unlicensed
band. It is used to create a PAN to transfer data between personal
devices.
Types of Network:

LAN (Local area Network) : Private network within home, office , a building or across
buildings within a small area. Can be setup using Twisted pair, coaxial cable, infrared
or radio waves. Wireless LAN is called WLAN.

MAN (Metropolitan Area Network): To connect devices spread across a city. eg. Cable
TV network, various offices of a MSC spread across a city.

WAN (Wide area Network): Spreads over a large geographical area across the world.
Connectivity through Satellites.

PAN (Personal Area Network): Small network established between a computer or


other handheld devises, wireless keyboard, mouse, headphones or printers. It can
use USB wired connection, Bluetooth or infrared for connectivity.
Networking Topologies:

STAR TOPOLOGY : Consists of central node to which all other nodes are connected
Advantages :
Ease of Service ➢ One device per connection
Centralized control / Problem diagnosis ➢ Simple access protocols.

Disadvantages :
Long cable length ➢ Difficult to expand
Central Node Dependency

BUS TOPOLOGY : Consists of single cable on which all the nodes are connected
Advantages :
Short cable length ➢ Simple wiring layout
Resilient Architecture ➢ Easy to extend

Disadvantages :
Fault Diagnosis Difficult ➢ Fault Isolation Difficult
Nodes must be intelligent ➢ Repeater Configuration
Networking Topologies:

RING/CIRCULAR TOPOLOGY : Nodes are connected in the form of ring. Each node is connected to two
neighboring nodes.
Advantages :
Short Cable Length ➢ Suitable for Optical Fibers
No wiring closet space req.

Disadvantages :
Node failure causes network failure
Difficult to Diagnose faults
Network re-config. is difficult

TREE TROPOLOGY: Modified form of bus topology. Forms inverted tree like structure.
Advantages :
Easy to extend i.e. new nodes can be added easily.
Fault isolation in easy.

Disadvantages :
If the root node fails, whole network is down.
Networking Devices

■ Modem
■ RJ-45 connector
■ Ethernet Card (NIC)
■ Router
■ Switch
■ Gateway
■ Wi-Fi Card
MODEM : Modulator Demodulator - Computer
peripheral that allows to connect one Computer
with other via telephone lines. Telephone lines
carries the analog signals. Modem is a device that
can convert the digital signals to analog signals
(i.e. modulation) and convert that signals back to
digital (i.e. demodulation). Modem is the device
that converts digital signals to analog and vice-
versa.
RJ45 Port

■ The "RJ" in RJ45 stands for "registered jack,“


■ Registered Jack 45 (RJ45) is a standard type of
■ physical connector for network cables.
■ RJ45 connectors are most commonly seen with Ethernet
cables and networks. Modern Ethernet cables feature small
plastic plugs on each end that are inserted into the RJ45
jacks of Ethernet devices
Ethernet Card / NIC

■ It is also known as NIC (Network Interface Card)


■ Is a device that is attached to each of the workstations
■ and the server and helps the workstations establish all
■ – important connection with the network.
■ It contain RJ-45 slot to connect Ethernet cable with RJ- 45 connector.
■ Each NIC attached to workstation has a unique number identifying it,
known as MAC Address.
■ Also known as Network Interface Unit.
Hub : Hardware device used to connect several computers
together. Hub ranges in size from four to several hundred ports.

Three types of Hub :


Active Hub : This type of Hub regenerates the signal before
forwarding them.
Passive Hub : This type of Hub combines the signals of different
network segments and forwards without regenerating.
Intelligent Hub : This type of Hub regenerates the signals as well
as choose the path to send the signals.
•Hub: It is a hardware device used to connect several computers together. A hub contains
multiple ports. When a packet arrives at one port, it is copied to all the ports of the hub (i.e. in
broadcast manner).

•Switch: It is a device used to segment network into different sub networks called subnets or
LAN segments. The main advantage is it prevents traffic overloading in a network. It is distinct
from a hub that it only forwards the data to the ports involved in the communications rather
than all ports.

