Networking
Networking
UNIT 2
(Computer Network)
CHAPTER NO - 6
1. Evolution of Networking
2. Data Communication Terminologies
3. Transmission Media
4. Network Devices
5. Network Topologies and Types
6. Network Protocol
7. Mobile Telecommunication Technologies
8. Network Security Concepts
A computer network is a set of computers (nodes) and
The purpose of communication sources(hardware/software) among the users..
(Benefits of computer network)
• Facilitate communication through email / video conferencing / instant messaging
or any other mode.
• Share hardware devices like a printer or scanner
• Enable file sharing
• Share software or operating programs
• Share information
Disadvantages of computer network
Lack of robustness, security issue, cost of network
Evolution of Networking
ARPANET (Advanced Research Projects Agency NETwork): In 1969, The US govt. formed an
agency named ARPANET to connect computers at various universities and defense agencies. The
main objective of ARPANET was to develop a network that could continue to function efficiently
even in the event of a nuclear attack.
Interspace: is a client/server software program that allows multiple users to communicate online
with real –time audio, video and text chat in dynamic 3D environments.
Internet (INTERconnection NETwork): The Internet is a worldwide network of computer
networks. It is not owned by anybody. The internet has evolved from ARPANET. The internet is a
globally connected network system that utilizes TCP/IP to transmit information. following
services are instantly available through internet : Email, Web-enabled audio/video conferencing
services, Online movies and gaming , Data transfer/file-sharing, Instant messaging , Internet
forums , Social networking , Online shopping ,Financial services
Switching Techniques
Switching Techniques: Switching techniques are used for
transmitting data across networks. Different ways of
sending data across the network are:
Circuit Switching:
• First the complete end to end transmission path
is established between the source and the
destination computers. Then the message is
transmitted through the path.
• The main advantage of this technique is
guaranteed delivery of the message. Mostly
used for voice communication.
Packet Switching:
• Using the TCP protocol a single large message is divided into a
sequence of packets of size limits from 128 to 4096 bytes.
• Each packet is independent and has the address of
sender and destination.
• The IP (Internet protocol) does the routing for the packets. It
keeps track of all the different routes available to the
destination. If one route is not available it finds the alternate
route to the destination.
• At the destination, the TCP protocol re-assembles the packets
into the complete message.
sent to retransmit the same message.
Data Communication Terminologies
Bandwidth: The amount of data that can be transferred from one point to another.it is a
measure of the range of frequencies a transmitted signal occupies. In digital systems,
bandwidth is the data speed in bits per second. In analog systems, bandwidth is measured in
terms of the difference between the highest-frequency signal component and the lowest-
frequency signal component. Bandwidth is expressed in Hz, KHz, and MHz. The hertz (symbol:
Hz) is the derived unit of frequency in the International System of Units (SI) and is defined as
one cycle per second. It is named after Heinrich Rudolf Hertz. Hertz are commonly expressed in
multiples: kilohertz (103 Hz, kHz), megahertz (106 Hz, MHz), gigahertz (109 Hz, GHz)
Communication Channel (Transmission media): A communication channel is either a physical
transmission medium such as a wire, or to a logical connection over a multiplexed medium such
as a radio channel in telecommunications and computer networking.
Data transfer rate: DTR is the amount of data in digital form that is moved from one place to
another in a given time on a network. Data rates are often measured in megabits (million bits)
or megabytes (millionbytes) per second.
Bps bits per Bps bytes per
second second
image
Transmission media
Wireless Networks – It uses high-frequency radio waves rather than wires to communicate.
Wireless allows for devices to be shared without networking cable which increases mobility but
decreases range.
Infrared Wave Transmission - Short Range Communication: Infrared waves can travel from a few
centimetres to several meters(Approx. 5m). Line of Sight Propagation: Infrared uses point to
point communication, both transmitter and receiver should be placed in line of sight of each
other and there should not be any obstacle in between. Cannot Penetrate Solid object. It is
Inexpensive mode of Communication. Secure : At a time only two devices can communicate
therefore information passed to one device is not leaked to another device.
