Untitled Document (2)
Untitled Document (2)
www.
The World Wide Web (WWW) is a system of interlinked web pages and resources accessed via
the Internet. It was invented by Tim Berners-Lee in 1989 while working at CERN. The web
allows users to browse, share, and interact with information through web browsers like Chrome,
Firefox, and Edge. It operates using the Hypertext Transfer Protocol (HTTP) and is built on
technologies such as HTML (Hypertext Markup Language), CSS (Cascading Style Sheets),
and JavaScript.
Web pages are stored on servers and identified by Uniform Resource Locators (URLs). Users
can navigate through hyperlinks, which connect different web pages. Initially, the web was static,
but advancements led to Web 2.0, which introduced dynamic content, social media, and user
interaction. The latest evolution, Web 3.0, focuses on decentralization, blockchain, and artificial
intelligence.
TCP/ IP
○ Data is broken into segments, each with a sequence number for ordering.
○ The receiver acknowledges received segments. If a packet is lost, TCP
retransmits it.
3. Error Checking & Flow Control
Layers of TCP/IP
1. Network Access Layer – Handles physical hardware and data transmission over different
types of networks (e.g., Ethernet, Wi-Fi).
2. Internet Layer – Uses IP (Internet Protocol) to define unique addresses (IPv4/IPv6) and
route data packets between devices across networks.
Advantages of TCP/IP
1. Reliable Communication – Ensures accurate and ordered data delivery with error checking
and retransmission.
2. Scalability – Can handle large and complex networks, making it suitable for global internet
use.
5. Fault Tolerance – Can reroute data if network paths fail, ensuring continuous
communication.
6. Supports Multiple Protocols – Works with HTTP, FTP, SMTP, and more for various
applications.
7. Modular Architecture – The layered design allows easy troubleshooting and protocol
upgrades.
8. Wide Adoption – The backbone of the internet and most private networks.
Challenges of TCP/IP
3. Scalability Issues – While TCP/IP is scalable, IPv4's limited address space led to
exhaustion, requiring the transition to IPv6, which is still not universally adopted.
5. Network Congestion – TCP’s congestion control mechanism can slow down
performance in high-traffic networks, impacting speed and efficiency.
6. Lack of Built-in Quality of Service (QoS) – TCP/IP does not prioritize traffic types
(e.g., video calls vs. emails), which can affect performance in multimedia applications.
8. Fragmentation Issues – Large data packets may be fragmented across different
networks, increasing reassembly complexity and potential delays.
9. Compatibility Issues – Some legacy systems and network devices may not fully
support newer TCP/IP advancements, requiring upgrades.
Despite these challenges, TCP/IP remains the foundation of modern networking due to its
reliability, flexibility, and widespread adoption.
Web browser
A web browser is a software application that allows users to access and interact with websites
on the internet. It retrieves information from web servers and displays it in a readable format,
typically as web pages. Browsers support various technologies like HTML, CSS, and JavaScript
to present content and enable functionality.
Popular web browsers include Google Chrome, Mozilla Firefox, Microsoft Edge, Apple
Safari, and Opera. They provide features like bookmarks, tabs, private browsing, and
extensions to enhance user experience.
Web browsers use URLs (Uniform Resource Locators) to locate web pages and protocols like
HTTP and HTTPS for secure communication. They also cache data to improve loading speeds
and support plug-ins for added functionality.
Modern browsers emphasize security and privacy, offering protections against malware,
phishing, and tracking. They are essential tools for accessing online information,
communicating, shopping, and entertainment in today's digital world.
Transmission Media
Transmission media refer to the channels through which data is transmitted from one device to
another. They can be broadly classified into two types:
Advantages:
✔ Inexpensive and widely available
✔ Easy to install and maintain
✔ Suitable for short-distance communication
Disadvantages:
✘ Prone to electromagnetic interference (EMI)
✘ Limited bandwidth compared to fiber optics
✘ Shorter transmission distance
b) Coaxial Cable
Has a central conductor, insulating layer, metallic shield, and outer cover.