•Access point (Wireless access point): It is a hardware device that establishes connection of
computing devices on wireless LAN with a fixed wire network. Three types of Access points:
Bridge Router Gateway

Used to connect networks with Used to connect networks with Used to connect networks with
similar topology and similar similar topology and different different topology and different
protocol. protocol. protocol.
WIFI Card
■ Similar to Ethernet card, but it allows our computer to
connect with other device without wire i.e. for wireless
connectivity.
■ It may be internal or external with built-in wireless radio and
antenna. The most common Wi-Fi card used in desktop
computer are PCI-Express Wi-Fi card made it fit the PCI-
Express card slots on the motherboard.
■ It allow to connect our device to hotspot available.
■ Advantage is that it allows computer to become part of
network without being physically connected through wire
and can be placed anywhere.
Switching Techniques

■ Switching techniques are used for transferring data across network.


In large network, there might be multiple path linking the sender and
receiver. Information may be switched as it travels through various
communication channel.
■ Three types of Switching techniques
– Circuit Switching
– Packet Switching
-- Message Switching
Circuit Switching
■ First the complete physical connection between two computers is
established and then the data are transmitted from the source
computer to the destination
■ When a call is placed the switching equipment within the system
seeks out a physical copper path all the way from the sender to the
receiver.
■ It is must to setup an end-to-end connection between computers
before any data can be sent.
■ The circuit is terminated when the connection is closed.
■ In circuit switching, resources remain allocated during the full length
of a communication, after a circuit is established and until the circuit
is terminated and the allocated resources are freed
Packet Switching
■ Packet switching introduces the idea of cutting data i.e. at
the source entire message is broken in smaller pieces
called packets which are transmitted over a network without
any resource being allocated.
■ Then each packet is transmitted and each packet may
follow any rout available and at destination packets may
reach in random order.
■ At the destination when all packets are received they are
merged to form the original message.
■ In packet switching all the packets of fixed size are stored in
main memory.
Message Switching
■ In message Switching, data is first stored by one node then
forward to another node to transfer the data to another
system.
■ In message Switching, data is first stored, then forwarded to
the next node
■ In Message Switching there is no upper bound on size of
packet whereas in Packet Switching each packet is of fixed
size.
■ In Packet Switching data packets are stored in main
memory whereas in Message Switching Message is stored
in Hark disk which makes it reducing the access time.
Data Transmission Terminology
■ Channels : In popular network terminology, path over which data is sent or received
is called data channel. This data channel may be a tangible medium like copper wire
cables or broadcast medium like radio waves.
■ Bandwidth : Data transfer rates that can be supported by a network is called its
bandwidth.
– Hz,
– KHz
– MHz
■ Data Transfer Rate
– bps
– Kbps
– Mbps
– Gbps
– Tbps
Network Protocols: Refers to SET OF RULES. In Network there are variety of
computer connected to each other and data in many ways. For interaction among
these, some rules are applied like how and when a device can send and receive
data, how to send the data packet and how to receive etc. There are many
protocols used like:

HTTP : Hypertext Transfer Protocol . Set of rules for transferring hypertext on www.
FTP : File Transfer Protocol. Standard for exchange of files across Internet.
SLIP : Serial Line Internet Protocol. For delivering IP packets over dialup lines.
PPP: Point to Point Protocol. For transmitting IP packets over several lines.
GSM : Global System for Mobile Communication.
SIM : Subscriber Identification Module.
TDMA : Time Division Multiple Access.
CDMA : Code Division Multiple Access.
WLL : Wireless Local Loop.
UMTS : Universal Mobile Telecommunication System.
EDGE : Enhance Data rates for Global Evolution.
URL : Uniform Resource Locator. It is Unique address of a web site.
POP3 : Post Office Protocol version 3
SMTP : Simple Mail Transfer Protocol.
NNTP : Network News Transfer Protocol.
TCP/IP

Stands for Transmission Control Protocol and Internet Protocol

TCP (Transmission Control Protocol): TCP is connection oriented protocol i.e.


first the connection between sender and receiver is established through
process called handshake (RTS,CTS, ACK etc.)
TCP divides the large packets to transmit into smaller data packets called
datagrams.
At the receiving end it also reassemble the packet for form original message.

