Networks
Networks
COMPUTER NETWORKS:
Network:
“Interconnected connection of autonomous computers is called as network”.
(or)
“It is a collection of computers and terminal devices connected together by a
communication system”
Goals and Advantages:
Data can be exchanged: By connecting the computers together, we can share
the data from different sources.
Sharing of resources: We can share the resources like printer, scanner and
other external devices.
Provides backup: If one system is corrupted, the information in that system will
not be available. In such cases, we can get the backup of the same information
from other systems.
Provides flexible environment:
By connecting systems together, we can have a flexible environment and we
can work from home.
Disadvantages are:
It is Expensive to install
If file server fails network fails
Cable used may have breakage and disturb the network
ARPANET
Advanced Research Projects Agency Network (ARPANET) of the U.S. Department
of Defense.
The ARPANET was designed in the 1960s so as to develop new bombproof,
distributed packet-switching network technology. It got its name from the
provider of the funds, the Advanced Research Projects Agency (ARPA).
During the 1970s, the ARPANET grew to connect research institutes and
laboratories supported by the Department of Defense in various parts of the USA.
Many of these were university laboratories studying data processing and
computer networks, which developed the TCP/IP network and its applications for
the Internet. Finally in 1990, with everyone having gone over to using the newer,
networking concepts 1
faster Internet backbone network, the original ARPANET with its network address
10.0.0.0 was shut down.
The physical layer is concerned with transmitting raw bits over a communication
channel.
The main task of the link layer is to take a raw transmission facility and transform it
into a line that appears free of undetected transmission errors to the network layer.
The network layer, acts to route the communications through the various
communication resources to the other end
networking concepts 2
The basic function of the transport layer is to accept data from the session layer,
split it up into smaller units if need be,
The session Layer must manage and synchronize conversations between two
different applications. Session can allow traffic to go in both direction at the same
time, or in only one direction at a time.
Makes sure that the information is delivered in a form that the receiving system can
understand and use.
The top of the model is the application layer, layer 7, which provides for the
manipulation of information in various ways.
TCP/IP
TCP (Transmission Control Protocol) and IP (Internet Protocol) are two different
procedures that are often linked together.
The linking of several protocols is common since the functions of different protocols
can be complementary so that together they carry out some complete task.
The combination of several protocols to carry out a particular task is often called a
"stack" because it has layers of operations.
the term "TCP/IP" is normally used to refer to a whole suite of protocols, each with
different functions. This suite of protocols is what carries out the basic operations of
the Web.
TCP/IP is also used on many local area networks.
When information is sent over the Internet, it is generally broken up into smaller
pieces or "packets". The use of packets facilitates speedy transmission since different
parts of a message can be sent by different routes and then reassembled at the
destination. It is also a safety measure to minimize the chances of losing information
in the transmission process.
TCP is the means for creating the packets, putting them back together in the correct
order at the end, and checking to make sure that no packets got lost in transmission.
If necessary, TCP will request that a packet be resent.
HTTP
networking concepts 3
Web pages are constructed according to a standard method called Hypertext Markup
Language (HTML).
An HTML page is transmitted over the Web in a standard way and format
known as Hypertext Transfer Protocol (HTTP). This protocol uses TCP/IP to
manage the Web transmission.
A Web page using this protocol will have https: at the front of its URL.
FTP
File Transfer Protocol (FTP) lives up to its name and provides a method for copying
files over a network from one computer to another.
Slip
The Serial Line Internet Protocol (also SLIP) is an encapsulation of the Internet
Protocol designed to work overserial ports and modem connections. It is
documented in RFC 1055.
On personal computers, SLIP has been largely replaced by the Point-to-Point
Protocol (PPP), which is better engineered, has more features and does not
require its IP address configuration to be set before it is established.
On microcontrollers, however, SLIP is still the preferred way of encapsulating IP
packets due to its very small overhead.
networking concepts 4
PPP (Point-to-Point Protocol):
PPP uses the Internet protocol (IP). It is sometimes considered a member of the
TCP/IP suite of protocols.
Relative to the Open Systems Interconnection (OSI) reference model.
PPP provides layer 2 (data-link layer) service.
Essentially, it packages your computer's TCP/IP packets and forwards them to the
server where they can actually be put on the Internet.
INTERNET
Internet is a global connection of systems around the globe.
Internet can be defined as Network of Networks
Nodes:
The computers that are attached to a network and are seeking to share the resources
of the Network.