Radio Wave Transmission:- Long Range Communication : Radio waves can cover distances
ranging from a few meters (in walkie-talkies) up to covering an entire city.
Omnidirectional: Radio waves are propagated in all directions. Therefore sending and receiving
antennas do not have to be aligned. Penetrates Solid Objects. Inexpensive mode of
communication. Radio wave communication is insecure communication.
Microwave radio- a form of radio transmission that use. Ultra-high frequencies. It is a point- to-
point, rather than a broadcast, transmission system. Additionally, each antenna must be within
line of sight of the next antenna. Frequency Bands Maximum Antenna Separation
Analog/Digital 4-6 GHz 32-48 km Analog 10-12 GHz 16-24 km Digital 18-23 GHz 8-11 km Digital.
Satellite Communication- It provide worldwide coverage independent to population density.
Satellite ccommunication Systems offer telecommunication (Satellite Phones), positioning and
navigation (GPS), broadcasting, internet, Mobile, TV, etc.
It support Very Long Range Communication with Line of Sight Propagation . It Cannot Penetrate
Solid Objects. It is Very Expensive communication mode.
Microwave link vs Optical fiber
Microwave link vs Optical fiber
Microwave which is also known as Radio links have been used by many companies for decades.
Most of the Mobile (Cellular) networks use microwave to connect their cell towers to their
backhaul networks. For mobile operators, a reason using microwave is not the speed which
microwave provides. It is used to connect their remote sites (Rural areas) , because microwave is
a faster and cheaper deployment option compare to fiber.
When more capacity (bandwidth) is required, fiber becomes more economical. Actual cost of
fiber deployments is laboring cost. Digging a trench and laying the fiber , getting the required
permissions from the land owners and from the municipalities. we have to dig a trench that’s
hundreds (or thousands) of kilometers long, or lease access to ducts that have already been laid
by infrastructure companies. Geography of the land is very important for the fiber deployments.
For example, when faced with a mountain or river, do we go straight across at great expense, or
do you make a diversion to the nearest bridge or tunnel? Combine all of these factors and you’ll
understand why most of the world’s terrestrial fibre networks are deployed alongside existing
roads and railways.
Network Devices
Computer hardware devices which are used to connect computers, printers, or any other
electronic device to a computer network are called network devices. These devices transfer data
in a fast, secure and correct way with some specific functionality over same or different
networks.
Some devices are installed on the device, like Internal modem, NIC card or RJ45 connector,
whereas some are part of the network, like router, switch, etc.
NIC – This is at top among other networking devices and mostly used networking device. This is
also known as network adapter card, Ethernet Card and LAN card. It allows our PC to
communicate with other PCs. A PC uses parallel data transmission to transmit data between its
internal parts where as the media that connects this PC with other device/PCs uses serial data
transmission. A NIC converts parallel data stream into serial data stream and vice versa.
Modem – Modem is short for Modulator Demodulator. It’s an electronic device used to access
the Internet that modulates carrier waves to encode information to be transmitted and also
demodulates incoming carrier waves to decode the information they carry. Modulation means
digital to analog signal conversion and its vice versa is known as demodulation.
Repeater – In a network signal travels a long distance in transmission media. Due to resistance of
media signal becomes weak. Repeater is a networking device which regenerates the signal and
forwards these signal with more power.
Router – Routers operate in the physical, data link and network layers. Router is a networking
device which chooses the best optimal path from available pats to send the signals. It
interconnects different networks. The simplest function of a router is to received packets from
one connected network and pass them to second connected network.
Gateway – A networking device capable to convert protocols so that two different network
architecture based system can communicate with each other. It works as protocol convertor.
Bus Topology
Nodes are connected through a common communication media like diagram given below
Star Topology
The star topology uses a separate cable for each node/workstation. The
cable connects the node to a central device typically a HUB.
