full pdf
full pdf
A URL is the address used to access resources on the web. It specifies the location of a
resource and the protocol to retrieve it. A typical URL consists of:
HTML is the standard language used to create web pages. It uses "tags" to structure the
content, such as:
CSS is used to style and layout web pages. It controls the presentation of HTML elements,
such as fonts, colors, spacing, and positioning. It "cascades" by allowing multiple stylesheets
to influence the same HTML document, with rules applied based on priority.
4. JavaScript
JavaScript is a programming language used to make web pages interactive. While HTML
structures the content and CSS styles it, JavaScript allows the page to respond to user actions,
such as clicks, form submissions, or animations.
HTTP is the protocol used for transferring data over the web. It is the foundation of
communication between web browsers and servers. HTTP defines how requests and
responses should be formatted. There are different types of HTTP requests:
HTTPS is the secure version of HTTP. It uses encryption [SSL {secure sockets layer) AND
TLS {Transport Layer Security}] to ensure that the data transferred between the web browser
and server is secure and cannot be intercepted by attackers.
7. Web Server
A web server is a software or hardware system that serves web pages to users. When you type
a URL into a browser, the web server receives the request, finds the appropriate web page,
and sends it back to the browser.
Client-side refers to everything that happens on the user's browser. HTML, CSS, and
JavaScript are examples of client-side technologies.
Server-side refers to operations that occur on the web server. Server-side languages
like PHP, Python, or Ruby process the requests and interact with databases.
An API allows different software systems to communicate with each other. In web
development, APIs are often used to connect web applications to databases or external
services. For example, a weather website may use an API to retrieve current weather data
from a weather service.
The DOM is a programming interface for web documents. It represents the structure of a web
page as a tree of objects that can be manipulated by languages like JavaScript. Developers
can use the DOM to change HTML content dynamically.
AJAX is a technique for creating dynamic, fast, and interactive web applications. It allows
the web page to update asynchronously (without reloading the entire page) by exchanging
small amounts of data with the server in the background.
12. Cookies
Cookies are small text files stored by a web browser that track information about a user’s
interaction with a website. They help with tasks like remembering login information, keeping
items in a shopping cart, or tracking user preferences.
Web hosting is a service that allows organizations and individuals to post a website or web
page on the internet. A web host, or web hosting service provider, provides the technologies
and infrastructure needed for the website to be viewed online.
Responsive design refers to the practice of building websites that automatically adjust their
layout and appearance based on the screen size and device type, providing an optimal
viewing experience on desktops, tablets, and mobile devices.
DNS is the system that translates domain names (like www.example.com) into IP addresses
(like 192.0.2.1). Since domain names are easier for people to remember, DNS allows us to
use them to access websites instead of numerical IP addresses.
Front-end development involves creating the part of a website that users interact
with. It includes HTML, CSS, and JavaScript.
Back-end development focuses on the server-side, including databases, server logic,
and APIs, often using languages like Python, Ruby, or Node.js.
A CMS is software that helps users create, manage, and modify content on a website without
needing specialized technical knowledge. Popular CMS platforms include WordPress,
Joomla, and Drupal.
19. Database
A database is a system for storing and organizing data. In web development, databases are
used to store user information, posts, product details, and more. SQL (Structured Query
Language) is commonly used for managing databases in web applications.
A web framework is a tool or library that simplifies the development of web applications.
Frameworks like Django (Python), Ruby on Rails (Ruby), and Express (Node.js) provide pre-
built modules and structures to speed up development.
React: A JavaScript library for building user interfaces, particularly for single-page
applications.
Angular: A framework for building dynamic web applications, managed by Google.
Vue.js: A progressive JavaScript framework used for building UIs and single-page
applications.
A set of principles for designing networked applications. REST APIs use HTTP requests to
perform CRUD (Create, Read, Update, Delete) operations on resources represented in JSON
or XML formats.
23. GraphQL
An open-source query language for APIs that allows clients to request exactly the data they
need, reducing the amount of data sent over the network. It’s an alternative to REST.
A software distribution model where applications are hosted by a service provider and made
available to customers over the internet. Examples include Google Workspace, Dropbox, and
Slack.
25. Caching
The process of storing copies of files or data in a cache, or temporary storage, so that future
requests for that data can be served faster. Web browsers, web servers, and content delivery
networks (CDNs) commonly use caching.
A CDN is a network of servers distributed across various locations to deliver web content
faster by reducing the physical distance between the user and the server.
A system that distributes incoming web traffic across multiple servers to ensure no single
server is overwhelmed, improving reliability and performance.
A system that records changes to files over time so that you can recall specific versions later.
Git is the most popular version control system, often used with platforms like GitHub for
managing web development projects.
29. WebSocket
A communication protocol that allows for real-time data exchange between a client (like a
web browser) and a server over a single, long-lived connection. It’s often used for
applications that require live updates, such as chat applications or stock price tickers.