Servers
Server is a centralized system that stores entire organization database.
networking concepts 5
Metropolitan Area Network {MAN}
Features:
Transmission rate are higher than WAN as it is small and distance is
small.
Transmission error are less
LAN is owned by single organization
Cost of transmission is negligible
Features:
networking concepts 6
Communication cost is more because it makes use of telephone lines,
leased lines and satellite communication.
Features:
Topologies:
networking concepts 7
“The geometrical arrangement of computer resources, remote devices and
communication facilities
is defined as topology”
In this topology, all the nodes are connected to a common straight cable.
All the nodes
{computers} share the common bus. This topology is reliable because
failure of any system does
not affect the bus.
Star network:
In this network, each computer is connected directly to the central computer.
All the communications between computers have to pass through the central
computer.
Ring network:
In a ring network, all the computers are connected to a common cable,
the cable starts and ends at the network server. The communications are always in
one direction and data transfers through each computer in the ring. The
networking concepts 8
disadvantage of this network is when a computer fails; the entire system halts until
the system gets ready.
The network looks like this,
As in the conventional star network, individual nodes may thus still be isolated from
the network by a single-point failure of a transmission path to the node. If a link
connecting a leaf fails, that leaf is isolated; if a connection to a non-leaf node fails, an
entire section of the network becomes isolated from the rest.
In order to alleviate the amount of network traffic that comes from broadcasting
everything everywhere, more advanced central nodes were developed that would
keep track of the identities of different systems connected to the network. These
networking concepts 9
network switches will "learn" the layout of the network by first broadcasting data
packets everywhere, then observing where response packets come from.
In this topology, the nodes are connected in an arbitrary fashion.A link may or may
not connect two or more nodes. There may be multiple links also. It is not necssary
that all nodes are connected. If a path can be established in two nodes via one or
more links, it is called a connected graph.
1.Twisted pair (UTP and STP) cable: Twisted pair is of two types shielded and
unshielded.
Unshielded is most popularly used. The UTP cable has four pairs of wires
inside which are twisted with each other. UTP is categorized into five types ie
category1 (cat 1) to category 5(cat 5).RJ-45 connector is most popular connector in
UTP. A disadvantage of UTP is that it may be easily affected by radio or television
signals. Shielded cables are suitable for electrical environments. In networks
more often used for Token ring topology
2. Coaxial cable: This type of cable has a single copper conductor at its center
covered by a plastic layer, which provides insulation between the center
conductor and a braided metal shield. This covering helps to block any outer
disturbance to the signal.
networking concepts 10
3.Fiber Optic cable: Fiber optic cabling consists of a center glass core
surrounded by
several layers of protective materials. It transmits light rather than electronic
signals.
Infrared
Infrared technology allows computing devices to communicate via short-range
wireless signals. With infrared, computers can transfer files and other digital
data bidirectional.
The infrared transmission technology used in computers is similar to that used
in consumer product remote control units.
Infrared communications is archived by the use of
transmitters/receivers(transceivers)that modulate noncoherent infrared light.
Transceivers must be within the line of sight of each other either directly or via
reflection from a light-colored surface
Laser
Laser transmission requires direct line – of –sight. it is a unidirectional like
microwave
networking concepts 11
The laser transmission requires the use of a laser transmitter and a photo-
sensitive receiver at each end.
The laser transmission is point to point transmission, typically between
buildings.
The laser transmission is affected by weather.
Transmission/switching techniques:
Circuit Switching:
Circuit switching is a connection technique that directly connects the sender
and receiver in an unbroken path.
A dedicated path is activated between both ends when the communication
starts and deactivated as soon as the communication is ended.
The computer that wants to transfer data will ask for a connection to
thedestination device before it starts communicating, as the destination
device agrees then a dedicated path is allotted to them.
Message Switching:
In this, there is no need to establish a dedicated path between sender and
receiver.
The sender with a destination address through the network sends a message.
Each and every system in that network receives the entire message, stores it
briefly and then transmits to next system. This is carried until it reaches the
destination. This type of network is sometimes called as store-and-forward
network.
Packet switching:
Packet switching is a combination of both message and circuit switching. It
adopts advantages of both techniques and tries to demolish the
disadvantages.
A message is broken into small parts, called packets. Each packet is tagged with
source and destination addresses. Packets take different possible paths
through the network to reach thedestination. To avoid the problem in
disorder of packets sequence number is also appended to the packet.
Communication modes:
networking concepts 12
Depending on type of media used, modes of communication is
divided as Simple, half-duple and full duplex.