Advantages of a Star topology
• Less expensive than mesh
• Easy to install, easy to configure
• If one link fails the network can still function
Disadvantages of a Star topology
• Everything depends on the hub
Ring Topology
In ring topology every computer is connected to the next computer in the
ring and each transmit the signal ,what it receives from the previous
computer. The messages flow around the ring in one direction.
Advantages of a Ring topology
x Easy to install
x Easy to reconfigure
Easy to detect a problem Disadvantages of a Ring topology
x Break means the whole system is dead
Mesh Topology
In mesh topology , separate cable is used to connect each device to
every other device on the network, providing a straight
communication path.
Advantages of a Mesh topology
• Avoid traffic since each link can carry its own data and none
are being shared
• If one link breaks, the rest of the network is still functional
• Easy to detect a problem in the network by discovering which
device is having problems and examining the link that connects to it.
Disadvantages of a Mesh topology
• A lot of cables are needed
• Too many cables means too much cost
• Too many cables means complex network
Tree Topology
In which a central root node (the top level of the hierarchy) is
connected to one or more other nodes that are one l e v e l lower in
the hierarchy
Advantages of a Mesh topology
• It is scalable.
• Easier fault identification and isolation.
Disadvantages of a Mesh topology
• Maintenance of the network
may be an issue when the network spans a great area. if the backbone fails, the entire network
is crippled.
Hybrid Topology
use a combination of any two or more topologies in such a way that the resulting network does
not exhibit one of the standard topologies
(e.g., bus, star, ring, etc.).
• Types of network
1. Personal Area Network (PAN) – communication between two- three mobile
devices or PC for personal purpose.
2. Local Area Network (LAN) – limited area (within building)
3. Metropolitan Area Network (MAN) – within city
4. Wide Area Network (WAN) – within
multiple city/state/ countries
Characteristics of WAN
• Covers large distances(states, countries, continents).
• Communication medium like satellite, public telephone networks etc and routers
are used establish connection.
Examples: A network of ATMs, BANKs, National Government Offices, International Organizations'
Offices etc., spread over a country, continent, or covering many continents.
Advantages of WAN
• Long distance business can connect on the one network.
• Shares software and resources
• Messages can be sent very quickly to wide range of nodes
• Hardware devices can be shared.
Disadvantages of WAN
• Need a good firewall to restrict unauthorized access
• Setting up a network can be an expensive, slow and complicated.
• Maintaining a network is a full-time job
• Security is a mazor issue when many different people have the ability to use
information
Network Layout –
The plan or design or arrangement of network wings and nodes to be laid out is known as
network layout.
A good network layout provides the following features
Communication speed
File sharing
Back up and Roll back is easy
Software and Hardware sharing
Security
Scalability
Reliability
How to decide Network Layout –
The network layout can be best which provide less installation and maintenance cost as well as
easy installation and maintenance. It is only possible when it is properly designed, design with
shortest cable length and fulfill our network requirements.
How to decide Network Layout
Example
Freya Tech Corporation (FTC) is a professional consultancy company. The company is planning to
set up their new offices in India with its hub at Udaipur. As a network adviser, you have to
understand their requirement and suggest them the best network layout.
Server location can be decided by seeing the number of computers/nodes required in each block
of network.
Server must be installed at the wing/block with Maximum number of Computers due to
maximum load/requirement of services in that block in whole network .So in above example
Server can be installed at Finance block.
Of the five address classes, three—Class A, B, and C—were designated for unicast single source–
to–single destination communication. Addresses in Class D were reserved for IP Multicast
applications, which allows one-to-many communication. Class E addresses were reserved for
experimental purposes.
How TCP/IP WORKS -worksTCP/IP is a two-layered program: the higher layer (TCP) disassembles
message content into small "data packets" that are then transmitted over the Internet to be
re-assembled by the receiving computer's TCP back into the message's original form.
TCP/IP and Higher-Level Applications - Many higher-level apps that ecommerce businesses need
to be familiar with utilize and/or are built on TCP/IP.