30. Microservices
A design architecture where a large application is divided into smaller, independent services
that communicate with each other. This architecture allows for greater flexibility and
scalability in web applications.
32. NoSQL
A type of database that provides a mechanism for storage and retrieval of data that is modeled
differently from relational databases. Examples include MongoDB and Cassandra. NoSQL
databases are often used in big data applications and for handling unstructured data.
33. Bootstrap
A popular front-end framework for developing responsive websites quickly. It includes pre-
designed templates and components for buttons, forms, modals, navigation bars, etc.
An international community that develops open standards to ensure the long-term growth of
the web. The W3C is responsible for many important web standards like HTML, CSS, and
XML.
A design approach that allows websites to work well on a variety of devices and window or
screen sizes, from mobile phones to large desktop monitors. It involves flexible grids,
layouts, images, and media queries.
A type of application delivered through the web, built using standard web technologies
(HTML, CSS, and JavaScript), but with the ability to work offline, send push notifications,
and access device hardware.
37. Session
A session is the time during which a user interacts with an application. Sessions are often
used to track user activity across different requests (such as logging in and viewing pages).
Sessions are usually stored on the server.
38. Token
Tokens are used in authentication to ensure secure data transmission. JWT (JSON Web
Token) is commonly used in web applications to transfer data between two parties securely.
39. OAuth
A security feature implemented by browsers that restricts how web pages can request
resources from a different domain than the one that served the web page. CORS headers are
used by servers to allow certain cross-origin requests.
WEB BROWSERS- Web browsers are software applications that enable users to access
and interact with websites and content on the internet. They interpret and display web
content, allowing users to browse and navigate between web pages using URLs (Uniform
Resource Locators). Here’s a detailed breakdown of how web browsers work, key
components, and some popular browsers:
The primary role of a web browser is to fetch resources (like HTML, CSS, JavaScript,
images) from web servers and render them into human-readable and interactive web pages.
Browsers act as the interface between users and the World Wide Web, allowing users to:
View websites.
Interact with forms, buttons, and media.
Use web applications.
Store cookies and manage user sessions.
Web browsers are complex applications with several key components that work together to
deliver web content:
The UI is the part of the browser that the user interacts with. It includes:
Address bar: Where you type URLs to navigate to different web pages.
Back, forward, and refresh buttons: For navigation.
Bookmarks: For saving and accessing favorite websites quickly.
Tabs: Modern browsers allow multiple pages to be open at once in different tabs.
Settings menu: For adjusting preferences like privacy, security, and appearance.
b. Browser Engine
The browser engine acts as a bridge between the user interface and the rendering engine. It
interprets the user’s actions (e.g., clicking a link or entering a URL) and instructs the
rendering engine to display content accordingly.
c. Rendering Engine
The rendering engine is responsible for parsing HTML, CSS, and JavaScript to construct and
display a web page. It converts raw web content into the visual and interactive layout that
users see. Common rendering engines include:
d. Networking
The networking component handles communication with web servers, retrieving the
necessary data using standard protocols like HTTP and HTTPS. It handles requests and
responses and ensures that web resources are loaded efficiently. This part also manages
security protocols like SSL/TLS for encrypted communications.
e. JavaScript Engine
JavaScript engines execute the JavaScript code on web pages. JavaScript is used to create
dynamic content and make web pages interactive. Popular JavaScript engines include:
f. UI Backend
This part of the browser is responsible for drawing basic widgets and elements like windows,
buttons, and forms. The browser uses the operating system’s UI backend for this purpose.
Browsers store various types of data locally on the user’s device, such as:
Cookies: Small files that store user preferences, session information, and tracking data.
Local Storage: A more permanent way to store data in the browser for a web app.
Cache: Temporarily stores copies of files (like images and scripts) to load websites faster
when revisited.
1. User Input: The user enters a URL in the address bar or clicks on a link.
2. DNS Resolution: The browser queries the Domain Name System (DNS) to translate the
domain name (e.g., www.example.com) into an IP address.
3. Sending HTTP Request: The browser sends an HTTP request to the server at the resolved IP
address, asking for the web page.
4. Receiving HTTP Response: The server responds by sending back the requested resource
(HTML, CSS, JS files).
5. Rendering the Page: The browser parses the HTML, constructs the Document Object Model
(DOM), applies CSS to style the elements, and executes JavaScript. The rendering engine
displays the final result on the screen.
Web browsers have several features that enhance user experience, security, and performance:
Tab Management: Users can open and switch between multiple websites in different tabs.
Bookmarks and History: Browsers store the user's history and bookmarks for easy access to
frequently visited sites.
Private/Incognito Mode: Browsers offer a mode that doesn’t save browsing history or
cookies after the session ends, improving privacy.
Extensions and Plugins: Users can add functionality to browsers via third-party extensions
(e.g., ad blockers, password managers) or plugins.
Developer Tools: Modern browsers include built-in tools for developers to inspect and
debug websites (accessed via F12 or right-clicking on a page element and choosing
“Inspect”).