IP (INTERNET PROTOCOL) : responsible for providing address of each


computer and performing routing. Each packet is assigned with destination
IP address.
FTP : Stands for File Transfer Protocol . It allows transferring of files from one system to
another like uploading of file from local machine to web server using FTP Client like
FileZilla etc. FTP offers these advantages:
•Useful to transfer files from one network to another
•It is an effective way to get geographically dispersed group to co-operate on a project.
•It is popular way to update web sites.
PPP : Stands for Point-to-Point Protocol . It is a communication protocol of the data link
layer that is used to transmit multiprotocol data between two directly connected (point-
to-point) computers. It is a byte - oriented protocol that is widely used in broadband
communications having heavy loads and high speeds.
HTTP: Stands for Hypertext Transfer Protocol. It is used to transfer all files and other
data(resources) from one computer to another on the world wide web. Client(Browser)
send request to Web Server using HTTP protocol and Server respond back to Client
using HTTP i.e. Client and server over web communicate using HTTP protocol.
SMTP: Stands for Simple Mail Transfer Protocol. It is a set of communication guidelines
that allow software to transmit an electronic mail over the internet. It is a program used
for sending messages to other computer users based on e-mail addresses.
POP: Stands for Post Office Protocol (Version-3.0). It is a client/server protocol in which
e-mail is received and held for you by your Internet server. Periodically, you (or your
client e-mail receiver) check your mail-box on the server and download any mail,
probably using POP3. It also allows to download the received messages on local
machine using tool like Outlook so that user can read them even when they are not
connected to the Internet.
VOIP: Voice over Internet Protocol . It is a protocol that enables voice communication
over the Internet through the compression of voice into data packets that can be
efficiently transmitted over data network and then convert back into voice at receiving
end. It uses packet switching (store and forward). It is an alternate to traditional
telephone network.
Wireless Mobile Communication
Protocols
GSM (Global System for Mobile Communication)
It is one of the most widely used digital wireless telephony system. It was developed in Europe in 1980s
Now it is an international standard in Europe, Australia, Asia and Africa. Any GSM handset with a SIM card
can be used in any country that uses this standard. Every SIM card has a unique identification number. GSM
uses TDMA (Time Division Multiple Access) to support upto eight calls simultaneously. It also uses
encryption to make the data more secure.

CDMA (Code Division Multiple Access)


It stands for General Packet Radio Services. It is a packet based wireless communication technology that
charges users based on the volume of data the send rather than the time duration for which they are using the
service.
GPRS is the mobile communication protocol used by second (2G) and third generation(3G) of mobile
telephony). Its speed upto 56kbps to 114kbps, however the actual speed may vary depending on network
traffic.

WLL (Wireless Local Loop)


It is wireless local telephone service that can be provided in homes or offices. The subscribers connect to
their local exchange instead of the central exchange wirelessly. Data is transferred over very short range, it
is more secure than wired network. WLL system consists of user handset and a base station. The base station
is connected to the central exchange as well as antenna.The antenna transmits to and receives call from
users through microwave links
Mobile Communication Technology:
1G
– Used for voice calls as analog signal
– No data was transmitted
– Speed upto 2.4 kbps
– Poor voice quality
– Large phone with limited battery life
– No data security
2G
– In this generation, few features like simple text messaging were added.
– New services such as text messaging, packet data(for MMS and internet access),
called ID and also introduced SIM (Subscriber Identify Module) card.
– Data transfer rate upto 64kbps
– Disadvantage was low network range, slow data rates.
– To overcome these two problems two new network – CDMA and EDGE (Enhanced
Data Rate for GSM evolution) were introduced.
3G
– In this generation Web browsing, email, video conferencing, video downloading,
picture sharing and other smartphone technologies were introduced.
– Devices are called smartphones
– Fast communication, data speed between 144kbps to 2Mbps
– High quality voice transmission
– Supported multimedia(playing music, viewing videos, video calls etc)
– Mobile TC, Mobile internet
4G
– The speed of this generation is from 100 Mbps to 1Gbps
– Based on LTE-Advanced (Long Term Evolution)
– Voice as VoIP (Voice over Internet Protocol (VoLTE)
– Better Video calling than 3G, Video conferencing etc.

