Network 2024
Network 2024
WHAT IS A NETWORK?
ADVANTAGES OF NETWORKS
•File sharing – you can easily share data between different users, or access it remotely if you keep
it on other connected devices.
•Resource sharing – using network-connected peripheral devices like printers, scanners and
copiers, or sharing software between multiple users, saves money.
•Improved Communication at low cost- people can use emails and instant messengers over the
network to communicate. Voice calling, video calling over internet has brought the world closer.
ADVANTAGES OF NETWORKS (Continued)
EVOLUTION OF INTERNET
The network did not evolve in a single day; rather, it took decades to become more powerful, efficient and reliable. The
network has passed through several stages which are described below:
• ARPANET (Advanced Research Project Agency Network): ARPANET, which was jointly designed and named by the
Advanced Research Projects Agency (ARPA) and US Department of Defence (DoD), was the first network and came into
existence in 1969. It was a project that connected a handful of computers at different universities and US DoD for sharing
of data and messages and playing long-distance games, and socializing with people to share their views. Arpanet carried
its first message on October 29, 1969, laying the foundation for today’s networked world.
When Arpanet was created, it connected five sites: UCLA, Stanford, UC Santa Barbara, the University of Utah and BBN
Technologies.
• NSFNET (National Science Federation Network): In the mid-80’s, another federal agency, NSFNET (National Science
Federation Network), created a new network which was more capable than ARPANET. Its main aim was to use network
only for academic research and not for any private business activity. Later, many private companies combined their own
private networks with ARPANET and NSFNET to make a more capable and broad network—the Internet. It is the internet
that links two or more networks to make a large network for sharing of information and messages.
INTERNET
The Internet is the global system of interconnected computer networks that uses the Internet protocol
suite (TCP/IP) to communicate between networks and devices. It is a network of networks that
consists of private, public, academic, business, and government networks.
SWITCHING TECHNIQUES
Switching sends data along different routes. Process of forwarding data from one point to another.
Two types
• Connection oriented
• Connection less
NOT IN SYLLABUS , JUST READ
Each packet is of fixed size
SWITCHING TECHNIQUES
https://www.youtube.com/watch?v=nomyRJehhnM
TCP/IP
https://www.youtube.com/watch?v=hDHJxndSups
JUST READ
https://www.youtube.com/watch?v=U9arSNHLgsc
BUS , STAR, TREE TOPOLOGIES IN SYLLABUS
Terminator is a device
connected to one end of a
bus or cable that absorbs
signals. Terminators prevent
signal reflection, which can
produce interference that
causes signal loss.
Twisted Pair Cable
Twisted pair cable consists of a pair of insulated wires twisted
together. The use of two wires twisted together helps to reduce
crosstalk and electromagnetic induction. Twisted-pair cable is
used by older telephone networks and is the least expensive type
of local-area network (LAN) cable.
Coaxial Cable
Coaxial cable, or coax, is an electrical cable with an inner
conductor surrounded by a tubular insulating layer typically of a
flexible material with a high dielectric constant, all of which are
surrounded by a conductive layer called the shield, and finally
covered with a thin insulating layer on the outside. The term
coaxial comes from the inner conductor and the outer shield
sharing the same geometric axis.
Opitcal Fibre
https://www.bluetooth.com/learn-about-bluetooth/bluetooth-technology/range/
JUST READ
Wi-Fi is the name of a popular wireless networking technology that uses radio waves to provide
wireless high-speed Internet and network connections. The name is a contraction of "Wireless
Fidelity".
1.Wi-Fi routers use 802.11 networking standards. A computer's wireless adapter translates data
into a radio signal and transmits it using an antenna. Wi-Fi 6, or 802.11ax, is the latest Wi-Fi
generation, announced in Sept. 2019
2.A wireless router receives the signal and decodes it. The router sends the information to the
Internet using a physical, wired Ethernet connection.
A WiFi hotspot is simply an area with an accessible wireless network.
Most new laptops and many new desktop computers come with built-in wireless transmitters, and just
about all mobile devices are WiFi enabled. If your computer isn't already equipped, you can buy a wireless
adapter that plugs into the PC card slot or USB port.
JUST READ
WiMAX is a family of wireless broadband communication standards based on the IEEE 802.16 set of
standards
Satellite
JUST READ
NETWORK DEVICES
1. Modem
•Function: Short for Modulator-Demodulator, a modem converts digital data from a computer into analog signals that
can be transmitted over phone lines (and vice versa). It’s essential for internet connectivity over telephone lines.
•Types: Dial-up, DSL, and Cable modems.
•Use: Common in home and office networks for accessing the internet.
2. Ethernet Card (Network Interface Card, NIC)
•Function: A hardware component that allows computers to connect to a network via an Ethernet cable.
•Type: It can be integrated into the motherboard or added as an external card.
•MAC Address: Each Ethernet card has a unique MAC (Media Access Control) address for identification.
3. RJ45 Connector
•Function: A type of connector commonly used for network cables in Ethernet networks.
•Structure: It has 8 pins and is used to connect the ends of Ethernet cables to devices like NICs or routers.
•Use: Ensures secure and reliable physical connection for Ethernet networking.
4. Repeater
•Function: Boosts or amplifies signals in a network to extend the transmission distance.
•Use: Primarily used in long-distance cabling and wireless networks to maintain signal strength.
•Application: Useful in areas where the network covers large physical spaces.
5. Hub
•Function: A basic device that connects multiple devices in a network. It forwards data packets to all connected
devices, regardless of the destination.