5. Security Features
Web browsers implement multiple layers of security to protect users from threats like
malware, phishing, and man-in-the-middle attacks. Key security features include:
Sandboxing: Each web page or web app runs in a separate environment (sandbox),
preventing malicious code from affecting the entire system.
HTTPS and SSL/TLS Encryption: Browsers prioritize websites using HTTPS and show warnings
for insecure HTTP sites. SSL/TLS encrypts data to prevent eavesdropping.
Content Security Policies (CSP): Websites can define policies that block certain types of
content (e.g., scripts from third-party domains) to prevent cross-site scripting (XSS) attacks.
Phishing and Malware Protection: Many browsers include databases of known phishing and
malware sites, warning users before they visit potentially harmful pages.
a. Google Chrome
b. Mozilla Firefox
c. Microsoft Edge
d. Apple Safari
7. Browser Compatibility
One of the challenges in web development is ensuring that websites work correctly across
different browsers. While modern browsers largely follow the same web standards, small
differences in how they interpret HTML, CSS, and JavaScript can cause compatibility issues.
Developers often use frameworks and polyfills to ensure consistent behavior across browsers.
As of recent years, Google Chrome dominates the global browser market, followed by Safari
(due to its popularity on Apple devices), and then Firefox and Edge. This market share is
constantly evolving as new features and devices are released.
PROCTOCOLS- Web protocols are the set of rules and standards that allow computers
and devices to communicate over the internet. They define how data is transmitted,
processed, and interpreted between devices and servers. Here’s an overview of important web
protocols:
HTTP is the foundational protocol for the web. It defines how messages are formatted and
transmitted between web clients (usually web browsers) and servers.
Purpose: Used to request and transmit web pages (HTML, CSS, JavaScript) and
other resources.
Functioning: HTTP operates as a request-response protocol. A client sends a request
to the server (e.g., for a webpage), and the server responds with the requested content.
Versions:
o HTTP/1.1: This is the most widely used version of HTTP. It introduced
improvements like persistent connections, meaning a single TCP connection
can be reused for multiple HTTP requests.
o HTTP/2: This version adds features like multiplexing (sending multiple
requests for data at the same time) and header compression for improved
speed.
o HTTP/3: A newer version that uses QUIC, a transport layer network protocol
based on UDP, which makes it faster and more secure.
HTTPS is an extension of HTTP that adds a layer of encryption to the data being transmitted.
Purpose: To secure data transmission between the web browser and the server by
encrypting the communication, ensuring that sensitive data (e.g., passwords, credit
card details) is protected from eavesdropping or tampering.
Functioning: HTTPS uses SSL (Secure Sockets Layer) or its successor TLS
(Transport Layer Security) to encrypt data.
Indicators: In a web browser, HTTPS is indicated by a padlock symbol in the address
bar, showing that the connection is secure.
FTP is used for transferring files between a client and a server over the internet.
SMTP is the standard protocol used for sending emails across the internet.
Purpose: To transmit emails from an email client (like Gmail, Outlook) to the
recipient’s email server.
Working: SMTP is a push protocol that moves emails from one server to another,
and it’s usually used with other protocols like IMAP or POP3 for retrieving emails.
IMAP is used for retrieving emails from a server to an email client. It keeps emails on the
server and allows multiple devices to access and synchronize the same mailbox.
POP3 is another protocol used for retrieving emails from a server, but unlike IMAP, it
downloads the emails to the client and usually deletes them from the server.
SSL and TLS are cryptographic protocols that provide secure communications over a
computer network.
TCP is a core protocol of the internet that enables reliable communication between devices.
Purpose: To ensure reliable, ordered, and error-checked data delivery over the
network.
Functioning: TCP breaks down large data streams into smaller packets, sends them
to the recipient, and ensures that all packets arrive in the correct order. It resends any
lost packets and checks for errors.
Use Case: TCP is widely used in applications where reliability is important, such as
web browsing (HTTP/HTTPS), email (SMTP), and file transfer (FTP).
UDP is a connectionless protocol that sends data without establishing a reliable connection,
making it faster but less reliable than TCP.
Purpose: To send data quickly, but without guaranteeing that all packets are received
or arrive in the correct order.
Use Case: UDP is used in applications where speed is more critical than reliability,
such as live streaming, online gaming, and voice-over-IP (VoIP) services.
Purpose: To provide faster and more reliable connections over the internet by
reducing the number of round trips required to establish a connection.
Functioning: QUIC is built on top of UDP and is designed to handle the same tasks
as TCP but with improved speed and efficiency.
Usage: QUIC is used by HTTP/3 to speed up website loading and reduce latency.
12. WebSocket
WebSocket is a protocol that allows for full-duplex (two-way) communication between a web
client (like a browser) and a server over a single, long-lasting connection.
Purpose: To enable real-time data exchange between the client and server, especially
useful for applications like chat apps, live sports updates, or stock market feeds.
Difference from HTTP: Unlike HTTP, where a new connection is established for
each request, WebSocket keeps the connection open, allowing for continuous data
exchange.