• FTP (the Internet's File Transfer Protocol)
• HTTP (the Internet's Hyper-text Transfer Protocol)
• Telnet, which enables logging on computers from remote locations
• SMTP (Simple Mail Transfer Protocol)
FTP – FTP, or File Transfer Protocol, is one of the standard internet protocols used to transfer data
files between a client(FTP client) and a server(FTP server) over a computer network. It was
developed in the early 1970s by Abhay Bhushan (alumni IIT Kanpur),while he was a student at
MIT. FTP was initially created to allow for the secure transfer of files between servers and host
computers over the ARPANET Network Control Program (a precursor to the modern
internet).Nowadays it is being used for uploading files on webserver after non anonymous
ftp(means username and password available with you).downloading is possible as anonymous
ftp(no password is required).FTP is available in two mode – text mode ftp(where user have to
give commands in text form) and GUI ftp(graphical interaction is possible).
5. Left side pan will display the folder/files of our computer and right side pan will display
the file structure of remote computer through simple drag and drop we can download
upload(receive file from remote computer to local computer) or upload(sending file to
remote computer from local computer) the files.
Practice site for FTP
Demo for Web-based Administration:
Location: http://demo.wftpserver.com:5466/ Username: demo-admin
Password: demo-admin
Demo for Web-based Client:
Location: http://demo.wftpserver.com/
Username: demo-user
Password: demo-user
Login using your own client with FTP, FTPS, SFTP protocol:
Location: demo.wftpserver.com Username:
demo-user
Password: demo-user
FTP Port: 21
FTPS Port: 990
SFTP Port: 2222
Point-to-Point Protocol (PPP) is an open standard protocol that is mostly used to provide
connections over point-to-point serial links. The main purpose of PPP is to transport Layer 3
packets over a Data Link layer point-to-point link. PPP can be configured on:
Asynchronous serial connection like Plain old telephone service (POTS) dial-up
Synchronous serial connection like Integrated Services for Digital Network (ISDN) or point-to-
point leased lines.
PPP consists of two sub-protocols: Link Control Protocol (LCP): set up and negotiate control
options on the Data Link Layer (OSI Layer 2). After finishing setting up the link, it uses NCP.
Network control Protocol (NCP): negotiate optional configuration parameters and facilitate for
the Network Layer (OSI Layer 3).
Before a PPP connection is established, the link must go through three phases of session
establishment:
1. Link establishment phase: In this phase, each PPP device sends LCP packets to configure
and test the data link
2. Authentication phase (optional): If authentication is enabled, either PAP or CHAP will be
used. PAP and CHAP are two authentication protocols used in PPP
3. Network layer protocol phase: PPP sends NCP packets to choose and configure Network
Layer protocol (OSI Layer 3) to be encapsulated and sent over the PPP data link
HTTP - HTTP stands for hypertext transfer protocol and is used to transfer data across the Web. It
allow users of the World Wide Web to exchange information found on web pages. When
accessing any web page entering http:// in front of the address tells the browser to
communicate over HTTP.
How It Works-
It is a connectionless text based protocol. Clients (web browsers) send requests through request
object of http to web servers for web pages / images etc. Web server respond accordingly
through response object of http After this cycle(request – response), the connection between
client and server across the Internet is disconnected. A new connection must be made for each
request(means for each web page).
This diagram show the working http protocol. Working with dns server and working with web
Server both.
Remote login – A remote login facility permits a user who is using one computer to login to
remote computer or interact with a program on another computer. Command given at remote
location is processed by server and result displayed over remote location.
Telnet – Telnet is most popular protocol for accessing remote site/server. Using telnet client
software on our computer, we can make a connection to a telnet server (that is, the remote
host). Once our telnet client establishes a connection to the remote host, our client becomes a
virtual terminal, allowing us to communicate with the remote host from our computer. In most
cases, we need to log into the remote host, which requires that we have an account on that
system. Occasionally, we can log in as guest or public without having an account. Generally it is
used in unix based client server system to interact.