•Limitation: It lacks intelligence, meaning it cannot filter or direct traffic efficiently, often leading to network
congestion.
•Use: Suitable for small networks but generally replaced by switches in modern setups. 6. Switch
•Function: Connects multiple devices in a network, similar to a hub, but is more intelligent. It forwards data only to the
device it is intended for, based on MAC addresses.
•Benefit: Reduces network congestion and improves performance.
•Use: Commonly used in LAN (Local Area Network) environments.
7. Router
•Function: Connects multiple networks and directs data between them, typically from a local network to the internet.
•Intelligence: Uses IP addresses to route data to the correct destination.
•Use: Essential for internet connectivity in both home and office networks.
8. Gateway
•Function: Acts as a "gateway" between different networks, particularly those with differing protocols.
•Role: Translates data formats, protocols, and addresses for compatibility.
•Use: Typically used when connecting a local network to an external network, such as the internet.
9. Wi-Fi Card
•Function: A network adapter that allows a computer or device to connect to a Wi-Fi network.
•Connection Type: Can be internal (built into laptops) or external (USB adapters).
•Use: Essential for wireless connectivity to Wi-Fi networks.
Layer 6 device (data link layer)
SWITCH
In a telecommunications network, a switch is a device that channels incoming data from any of multiple input ports to the
specific output port that will take the data toward its intended destination. A switch is a little smarter than a hub. It records
the IP and MAC addresses in a table of all the devices connected to it. Thus when a packet is received the switch reads the
destination address information to determine if the destination device is connected to it. It it is, the switch forwards the
packet only to the destination device sparing the other devices connected to it from having to read and deal with the traffic.
Switch is the preferred answer
PROTOCOLS
What is FTP (File Transfer Protocol)?
FTP is a widely used network protocol for transferring files between
computers over a TCP/IP-based network, such as the Internet. FTP lets people
and applications exchange and share data within their offices and across the
Internet.
FTP connection needs two parties to establish and communicate on the network.
To do that, users need to have permission by providing credentials to the FTP
server. Some public FTP servers may not require credentials to access their files.
The practice is common in a so-called anonymous FTP.
FTP is the underlying protocol that is used to, as the name suggests, transfer files
over a communication network. It establishes two TCP connections: Control
Connection to authenticate the user, and Data Connection to transfer the
files.
IP (Internet Protocol)- A network layer protocol. Responsible for routing of
the packets.
An IP address (Internet Protocol address) is a unique identifier assigned to each device connected to a
network that uses the Internet Protocol for communication. It enables devices, such as computers,
smartphones, and routers, to locate and communicate with each other over the internet or local network.
Types of IP Addresses:
1.IPv4 (Internet Protocol version 4):
•Consists of four groups of numbers, each ranging from 0 to 255, separated by dots (e.g., 192.168.1.1).
2.IPv6 (Internet Protocol version 6):
•Uses a more complex, hexadecimal system with 8 groups of four characters, separated by colons (e.g.,
2001:0db8:85a3:0000:0000:8a2e:0370:7334).
Point - to - Point Protocol (PPP) is a communication protocol of the data link layer
that is used to transmit data between two directly connected (point-to-point)
computers. It is a byte - oriented protocol that is widely used in broadband
communications having heavy loads and high speeds. Since it is a data link layer
protocol, data is transmitted in frames.
•IMAP is short for Internet Message Access Protocol. With IMAP, the message does not
remain on the local device, such as a computer, it remains on the server.
•POP3 is short for Post Office Protocol. With POP3 mail, it will connect and attempt to
keep the mail located on the local device (computer or mobile).
In web 1.0, data was posted on Web sites, and users simply viewed or downloaded the content (static pages).
Web 2.0 characterized by dynamic features like blogging, social networking sites etc.
Web 2.0 (or Web 2) is the popular term for advanced Internet technology and applications including blogs, wikis,
RSS and social bookmarking. The two major components of Web 2.0 are the technological advances enabled by
Ajax (Asynchronous JavaScript and XML) and other new applications such as RSS.
Problems: Third-party cookies let advertisers or analytics companies track an individual's
browsing history across the web on any sites that contain their ads.
FIREWALL
A Firewall is used to prevent unauthorized access to the network. A Firewall can be implemented
as a software, hardware or combination of both. All data or messages entering or leaving the
network pass through the firewall. Firewall examines each message and blocks those that do not
meet the specified security criteria.
CyberLaw
JUST READ
Cyber Law is a generic term which refers to all the legal and regulatory aspects of the Internet and the World
Wide Web. It is important because it touches almost all aspects of transactions and activities concerning the
Internet, the World Wide Web and Cyberspace.
Indian IT Act
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the
primary law in India dealing with cybercrime and electronic commerce.
The Act provides a legal framework for electronic governance by giving recognition to electronic
records and digital signatures. It also defines cyber crimes and prescribes penalties for them.
A major amendment was made in 2008. It introduced Section 66A which penalized sending "offensive
messages". It also introduced Section 69, which gave authorities the power of "interception or
monitoring or decryption of any information through any computer resource". Additionally, it
introduced provisions addressing - pornography, child porn, cyber terrorism and voyeurism.
Cybercrime
JUST READ
Cybercrime, or computer-oriented crime, is a crime that involves a computer and a network. The computer
may have been used in the commission of a crime, or it may be the target.Cybercrime may threaten a person,
company or a nation's security and financial health.
Examples: credit card frauds, website hacking
Common types of Intellectual Property include copyrights, trademarks, patents, industrial design rights and
trade secrets in some jurisdictions.