ARP is used to map a network layer address (IP address) to a link layer address (MAC
address).
ICMP is used for error messages and network diagnostic tasks, like reporting that a requested
service is unavailable or that a device can’t be reached.
Purpose: To allow devices (such as routers and hosts) to send messages about
network issues or other errors.
Use Case: It’s widely used in tools like ping and traceroute to check connectivity
and diagnose network problems.
DHCP is used to automatically assign IP addresses and other network configuration details to
devices on a network.
A VPN is a protocol that allows users to securely connect to a private network over a public
network, like the internet.
Purpose: To create an encrypted "tunnel" that protects data and hides the user’s IP
address, enabling secure and private communication.
Use Case: VPNs are commonly used to protect online privacy, access region-
restricted content, and securely connect to remote networks (e.g., when working
remotely).
These web protocols form the backbone of communication on the internet, ensuring that data
can be sent, received, and interpreted securely, reliably, and efficiently. Understanding these
protocols is essential for working with the internet, whether you’re a web developer, network
engineer, or IT professional.
Wired transmission media involve cables or wires to transmit data signals. These media guide
the data from one point to another through a physical path.
a. Twisted-Pair Cable
Twisted-pair cables consist of pairs of insulated copper wires twisted around each other to
reduce electromagnetic interference (EMI) and crosstalk.
Categories:
o Unshielded Twisted Pair (UTP): The most common type used in networking (e.g.,
Ethernet cables). It is inexpensive and used for short to medium distances.
o Shielded Twisted Pair (STP): Has an extra shielding to reduce interference, offering
better protection but is more expensive than UTP.
Advantages:
o Cost-effective.
o Widely used in local area networks (LANs).
Disadvantages:
o Susceptible to electromagnetic interference and signal degradation over long
distances.
o Lower bandwidth compared to other cables like fiber optics.
b. Coaxial Cable
Coaxial cables consist of a central copper core surrounded by a layer of insulation, a metallic
shield, and an outer insulating layer. The metallic shield helps protect against interference.
Uses: Previously used for cable TV, telephone lines, and early computer networks.
Advantages:
o Better resistance to interference than twisted-pair cables.
o Can transmit data over longer distances than twisted-pair cables.
Disadvantages:
o More expensive and bulkier than twisted-pair cables.
o Limited bandwidth compared to modern fiber-optic cables.
c. Fiber-Optic Cable
Fiber-optic cables use light to transmit data signals instead of electrical signals. The core of
the cable is made of glass or plastic, and data is transmitted in the form of light pulses.
Types:
o Single-mode fiber (SMF): Uses a small core and carries light directly down the fiber.
It is used for long-distance communications (e.g., up to 100 kilometers).
o Multi-mode fiber (MMF): Has a larger core and allows multiple light signals to be
transmitted simultaneously. It is typically used for shorter distances.
Advantages:
o Very high bandwidth and transmission speed.
o Can transmit data over long distances without significant signal loss.
o Immune to electromagnetic interference.
Disadvantages:
o Expensive to install and maintain.
o More fragile compared to copper cables.
Wireless transmission media use electromagnetic waves to transmit data without the need for
physical cables. These waves propagate through air, space, or other mediums without guided
paths.
a. Radio Waves
Radio waves are commonly used for wireless communication over short to long distances.
Uses: Wi-Fi, Bluetooth, radio broadcasting, mobile phone networks, and satellite
communication.
Advantages:
o Can penetrate through walls and other obstacles.
o Suitable for both short-range (e.g., Bluetooth) and long-range communication (e.g.,
satellite).
Disadvantages:
o Prone to interference from other radio signals and electronic devices.
o Limited bandwidth for data transmission compared to fiber optics.
b. Microwaves
Microwave transmission uses high-frequency radio waves to transmit data over long
distances. It requires a line-of-sight between the transmitting and receiving antennas.
Types:
o Terrestrial Microwaves: Uses earth-based antennas to transmit data between two
points.
o Satellite Microwaves: Uses satellites as relay stations to transmit signals over vast
distances.
Advantages:
o High data transfer speeds.
Suitable for long-distance communications (e.g., satellite links, telecommunication
o
towers).
Disadvantages:
o Requires a clear line of sight between antennas.
o Prone to environmental disruptions like rain or fog (rain fade).
c. Infrared (IR)
Infrared uses light waves just below the visible spectrum to transmit data. It is used in devices
that require short-range, line-of-sight communication.
d. Bluetooth
Wi-Fi is a wireless networking technology that uses radio waves to provide high-speed
internet access and network connections over medium ranges (typically up to 100 meters).
Uses: Wireless LANs (Local Area Networks) in homes, offices, public places (e.g., airports,
cafes).
Advantages:
o High data transfer rates.
o Can connect multiple devices simultaneously without the need for cables.
Disadvantages:
o Signal degradation with distance and obstacles.
o Vulnerable to interference from other wireless devices and networks.
f. Satellites
Satellite communication uses satellites orbiting the Earth to transmit data over very long
distances.