Simplex:
On simplex channel, only one interface is a transmitter and every other
interface is a receiver. So in this the transmitter cannot receive information
and the receiver cannot transmitted: television, radio
Half-Duplex:
On half duplex channel each interface acts as both transmitter and
receiver but only one interface can transmit data at a time. Ex: walkie-
talkie
Full-Duplex:
A full duplex channel has two ends, each serving as both transmitter and
receiver. I.e. in this, both can transmit and receive data at the same time.
Network Devices :
Modem
The device which is used to convert data from digital to analog and vice versa is
called modem. It transforms a digital bit stream into an analog signal(modulator) and
vice versa (demodulator) .
Ethernet Card
The computers that are part of Ethernet have to install a special card known as
Ethernet card. An Ethernet card contains connections for either coaxial or twisted
pair cables. If it is designed for coaxial cable, the connection is BNC. If it is designed
for twisted pair, the connection is RJ-45 connection. Ethernet cards are purchased
separately from a computer, but now-a-days many computers include an option for a
pre-installed Ethernet card.
RJ45 Connector
Network devices require connectors for linking. Connectors are of two types-
male(the plug) and female(the receptable). Each wire in a cable is attached to one
conductor (or pin) in the connector. RJ45 Connector is one such most frequently
used plug having eight conductors, one for each wire of four twisted pairs.
Hub
A hub is a hardware device used to connect several computers together. Hubs can be
either passive or active. Passive hubs allow the signal to pass from one computer to
another without any change. Active hubs electrically amplify the signal as it moves
from one connected device to another.
Switch
networking concepts 13
Switches increase network performance by decreasing the amount of extraneous
traffic on individual network segments attached to the switch. They also filter packets
a bit like a router does.
When a packet arrives, the header is checked to determine which segment the
packet is destined for, and then its forwarded to that segment.If the packet is
destined for the same segment that it arrives on, thepacket is dropped and not
retransmitted. This prevents the packet being"broadcasted" onto unnecessary
segments, reducing the traffic.
Network Repeater
Bridge
A bridge reads the outermost section of data on the data packet, to tell where
the message is going.
It reduces the traffic on other network segments, since it does not send all
packets. Bridges can be programmed to reject packets from particular
networks.
Bridging occurs at the data link layer of the OSI model, which means the bridge
cannot read IP addresses, but only the outermost hardware address of the
packet.
In our case the bridge can read the Ethernet data which gives the hardware
address of the destination address, not the IP address.
Bridges forward all broadcast messages. Only a special bridge called a
translation bridge will allow two networks of different architectures to be
connected.
networking concepts 14
Bridges do not normally allow connection of networks with different
architectures. The hardware address is also called the MAC (media access
control) address.
Network Router
Gateway
A network gateway is an internetworking system capable of joining
together two networks that use different base protocols.
A network gateway can be implemented completely in software,
completely in hardware, or as a combination of both.
Depending on the types of protocols they support, network gateways
can operate at any level of the OSI model.
networking concepts 15
One very common example is the use of a localized browser product in a local
area network (LAN), where the router takes what used to be a cabled
interaction and makes it wireless.
Other kinds of wireless networks called wide area networks (WAN) can even
use components of 3G or 4G wireless systems made specifically for mobile
devices, but that doesn’t mean that the devices on these networks are mobile.
wireless system provides a fixed or portable endpoint with access to a
distributed network
Mobile Technology:
Mobile technology is a word that is commonly used to describe portable
devices.
A mobile device is one that is made to be taken anywhere. Therefore, it needs
an internal battery for power, and must be connected to a modern mobile
network that can help it to send and receive data without attaching to a
hardware infrastructure.
Mobile and wireless systems really accomplish two very different things
a mobile system offers all of the resources of that distributed network to
something that can go anywhere, barring any issues with local reception or
technical area coverage.
GSM
GSM stands for Global System for Mobile Communication and is an open,
digital cellular technology used for transmitting mobile voice and data services.
The GSM makes use of narrowband Time Division Multiple Access
(TDMA) technique for transmitting signals.
The GSM was developed using digital technology. It has an ability to carry 64
kbps to 120 Mbps of data rates.
Presently GSM supports more than one billion mobile subscribers in more than
210 countries throughout the world.
The GSM provides basic to advanced voice and data services including Roaming
service. Roaming is the ability to use your GSM phone number in another GSM
network.
SIM Card
A Subscriber Identity Module (SIM) card is a portable memory chip used mostly
in cell phones that operate on the Global System for Mobile Communications
(GSM) network.