Wireless/Mobile Communication Protocol-
Wireless communications is a type of data communication that is performed and delivered
wirelessly between mobile devices.
The network architecture used is unique in that it separates the mobile network(s) from fixed
networks and provides connectivity between the two via the protocols specially used for
wireless/mobile communication which are not as wireless/mobile communication protocol.
E.g. of such protocols are GSM,GPRS and WLL.
GSM-Global System for Mobile Communications is a Standard developed by the European
Telecommunications Standards Institute (ETSI) for 2G cellular networks for mobile phones.
It initially started as a circuit switching network, but later packet switching was implemented
after integration General Packet Radio Service (GPRS) technology as well. The widely-used GSM
frequency bands are 900 MHz and 1800 MHz.
GSM mobile use sim cards -Subscriber Identity Module card is a tiny, portable memory chip that
stores information about you as a cell phone user. On it, there’s a seventeen-digit code that
designates its country code of origin, the system carrier and a unique user ID.
How GSM works-
A Mobile Station: It is the mobile phone which consists of the transceiver, the display and the
processor and is controlled by a SIM card operating over the network.
It consists of the Base Transceiver Station which contains the radio transceivers and handles the
protocols for communication with mobiles. It also consists of the Base Station Controller which
controls the Base Transceiver station and acts as a interface between the mobile station and
mobile switching centre.
Network Subsystem: It provides the basic network connection to the mobile stations. The basic
part of the Network Subsystem is the Mobile Service Switching Centre which provides access to
different networks like ISDN, PSTN etc. It also consists of the Home Location Register and the
Visitor Location Register which provides the call routing and roaming capabilities of GSM. It also
contains the Equipment Identity Register which maintains an account of all the mobile
equipment wherein each mobile is identified by its own IMEI number. IMEI stands for
International Mobile Equipment Identity.
GPRS-General Packet Radio Service systems In GSM cell
• there will always be idle radio capacity. Which is not being used and it stays unused until
other cell phone users decide to make phone calls. GPRS uses this idle radio capacity to
establish a data network to be used for data transmission(115 kbps).
• Gateway GPRS Support Node (GGSN) & Serving GPRS Support Node (SGSN) are two
major components of gprs network .
• The GGSN converts incoming data traffic from mobile users (via the SGSN) and forwards
it to the relevant network, and vice versa. The Serving GPRS Support Node (SGSN) to
keep mobile users connected to the Internet and IP-based applications.
WLL: Wireless Local Loop
Initially, the telephones were connected via copper cables but with (WLL) protocol telephones
with will support can be used while roaming.
When somebody calls from WLL to another person, the Base Trans-Receiver
accepts the signal and sends it to Base-Station Controller.
Controller decodes them according to given code and sends it to Base Station Manager which
sends it to Telephone Exchange. This gets back to a specific customer on the same route via
different Trans-Receiver.
However, this was quite inefficient when it has to cover a bigger ground, probably that’s why it
became obsolete.
Mobile Communication Technologies
Mobile processors, also known as chipset, is a component that controls everything going on in
your smartphone and ensures it functions correctly.
Processors based on specs – Cores and clock speed
A processor performance mostly depends on two specifications; the number of cores and the
clock speeds .A core is an element of the processor that implements and executes tasks.
Smartphones today, come with multiple cores. Each core is designed to handle and execute
tasks. More the number of cores, more and heavier apps it can e.g. dual-core (two), quad-core
(four) and octa-core (eight), hexa-core (six).etc.
Popular Entry-Level SoCs
x Snapdragon 665-The most popular affordable chipset that replaced Snapdragon 400
series.
x MediaTek Helio P70 has emerged as a popular alternative to Snapdragon chipsets.