Uses: Global communication services, GPS (Global Positioning System), satellite TV, and
internet in remote areas.
Advantages:
o Coverage in remote and rural areas where other transmission media cannot reach.
o Long-range communication over continents.
Disadvantages:
o High latency (delay) due to the large distance data must travel.
o Expensive setup and maintenance.
Transmission
Type Range Speed Cost Interference Use Cases
Medium
Short to
Moderate (up
Twisted-Pair medium (up Local area networks
Wired to 10 Gbps with Low High
Cable to 100 (LANs), telephones
Cat6/7 cables)
meters)
Short to
medium (up Moderate (up Cable TV, broadband
Coaxial Cable Wired Moderate Moderate
to 500 to 1 Gbps) internet
meters)
Satellite
Microwaves Wireless Long High High High communication,
long-distance links
Medium (up
Home and office
Wi-Fi Wireless to 100 High Moderate High
networks
meters)
Global
Very long
Satellite Wireless Moderate Very high High communication, GPS,
(global)
remote internet
Distance: Wired media like fiber optics are better for long distances, while wireless media
like Wi-Fi are suitable for short to medium distances.
Bandwidth: Fiber optics offer the highest bandwidth, followed by coaxial and twisted-pair
cables. Wireless media have lower bandwidth in comparison.
Cost: Twisted-pair cables are the cheapest, while fiber optics and satellite communication
are more expensive.
Interference: Fiber optics are immune to electromagnetic interference, while twisted-pair
and coaxial cables, as well as wireless media, are more susceptible.
Security: Wired media are generally more secure because physical access to the cables is
required to intercept data. Wireless media are more vulnerable to interception and require
encryption for security.
Transmission media play a crucial role in determining the efficiency, speed, and reliability of
communication networks. The choice of medium depends on factors like distance, data
requirements, cost, and environmental conditions.
Networking Devices- Networking devices are hardware components that are used to
connect computers, servers, and other electronic devices to create a network, enabling
communication and resource sharing among them. These devices facilitate data transfer,
network security, and the management of network traffic. They are essential for building,
maintaining, and optimizing a network, whether it’s a small home network or a large-scale
enterprise network.
A Network Interface Card (NIC) is a hardware component that allows a computer or device
to connect to a network.
Function: It acts as the interface between the device and the network by converting
data into a format that can be transmitted over the network (wired or wireless).
Types:
o Ethernet NIC: For wired networks.
o Wireless NIC: For wireless networks (Wi-Fi).
Use Case: Every device connected to a network requires a NIC to communicate with
other devices. Most modern devices have a built-in NIC.
2. Hub
A Hub is a basic networking device that connects multiple devices in a network and forwards
data to all the devices connected to it.
Function: It operates at the physical layer (Layer 1) of the OSI model and
broadcasts data it receives to all ports, regardless of the intended recipient.
Types:
o Active Hub: Amplifies the signal it receives.
o Passive Hub: Does not amplify the signal.
Disadvantages: Since a hub broadcasts data to all devices, it creates unnecessary
network traffic, which can lead to inefficiencies and slower communication.
Use Case: Hubs were used in older networks but have largely been replaced by
switches.
3. Switch
A Switch is a more advanced networking device that connects multiple devices and forwards
data only to the specific device (port) that the data is intended for.
Function: It operates at the data link layer (Layer 2) of the OSI model. It uses MAC
addresses to identify devices and forwards data to the appropriate port based on the
destination address.
Advantages:
o Reduces unnecessary network traffic compared to hubs.
o Improves network performance and efficiency.
Managed vs Unmanaged Switches:
o Managed Switch: Offers advanced features like VLAN support, port
mirroring, and traffic prioritization, and can be configured.
o Unmanaged Switch: Plug-and-play device without any configuration options.
Use Case: Switches are commonly used in both home and enterprise networks to
connect multiple devices, including computers, printers, and servers.
4. Router
A Router is a networking device that connects different networks and routes data between
them.
Function: It operates at the network layer (Layer 3) of the OSI model. Routers
determine the best path for data to travel from the source network to the destination
network using IP addresses.
Types:
o Wireless Router: Connects devices to the network using Wi-Fi.
o Wired Router: Uses cables (e.g., Ethernet) to connect devices.
Capabilities:
o Routers manage traffic between local networks (LANs) and wide area
networks (WANs), such as the internet.
o They can provide network security through features like firewalls, Network
Address Translation (NAT), and access control.
Use Case: Routers are essential in home and enterprise networks for connecting to the
internet and directing traffic between different network segments.
5. Modem
An Access Point (AP) is a device that creates a wireless local area network (WLAN) by
connecting wireless devices to a wired network.
Function: It acts as a bridge between wireless clients (e.g., laptops, smartphones) and
the wired network, allowing them to communicate with wired devices.