Each card has a unique number printed on the microchip, which the carrier
needs to activate it. In most cases, the phone's owner can go either to the
networking concepts 16
carrier's website and enter this number in the appropriate tool or call the
service provider directly from another phone to get it turned on.
SIM cards are tied to a particular carrier and can only be used with a service
plan from that carrier.
These cards hold the personal information of the account holder, including his
or her phone number, address book, text messages, and other data.
CDMA
CDMA or Code Division Multiple Access is a form of access scheme that has
been widely used within 3G cellular telecommunications systems as well as
being used in a number of other technologies as well.
Wireless in Local Loop (WiLL), on the other hand, is meant to serve subscribers
at homes or offices.
The telephone provided must be atleast as good as wired phone. Its voice
quality must be high -- a subscriber carrying out long conversation must not be
irritated with quality; one must be able to use speakerphones, cordless phones
and parallel phones. The telephone must support fax and modem
communications and should be connectable to a Public Call Office.
Ability to provide atleast medium rate Internet access is a must. Further, the
traffic supported should be reasonably high � at least as high as 0.1E per
subscriber.
Besides, ability to support a large number of subscribers in an urban area
(large teledensity) with a limited frequency spectrum is required.
Finally, for the systems to be of use in developing countries, the cost of
providing this wireless access should be less than that required for wired
telephone. Air-time charges are totally unacceptable.
GPRS
networking concepts 17
General Packet Radio Service (GPRS) is a packet-data technology that allows
GSM operators to launch wireless data services, such as e-mail and Internet
access.
As a result, GPRS provides operators with the ability to use data to drive
additional revenue.
GPRS is often called a 2.5G technology because it is a GSM operator's first step
toward third generation (3G) and a first step in wireless data services.
GPRS supports peak download data rates of up to 115 kbps, with average
speeds of 40 to 50 kbps, which is comparable to other 2.5G technologies,
GPRS is the most widely supported packet-data wireless technology in the
world.
Like GSM, GPRS supports international roaming so customers can access data
services whether they are at home or abroad.
When users travel to areas that have not yet been upgraded to GPRS, they still
can access many data services via circuit-switched GSM.
1G
First generation refers to the analog “brick phones” and “bag phones” as they
were first introduced for mobile cellular technology.
Cell phones began with 1G and signify first generation wireless analog
technology standards that originated in the 1980s.
1G was replaced by 2G wireless digital standards.
2G
2G signifies second generation wireless digital technology.
Fully digital 2G networks have replaced analog 1G, which originated in the
1980s.
2G networks first commercially began on the Global System for Mobil
Communications, or GSM, standard. 2G on GSM standards was first used in
commercial practice in 1991 by Radiolinja, a Finnish GSM operator that was
founded on September 19, 1988.
Radiolinja is now part of Elisa, which was known in the 1990s as the Helsinki
Telephone Company.
In addition to the GSM protocol, 2G also utilizes various other digital protocols,
including CDMA, TDMA, iDEN and PDC. GSM is based on TDMA.
2.5 g
2.5G wireless technology is a stepping stone that bridged 2G to 3G wireless
technology and is sometimes used to describe those evolved technologies that
were first considered as being 2G.
networking concepts 18
While 2G and 3G have been officially defined as wireless standards by the
International Telecommunication Union (ITU), 2.5G has not been defined and was
created only for the purposes of marketing.
3G
3G is the third generation of mobile phone standards and technology.
3G supersedes 2G technology and precedes 4G technology.
Current 3G systems have been established through ITU’s project on
International Mobile Telecommunications 2000 (IMT-2000).
4G
4G is the term used to refer to the fourth generation of mobile wireless
services that has been defined by the ITU and its Radio communication Sector
(ITU-R) and established as an agreed upon and globally accepted definition in
IMT-Advanced.
5G
5G Technology stands for 5th Generation Mobile technology.
5G mobile technology has changed the means to use cell phones within very
high bandwidth. User never experienced ever before such a high value
technology.
Nowadays mobile users have much awareness of the cell phone (mobile)
technology.
The 5G technologies include all type of advanced features which makes 5G
mobile technology most powerful and in huge demand in near future.
5G Technology offers
5G technology going to be a new mobile revolution in mobile market.
Through 5G technology now you can use worldwide cellular phones and this
technology also strike the china mobile market and a user being proficient to
get access to Germany phone as a local phone.
With the coming out of cell phone alike to PDA now your whole office in your
finger tips or in your phone.