5G : It is yet to be implemented in India which promises superfast data transfer rate upto
20Gbps along with energy saving.
WIRELESS FIDELITY : Protocols allows devices to connect to the
internet without a direct line from your Device to ISP (Internet
Service provider). Its maximum coverage area is 100 meters.
Transmission speed upto 54 mbps. It is mostly used in LAN
Application. It uses Radio wave spectrum
Wi-Fi HOTSPOT : a hotspot is a venue that offers Wi- Fi access.
We can share out internet through Wi-Fi hotspot. We can set
Hotspot with or without password. With mobile we can connect
upto 10 devices with hotspot (However it depends upon type of
device)

Wi-Max : Stands for wireless inter-operability for Microwave


access. Wi-Max is used in MAN Applications. Wi-Max network
range to max 90kms. Wi-Max transmission speed can be up to
70mbps
Remote Login
– Remote login is a network application that permits a user sitting
at a different location to work on a specific program on another
program.
– The user need ID of that computer generated by remote login
application.
– It is done only when both PC are connected to Internet.
– Mainly used by customer support system to do some installation,
setting on client computer.
– The main programs are:
■ Telnet
■ AnyDesk
■ Team Viewer
Network Security

Network security is any activity designed to protect the usability and integrity of your
network and data. It includes both hardware and software technologies. Effective
network security manages access to the network. It targets a variety of threats and
stops them from entering or spreading on your network.

Threats to Network Security:


• Virus
• Worms
• Trojan Horse
• Spams
Virus : These are the malicious code/programs that cause damage to data and files on a system.
Virus attach itself to program or file so that it can spread from one computer to another leaving
infection as it travels. Some Virus cause only annoying effects like changing desktop icons, etc.
while others can damage your hardware, software or files. Almost all Virus are attached to an
executable file, it means Virus cannot infect your computer unless you run or open the
program/file. It means Computer Virus cannot spread without a human action.

Worms : A worm is a self-replication programs which eats up the entire disk space or memory. A
Worm keeps on creating its copies until all the disk space or memory is filled. Worms harm to a
computer or a computer network by consuming bandwidth and slow down the network speed.
After the worm has infected a system, it can propagate to other systems via internet or while
copying files from one system to another without user interaction.

Trojan Horse: It is a program that appears harmless (such as text editor or a utility program) but
actually performs malicious functions such as deleting or damaging files.
With help of Trojan, harm that could be done by hacker on target computer systems are:
• Data theft
• Installation of unwanted softwares
• Keystroke logging
• Downloading or uploading of files. And many more…

Spam: Me ans sending of bulk-mail by an identified or unidentified source. In non-malicious


form, bulk advertising mail is sent to many accounts. In malicious form (email bombarding) the
attackers keeps on sending bulk mail until the mail-server runs out of disk space.
Tips to stay safe online
1. Keep Personal Information Professional and Limited
2. Keep Your Privacy Settings On
3. Practice Safe Browsing
4. Make Sure Your Internet Connection is Secure. Use a Secure VPN
Connection
5. Be Careful What You Download
6. Choose Strong Passwords
7. Make Online Purchases From Secure Sites
8. Be Careful of What You Post
9. Be Careful of Who You Meet Online
10. Keep Your Antivirus Program Up To Date
11. Don’t click on any unknown links
12. Shop from secured sites only (https )
13. While using public computer, check for any addition device connected to it
or be alert of keylogger software, so for financial transaction prefer to use
VIRTUAL KEYBOARD rather than keyboard typing
14. Logout from your account and remove history if you are working on public
computer
Cookies
■ Also known as web cookie or browser cookie, is a small piece of data sent from a
website and stored in a user’s web browser while a user is browsing a website.
Some cookies disappear after user closes his browser while others, known as
tracking cookies, remain saved and load the next time user visits the same website.
■ Cookie help website to store information about visitors like username, password
and other details.