Popular Mid-Range SoCs
x Snapdragon 765/ 765G is the first Qualcommchip set with an integrated 5G modem.
x MediaTek G90/ G90T- only popular MediaTek chipset in 2019.
x Popular High-End SoCs Snapdragon 865 -The latest Qualcomm flagship that will be a
part all 2020 flagships.
x Kirin 990 5G/ 990-This is the current Huawei flagship
x chipset in Mate 30 and P40- phones.
Email Protocols
Email –Electronic mail is a facility that allows users to transmit messages across the internet
in fast and secure manner.
Email created using email client program->on press of send button ,it is delivered to sender’s
mail server through SMTP(Simple mail transfer protocol)->which further transmit the same
through internet to recipient’s mail server->whenever recipient’s email client program’s inbox is
opened,that email is delivered to inbox through POP3 (post office protocols 3rd version)->which
user will read in email client program.
SMTP – Most of the internet systems use SMTP as a method to transfer mail from one user to
another. SMTP is a push protocol and is used to send the mail to email server. it is usually used
with one of two other protocols, POP3 or IMAP, that let the user save messages in a server
mailbox and download them periodically from the server.An alternative to SMTP that is widely
used in Europe is X.400. Many mail servers now support Extended Simple Mail Transfer Protocol
(ESMTP), which allows multimedia files to be deliver
Channel Bandwidth fixed channel bandwidth of 20 MHz. flexible channel bandwidth - 1.25 MHz to 20 MHz.
IEEE Standards Defined under IEEE 802.11x standards Standardized under 802.16y family of wireless
where x is various Wi-Fi versions. networking where y refers to various WiMAX
versions.
Coverage coverage of up to 100 meters for Non-line of sight connectivity covers a radius of
outdoor applications and 30 meters above 25 kilometers (Km). For line of sight
for indoor coverage. connectivity coverage area of above 600- square
Network Security Concepts
Network security software is the process of physical and preventative measures to protect the
networking infrastructure from authorized access, malfunction, destruction, misuse,
modification, or improper disclosure, thereby creating a secure platform for computers, users,
and programs to perform their permitted critical functions within a secure environment.
Network security threats types:
• Passive Network Threats: Passive cyber attacks employ non- disruptive methods so
that the hacker does not draw attention to the attack. Passive attacks are usually
data gathering operations, which means they usually employ some sort of malware
or hack that eavesdrops on system communications Activities such as wiretapping
and idle scans that are designed to intercept traffic traveling through the network.
• Active Network Threats: Active cyber attacks are often aggressive, blatant attacks
that victims immediately become aware of when they occur. Activities such as
Denial of Service (DoS) attacks and SQL injection attacks where the attacker is
attempting to execute commands to disrupt the network’s normal operation.
Viruses, worms, Trojan horse, spam, malware, Denial of Service attacks, and
password crackers are all examples of active cyber attacks.
Computer virus - is a malicious software program loaded onto a user's computer without the
user's knowledge and performs malicious actions.
COMMON TYPES OF COMPUTER VIRUSES
1. RESIDENT VIRUS-Resident viruses set up in RAM and meddle with system operations.
They’re so sneaky that they can even attach themselves to anti- virus software files.
2. MULTIPARTITE VIRUS-This virus infects the entire system. Multipartite viruses spread
by performing authorized actions on operating system, folders, and programs.
3. DIRECT ACTION-This virus targets a specific file type, most commonly executable files
(.exe), by replicating and infecting files. Due to its targeted nature, this virus type is
one of the easier ones to detect and remove.
4. BROWSER HIJACKER-Easily detected, this virus type infects browser and redirects
you to malicious websites.
5. OVERWRITE -VIRUS-Like the name implies, overwrite viruses overwrite file content to
infect entire folders, files, and programs.
6. WEB SCRIPTING -VIRUS-This sneaky virus disguises itself in the coding of links, ads,
images, videos, and site code. It can infect systems when users download malicious
files or visit malicious websites.
7. FILE- INFECTOR-By targeting executable files (.exe), file infector viruses slow down
programs and damage system files when a user runs them.
8. BOOT SENETWORK- VIRUS-Network viruses travel through network connections and
replicate themselves through shared resources.