Types:
o Standalone Access Point: Operates independently and is manually
configured.
o Controller-based Access Point: Managed by a central controller, commonly
used in large networks like businesses or campuses.
Use Case: Access points are used in homes and businesses to provide Wi-Fi
connectivity in areas where wired connections are not feasible.
7. Gateway
A Gateway is a network device that acts as an entry and exit point in a network, allowing
communication between different networks, especially between a private network and the
public internet.
Function: It operates at multiple layers of the OSI model (typically at Layer 3 and
above). Gateways perform protocol translation to connect two different systems, such
as between IP networks and non-IP systems.
Use Case: Gateways are often used in large-scale networks where different network
architectures need to communicate with one another, and in home networks, the router
often acts as the gateway to the internet.
8. Bridge
A Bridge is a device that connects and filters traffic between two or more network segments.
Function: It operates at the data link layer (Layer 2) and forwards traffic only to the
segment where the destination device resides. This reduces unnecessary traffic and
improves efficiency.
Types:
o Transparent Bridge: Works without any configuration and automatically
forwards or filters traffic.
o Source Route Bridge: Uses the source routing information in data packets to
decide how to forward traffic.
Use Case: Bridges are used to divide large networks into smaller, more manageable
segments or to connect different types of media (e.g., wired and wireless segments).
9. Repeater
A Repeater is a device that regenerates or amplifies a signal to extend the distance over
which data can travel.
Function: It operates at the physical layer (Layer 1) and amplifies weak signals to
prevent data loss and degradation over long distances.
Types:
o Wired Repeater: Used to extend the range of wired network signals.
o Wireless Repeater: Used to extend the coverage area of a wireless network
(Wi-Fi).
Use Case: Repeaters are used in large networks to ensure data can travel longer
distances without signal degradation, such as in long Ethernet cables or Wi-Fi
networks.
10. Firewall
A Firewall is a network security device that monitors and controls incoming and outgoing
network traffic based on predetermined security rules.
Function: It operates at multiple layers of the OSI model and can filter traffic based
on IP addresses, ports, or application-level data.
Types:
o Hardware Firewall: A standalone device placed between the internal
network and the external network (internet).
o Software Firewall: A program installed on individual devices (e.g.,
computers) to protect them from threats.
Capabilities:
o Protects the network from unauthorized access, malware, and external attacks.
o Can implement rules for filtering traffic based on specific protocols, IP
addresses, or port numbers.
Use Case: Firewalls are used in both enterprise and home networks to provide
security by blocking unauthorized access and allowing legitimate traffic.
A Load Balancer is a device that distributes network or application traffic across multiple
servers to ensure no single server is overwhelmed by too many requests.
OSI
Device Function Key Use Case
Layer
Layer 1 & Used in all devices for
NIC Connects a device to a network
2 network access
Broadcasts data to all connected Rarely used today, replaced by
Hub Layer 1
devices switches
Forwards data to the specific Common in LANs for
Switch Layer 2
destination device connecting multiple devices
Routes data between different
Router Layer 3 Connects LANs to the internet
networks
Layer 1 & Converts digital signals to analog Connects homes and offices to
Modem
2 and vice versa the internet
Access Extends wireless coverage in
Layer 2 Provides wireless connectivity
Point networks
Connects different networks and Connects different network
Gateway Multiple
performs protocol translation architectures
Connects and filters traffic between Used to reduce traffic in large
Bridge Layer 2
network segments networks
Amplifies signals to extend Extends network distances
Repeater Layer 1
network range (wired or wireless)
Monitors and controls network Protects networks from
Firewall Multiple
traffic unauthorized access
Load Distributes network traffic across Ensures reliability and
Multiple
Balancer multiple servers performance in data centers
Proxy Acts as an intermediary for client Provides anonymity and
Layer 7
Server requests controls web traffic
These networking devices are essential for building, managing, and securing networks, and
their specific use depends on the size, complexity, and needs of the network environment.
HISTORY OF INTERNET- The history of the internet is a fascinating journey that
began as a small research project and has since evolved into a global system that connects
billions of devices and people. This development spans several decades and involves
multiple technologies, innovations, and collaborative efforts.
Concepts of Networking: The basic concept of networking began to take shape in the
1950s when researchers explored ways to link computers to share information. These early
networks were mainly focused on connecting computers for military and academic
purposes.
Packet Switching: Paul Baran and Donald Davies independently developed the idea of
packet switching in the early 1960s, a fundamental technology that breaks down data into
smaller packets for transmission across networks. This idea became the foundation for the
modern internet.
ARPA (Advanced Research Projects Agency): In 1958, the U.S. Department of Defense
created ARPA (later renamed DARPA). Its mission was to advance technological
innovations, particularly in military research.
ARPANET: ARPA initiated the development of ARPANET in 1966, the first packet-switching
network, which allowed computers to communicate with each other over long distances.
ARPANET is considered the direct precursor to the internet.
o In 1969, ARPANET established its first connections between the University of
California, Los Angeles (UCLA), Stanford Research Institute, UC Santa Barbara,
and University of Utah.