5G technology has extraordinary data capabilities and has ability to tie
together unrestricted call volumes and infinite data broadcast within latest
mobile operating system.
5G technology has a bright future because it can handle best technologies and
offer priceless handset to their customers.
networking concepts 19
5G Technologies have an extraordinary capability to support Software and
Consultancy.
The Router and switch technology used in 5G network providing high
connectivity.
The 5G technology distributes internet access to nodes within the building and
can be deployed with union of wired or wireless network connections.
Features of 5G Technology
5G technology offer high resolution for crazy cell phone user and bi-directional
large bandwidth shaping.
The advanced billing interfaces of 5G technology makes it more attractive and
effective.
5G technology also providing subscriber supervision tools for fast action.
The high quality services of 5G technology based on Policy to avoid error.
5G technology is providing large broadcasting of data in Gigabit which
supporting almost 65,000 connections.
5G technology offer transporter class gateway with unparalleled consistency.
The traffic statistics by 5G technology makes it more accurate.
Through remote management offered by 5G technology a user can get better
and fast solution.
The remote diagnostics also a great feature of 5G technology.
The 5G technology is providing up to 25 Mbps connectivity speed.
The 5G technology also support virtual private network.
The new 5G technology will take all delivery service out of business prospect
The uploading and downloading speed of 5G technology touching the peak.
The 5G technology network offering enhanced and available connectivity just
about the world
Applications in Network
WI-FI
Wi-Fi, or Wireless Fidelity, is a wireless local area network (WLAN) technology
based on the Institute of Electrical and Electronics Engineers
Wi-Fi signals have a range of about 200 to 300 feet, while cellular GSM signals
can travel for several miles.
Wi-Fi also uses unlicensed spectrum, so unlike GSM, it has no inherent
protection from interference.
Wi-Fi is used for a variety of applications. One of the most common is home
and business Wireless Local Area Networks (WLANs).
WIFI Hotspots
networking concepts 20
A hotspot is a physical location that offers Internet access over a wireless local
area network (WLAN) through the use of a router connected to a link to
an Internet service provider.
Hotspots typically use Wi-Fi technology.
Hotspots may be found in coffee shops and various other public
establishments in many developed urban areas throughout the world.
A hotspot is differentiated from a wireless access point, which is the hardware
device used to provide the wireless network service.
WI Max
WiMAX is a unique technology being deployed by BSNL for the first time in
India.
This technology provides fixed as well as fully mobile high speed broadband
connectivity alongwith roaming feature.
It provides users a thrilling Internet browsing experience.
NetworK Security
Network Security is an organization’s strategy and provisions for ensuring the
security of its assets and of all network traffic.
Network security is manifested in an implementation of security policy,
hardware, and software
Network security involves the authorization of access to data in a network,
which is controlled by the network administrator.
Users choose or are assigned an ID and password or other authenticating
information that allows them access to information and programs within their
authority.
Network security covers a variety of computer networks, both public and
private, that are used in everyday jobs conducting transactions and
communications among businesses, government agencies and individuals.
Networks can be private, such as within a company, and others which might be
open to public access.
Network security is involved in organizations, enterprises, and other types of
institutions.
It does as its title explains: It secures the network, as well as protecting and
overseeing operations being done.
The most common and simple way of protecting a network resource is by
assigning it a unique name and a corresponding password.
PROTECTION Methods
Cookies
networking concepts 21
Cookiesis a small piece of data sent from a website and stored in a user's web
browser while the user is browsing that website.
Every time the user loads the website, the browser sends the cookie back to
the server to notify the website of the user's previous activity.
Cookies were designed to be a reliable mechanism for websites to
remember statefulinformation or to record the user's browsing activity .
Cyber Law
Cyber law is a term used to describe the legal issues related to use of
communications technology, particularly “cyberspace”, i.e. the Internet
VIRUSES
Virus is a computer program that is designed to replicate itself by copying itself
into the other programs stored in a computer.
Types of Viruses
File viruses either infect executables in various ways or create file doubles,
or use file system specific features.
Boot viruses either save themselves in disk boot sector, or to the Master
Boot Record, or change the pointer to an active boot sector.
Macro viruses infect document files, electronic spreadsheets and
databases of several popular software packages.
Network viruses use protocols and commands of computer network or
email to spread themselves.
Virus Prevention
Install quality antivirus
Install real-time anti-spyware protection
Perform daily scans
Don't click on email links or attachments
Use a hardware-based firewall
Deploy DNS protection
networking concepts 22