9. CTOR -VIRUS-One of the easier viruses to avoid, this virus hides out in a file on a USB
drive or email attachment. When activated, it can infect the system’s master boot
record to damage the system.
SECTION PENALTY
OFFENCE
67A Publishing images containing sexual Imprisonment up to seven years, or/and with fine
acts up to Rs. 1,000,000
Publishing child porn or predating Imprisonment up to five years, or/and with fine up
67B children online to Rs.1,000,000 on first conviction. Imprisonment
up to seven years, or/and with fine up to
Rs.1,000,000 on second conviction.
67C Failure to maintain records Imprisonment up to three years, or/and with fine.
Computer Network
Full forms
1. P2P: Point to Point
2. MODEM: Modulation/Demodulation
3. AM: Amplitude Modulation
4. FM: Frequency Modulation
5. HTTP: Hypertext Transfer Protocol
6. HTTPS: Hypertext Transfer Protocol Secure
7. SCP: Secure Copy Protocol
8. SSH: Secure Shell
9. SSL: Secured Socket Layer
Full forms
1. MIME: Multipurpose Internet Moil Extension
2. SMTP: Simple Mail Transfer Protocol
3. POP: Post Office Protocol
4-. IMAP: Internet Message Access Protocol
5. FTP: File Transfer Protocol
6. URL: Uniform Resource Locator
7. GSM: Global System for Mobile Communications
8. SIM: Subscriber Identification Module
9. SMS: Short Message Service
Full forms
1. TCP/IP: Transmission Control Protocol/Internet Protocol
2. IP: Internet Protocol
3. MAC: Media Access Control
4. LAN; Local Area Network
5. MAN: Metropolitan Area Network
6. WAN: Wide Area Network
7. NFC: Near Field Communication
8. NIC: Network Interface Card
9. NFS: Network File System
Full forms
1. ISP: Internet Service Provider
2. TDMA: Time Division Multiple Access
3. CDMA: Code Division Multiple Access
4. 3G: Third Generation
5. HTML: Hypertext Markup Language
6. XML: Extensible Markup Language
7. PHP: Hypertext Preprocessor
8- VoIP: Voice Over Internet Protocol
9. WWW: World Wide Web
Let's Revise
x Start here in points.
x A network is a collection of interlinked computers by means of a communication
system.
x The networks facilitate resource sharing, increased reliability, reduced costs, and
increased and fast communication.
x On the basis of geographical spread, networks can be classified into LAN (Local Area
Network), and WAN (Wide Area Network).
x Small computer networks that are confined to a localised area e.g., an office, a
building etc., are called LANs.
x A WAN is a group of computers that are separated by large distance and tied together.
It can even be a group of LANs that are spread across several locations and connected
together to look like a big LAN.
x On the basis of component roles, networks can be classified into: a peer-to-peer
network and a client-server network.
x A Client computer (or a client) is a computer or other device on the other device on
x the network that requests and utilizes network resources.
x A Server is a computer on network, dedicated to processing client requests.
x In a peer-to-peer network, all computers are equal; each can double up as a client as
x well as a non-dedicated server.
x A client/server network has computer(s) designated as server(s) and these are
dedicated servers. Clients do own job and the servers serve the requests of the clients.
x A hub is a hardware device used to connect several computers together. Hubs can be
either active hubs or passive hubs.
x A switch is a device that is used to segment networks into different sub-networks
called subnets or LAN segments.
x A bridge is a device that links two networks together.
x A router is a device that works like a bridge but can handle different protocols.
x A gateway is a device that connects dissimilar networks.
x An access point (AP), also called wireless access point (WAP), is a hardware device
that establishes connection(s) of computing devices on wireless LAN with a fixed wire
network.
x The cloud is a generic term for the Internet.
x IOT is a phenomenon that connects the smart devices to the internet over wireless
connections.
x IOT technology uses other technologies like RFID, sensors, smart technologies like
controllers and specialized software.