Firewall
A firewall is a technique used in a secured computer system or network to block unauthorized
access and allow only the authorized user.
Firewalls can be implemented in either hardware or software, or a combination of both. It is a
device or set of devices or software running on a computer, which is configured to permit or
deny computer
India IT Act
The IT Act, 2000 is an Act of the Indian parliament (No.21 of
2000) notified on 17 October, 2000. It is the primary law in India
dealing with cybercrime and electronic commerce.
The original Act contained 94 sections, divided into 13 chapters
and 4 schedules. The law apply to the whole of India.
Persons of other nationalities can also be indicted under the law
if the crime involves a computer or network located in India.
A major amendment was made to the IT Act in 2008.

It introduced section 66A which penalized sending


of offensive message.

It also introduced section 69, which gave


authorities the power of “interception or monitoring
or decryption of any information through any
computer resource”
.
The Act was passed in December 2008 and came
into force in October 2009
Cyber Crime

Is any criminal offense that is facilitated by, or involves


use of electronic communications of information
system including any electronic device, computer or
the Internet.
It involves the terms like : Phishing, Credit Card
Frauds, illegal downloading, industrial espionage,
child pornography, cyber bullying, cyber stalking,
cyber terrorism, creation and /or distribution of
viruses, spam etc.
Examples of Cyber Crime

CYBER TROLLS AND BULLYING: It refers to a person who purposely post


opposing, sarcastic, demeaning or insulting- comments about something or someone
with an aim of targeting a person online. The provocative messages posted this way
are also called trolls. It is a cyber crime and is a form of cyber bullying.

CY B ER BULLYING: Harassing, demeaning, embarrassing, defaming, or


intimidating someone using modern technologies like internet, cell phones, instant
messengers, social networks etc. is called Cyber Bullying.

C Y BE R STALKING: It is a kind of online harassment wherein the victim is


subjected to barrage of online messages and emails. Typically these stalkers know
their victims instead of resorting to offline stalking, they use the internetto stalk,etc.

If any cyber crime happens, one must report it firstly to parents, school authorities and then to
police.
Web Browser: It is a www client that navigates through the World
Wide Web and displays Web pages.
Web Server: It is a www server that responds to the requests
made by web browsers.
Domain Name: An Internet address which is character based is
called a Domain Name.
Web Page : A document that uses HTTP is called a Web Page.
Web Hosting : Means of hosting web – server application on a
computer system through which electronic content on the
Internet is readily available to any web browser client.
HTML : Hypertext Markup Language
XML: eXtensible Markup Language
DHTML : Dynamic HTML
Crackers : Malicious programmers who break into secure
systems.
Hackers : Interested in gaining knowledge about computer
system and possibly using this knowledge for playful pranks.
Script : List of commands embedded in a web-page
scripts are interpreted and executed by a certain
program or scripting engine.

Client Side Scripts : Downloaded at the client end. e.g.


VB Script, Java Script, Hypertext Preprocessor (PHP)

Server Side Scripts : Enables completion / carrying out a


task at server end and sending the results to client-end.
e.g.: JSP (Java Server Pages), Perl, PHP (same as the of
Client side)
Ecommerce
■ When you purchase goods and services online you pay for them using an electronic medium. This
mode of payment, without using cash or cheque, is called an e-commerce payment system and is
also known as online or electronic payment systems.
■ Different ways of payment:
Credit Card
Debit Card
Smart Card
Net Banking
E-Wallet
Mobile Banking

❑ Popular Payment Apps(Using Wallet)


PayTM
PhonePay
Amazon Pay
Google Pay etc.
CLOUD COMPUTING: It is internet-based computing, where shared
resources, software and information are provided to computers and
other devices on demand

TYPE OF CLOUD

Private cloud: A private cloud consists of computing resources used


exclusively owned by one business or organization.It is not publicly
accessible and is owned by a single organization and its authorized
external partners.

Public cloud : It refers to the common cloud service made available to


multiple subscribers. The cloud resources are owned and operated by a
third-party cloud service provider and delivered over internet.
INTERNET OF THINGS (IOT) : It is a phenomenon
that connects the things to the Internet over wired
or wireless connection.
Eg: IOT devices: Home appliances (Refrigerator,
water heater), smart homes (smart door locks,
smart bulbs) etc

You might also like