2. Growth and Development of Networking Technologies (1970s)
NCP (Network Control Protocol): In the early 1970s, ARPANET used NCP as its first
protocol to manage communication between computers.
TCP/IP (Transmission Control Protocol/Internet Protocol): In 1974, Vinton Cerf and
Robert Kahn proposed TCP/IP, a more robust set of protocols for transmitting data across
different types of networks. TCP/IP later became the fundamental communication protocol
of the internet, allowing disparate networks to interconnect seamlessly.
o TCP/IP was officially adopted by ARPANET in 1983, marking the birth of the
modern internet.
Email (1971): Ray Tomlinson invented email on ARPANET in 1971 by combining the idea of
sending messages between computers with the use of the "@" symbol to separate the
username and the domain name. Email quickly became the first killer app of the ARPANET
and eventually the internet.
Ethernet (1973): Robert Metcalfe developed Ethernet at Xerox PARC, a key technology
that enabled high-speed data transmission within local area networks (LANs).
CSNET (Computer Science Network): In 1979, the National Science Foundation (NSF)
created CSNET to connect university computer science departments, expanding ARPANET's
reach beyond military and government use.
Adoption of TCP/IP (1983): On January 1, 1983, ARPANET officially adopted TCP/IP as its
standard protocol, marking the transition to a modern, interconnected network of
networks. This day is often referred to as the official "birthday" of the internet.
Domain Name System (DNS) (1984): As the internet grew, the need for a more user-
friendly addressing system became apparent. DNS was created to convert domain names
(like "example.com") into IP addresses, allowing easier navigation of the internet.
NSFNET (1986): The National Science Foundation (NSF) launched NSFNET, a high-speed
backbone network that connected university networks across the U.S. It replaced
ARPANET as the main academic internet backbone and played a crucial role in the
development of the global internet.
Growth of Networks: Other networks like BITNET (used for academic email) and Fidonet
(used for bulletin boards) also began to emerge, creating a web of interconnected
networks.
Privatization of the Internet (1991-1995): In the early 1990s, the U.S. government allowed
the commercialization of the internet, leading to the creation of commercial ISPs (Internet
Service Providers) and domain registrations.
The Dot-Com Boom (mid-1990s): The 1990s saw the explosive growth of the World Wide
Web, with businesses, news outlets, and entertainment companies establishing online
presences. Companies like Amazon, eBay, and Yahoo! were founded during this time,
leading to the dot-com boom, which was fueled by the excitement over internet-related
businesses.
Search Engines: As the web grew, search engines like Yahoo! (1994), AltaVista (1995), and
Google (1998) were created to help users find information. Google’s innovative algorithm
(PageRank) quickly made it the most popular search engine.
Web Browsers: Netscape Navigator became the dominant browser in the mid-1990s, but
Internet Explorer, launched by Microsoft in 1995, gained dominance after being bundled
with the Windows operating system.
Social Media Platforms (2000s): The early 2000s saw the emergence of social media
platforms like MySpace (2003), Facebook (2004), YouTube (2005), Twitter (2006), and
later platforms like Instagram (2010) and TikTok (2016). These platforms transformed the
internet into a space for social interaction, user-generated content, and mass
communication.
Web 2.0 (mid-2000s): The term Web 2.0 refers to the transition from static web pages to
more dynamic, user-interactive websites that allow for social networking, collaboration,
and sharing. Technologies like AJAX and JavaScript enabled the development of interactive
web applications (e.g., Google Maps, Wikipedia).
Smartphones and Mobile Internet: The launch of the iPhone in 2007, followed by the rise
of Android, shifted internet usage towards mobile devices. The development of mobile
apps and responsive web design allowed for seamless access to the internet on
smartphones and tablets.
Cloud Computing (2010s): Cloud services like Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud allowed businesses to move their infrastructure to the cloud,
providing scalable and cost-efficient computing resources.
IoT (Internet of Things): The proliferation of smart devices and sensors connected to the
internet (e.g., smart homes, wearable devices) created a new dimension of the internet,
allowing for real-time data collection and automation in various industries.
Streaming Services: The rise of platforms like Netflix, Spotify, YouTube, and Twitch in the
2010s revolutionized how people consumed media, shifting from traditional TV and radio
to on-demand, internet-based services.
History of Networking- The history of the internet is a fascinating journey that began
as a small research project and has since evolved into a global system that connects billions
of devices and people. This development spans several decades and involves multiple
technologies, innovations, and collaborative efforts.
Concepts of Networking: The basic concept of networking began to take shape in the
1950s when researchers explored ways to link computers to share information. These early
networks were mainly focused on connecting computers for military and academic
purposes.
Packet Switching: Paul Baran and Donald Davies independently developed the idea of
packet switching in the early 1960s, a fundamental technology that breaks down data into
smaller packets for transmission across networks. This idea became the foundation for the
modern internet.
NCP (Network Control Protocol): In the early 1970s, ARPANET used NCP as its first
protocol to manage communication between computers.
TCP/IP (Transmission Control Protocol/Internet Protocol): In 1974, Vinton Cerf and
Robert Kahn proposed TCP/IP, a more robust set of protocols for transmitting data across
different types of networks. TCP/IP later became the fundamental communication protocol
of the internet, allowing disparate networks to interconnect seamlessly.
o TCP/IP was officially adopted by ARPANET in 1983, marking the birth of the
modern internet.
Email (1971): Ray Tomlinson invented email on ARPANET in 1971 by combining the idea of
sending messages between computers with the use of the "@" symbol to separate the
username and the domain name. Email quickly became the first killer app of the ARPANET
and eventually the internet.
Ethernet (1973): Robert Metcalfe developed Ethernet at Xerox PARC, a key technology
that enabled high-speed data transmission within local area networks (LANs).
CSNET (Computer Science Network): In 1979, the National Science Foundation (NSF)
created CSNET to connect university computer science departments, expanding ARPANET's
reach beyond military and government use.
Adoption of TCP/IP (1983): On January 1, 1983, ARPANET officially adopted TCP/IP as its
standard protocol, marking the transition to a modern, interconnected network of
networks. This day is often referred to as the official "birthday" of the internet.
Domain Name System (DNS) (1984): As the internet grew, the need for a more user-
friendly addressing system became apparent. DNS was created to convert domain names
(like "example.com") into IP addresses, allowing easier navigation of the internet.
NSFNET (1986): The National Science Foundation (NSF) launched NSFNET, a high-speed
backbone network that connected university networks across the U.S. It replaced
ARPANET as the main academic internet backbone and played a crucial role in the
development of the global internet.
Growth of Networks: Other networks like BITNET (used for academic email) and Fidonet
(used for bulletin boards) also began to emerge, creating a web of interconnected
networks.
Invention of the Web (1989-1990): In 1989, Tim Berners-Lee, a British scientist working at
CERN (European Organization for Nuclear Research), proposed the World Wide Web
(WWW), a system for linking documents using hypertext. He created the first web server,
web browser (WorldWideWeb), and web page in 1990.
HTML and HTTP: Berners-Lee developed HTML (HyperText Markup Language) and HTTP
(HyperText Transfer Protocol), key technologies that form the foundation of the web. His
vision was to create an easy-to-use, global information-sharing platform.
First Web Browser: In 1993, the first popular graphical web browser, Mosaic, was
released, developed by Marc Andreessen and his team at the National Center for
Supercomputing Applications (NCSA). Mosaic made the web accessible to the general
public and played a key role in popularizing the internet.
Privatization of the Internet (1991-1995): In the early 1990s, the U.S. government allowed
the commercialization of the internet, leading to the creation of commercial ISPs (Internet
Service Providers) and domain registrations.
The Dot-Com Boom (mid-1990s): The 1990s saw the explosive growth of the World Wide
Web, with businesses, news outlets, and entertainment companies establishing online
presences. Companies like Amazon, eBay, and Yahoo! were founded during this time,
leading to the dot-com boom, which was fueled by the excitement over internet-related
businesses.
Search Engines: As the web grew, search engines like Yahoo! (1994), AltaVista (1995), and
Google (1998) were created to help users find information. Google’s innovative algorithm
(PageRank) quickly made it the most popular search engine.
Web Browsers: Netscape Navigator became the dominant browser in the mid-1990s, but
Internet Explorer, launched by Microsoft in 1995, gained dominance after being bundled
with the Windows operating system.
Social Media Platforms (2000s): The early 2000s saw the emergence of social media
platforms like MySpace (2003), Facebook (2004), YouTube (2005), Twitter (2006), and
later platforms like Instagram (2010) and TikTok (2016). These platforms transformed the
internet into a space for social interaction, user-generated content, and mass
communication.
Web 2.0 (mid-2000s): The term Web 2.0 refers to the transition from static web pages to
more dynamic, user-interactive websites that allow for social networking, collaboration,
and sharing. Technologies like AJAX and JavaScript enabled the development of interactive
web applications (e.g., Google Maps, Wikipedia).
Smartphones and Mobile Internet: The launch of the iPhone in 2007, followed by the rise
of Android, shifted internet usage towards mobile devices. The development of mobile
apps and responsive web design allowed for seamless access to the internet on
smartphones and tablets.
Cloud Computing (2010s): Cloud services like Amazon Web Services (AWS), Microsoft
Azure, and Google Cloud allowed businesses to move their infrastructure to the cloud,
providing scalable and cost-efficient computing resources.
IoT (Internet of Things): The proliferation of smart devices and sensors connected to the
internet (e.g., smart homes, wearable devices) created a new dimension of the internet,
allowing for real-time data collection and automation in various industries.
Streaming Services: The rise of platforms like Netflix, Spotify, YouTube, and Twitch in the
2010s revolutionized how people consumed media, shifting from traditional TV and radio
to on-demand, internet-based services.