Advantages:
✔ Better resistance to EMI than twisted pair
✔ Supports higher bandwidth and longer distances
✔ Commonly used in cable TV and broadband networks
Disadvantages:
✘ More expensive than twisted pair
✘ Harder to install and maintain
✘ Signal loss over long distances
Advantages:
✔ Extremely high-speed data transmission
✔ Immune to electromagnetic interference
✔ Supports long-distance communication
✔ More secure than copper cables
Disadvantages:
✘ Expensive installation and maintenance
✘ Fragile and difficult to repair
✘ Requires special equipment for installation
a) Radio Waves
Advantages:
✔ Can cover large areas without cables
✔ Easy to install and expand
✔ Supports mobile communication
Disadvantages:
✘ Prone to interference and signal degradation
✘ Security issues (can be intercepted)
✘ Limited bandwidth
b) Microwaves
Advantages:
✔ High data transmission speed
✔ Suitable for long-distance communication
✔ Less physical infrastructure needed
Disadvantages:
✘ Affected by weather conditions (rain, fog)
✘ Requires line-of-sight communication
✘ Expensive setup
Advantages:
✔ Low power consumption
✔ Secure communication over short distances
✔ No interference from radio waves
Disadvantages:
✘ Limited range and requires direct line of sight
✘ Slow data transfer speed compared to Wi-Fi
✘ Cannot penetrate obstacles
E-mail
Electronic Mail (E-Mail) in Detail
Electronic mail (e-mail) is a digital communication method that allows users to send and receive
messages over the internet. It is one of the most widely used forms of communication in both
personal and professional settings.
E-mails are transmitted using a client-server model. The sender composes a message using an
e-mail client (e.g., Gmail, Outlook), which is then sent to the recipient’s mail server via the
Simple Mail Transfer Protocol (SMTP). The recipient's e-mail client retrieves the message using
protocols like Post Office Protocol (POP3) or Internet Message Access Protocol (IMAP).
Components of an E-Mail
1. Sender & Recipient – The person who sends the e-mail and the person(s) receiving it.
2. Subject Line – A brief summary of the email’s content.
3. Body – The main content of the e-mail, which may include text, images, or attachments.
4. Attachments – Files such as documents, images, or videos that can be sent along with
the e-mail.
5. CC & BCC – Carbon Copy (CC) sends a copy to additional recipients, while Blind
Carbon Copy (BCC) hides other recipients’ addresses.
Advantages of E-Mail
Disadvantages of E-Mail
● Spam & Phishing – Unwanted messages and fraudulent scams are common.
● Security Risks – Sensitive information can be hacked if not encrypted.
● Overload – Managing large volumes of e-mails can be challenging.
E-mail remains a fundamental tool for communication, collaboration, and information exchange
in modern life.
FTP operates using a client-server model. The client connects to the FTP server using
software like FileZilla, WinSCP, or command-line tools. The connection can be
established in two modes:
1. Active Mode – The client opens a port and waits for the server to establish a
connection.
2. Passive Mode – The client requests the server to open a port for communication,
which is useful when firewalls restrict incoming connections.
1. Anonymous FTP – Allows public access without requiring login credentials.
2. Authenticated FTP – Requires a username and password for secure access.
3. Secure FTP (SFTP & FTPS) – Uses encryption (SSL/TLS or SSH) to enhance
security.
Advantages of FTP
Disadvantages of FTP
FTP remains a widely used protocol for web development, data backup, and file sharing,
though secure alternatives like SFTP and cloud storage are increasingly popular.
Internet Relay Chat (IRC)
Internet Relay Chat (IRC) is a text-based communication protocol that enables real-time
messaging over the internet. It was created by Jarkko Oikarinen in 1988 and became one of the
earliest forms of online group chat. IRC allows multiple users to join and participate in
discussions across various channels (chat rooms) hosted on IRC servers.
IRC operates on a client-server model. Users connect to an IRC server using an IRC client
(such as mIRC, HexChat, or irssi). Once connected, they can join public or private channels
(denoted with a # symbol) or engage in direct private messages.
Each user is identified by a unique nickname, and server operators (admins) have the ability to
manage users and channels. Communication happens via simple text commands, such as:
Features of IRC
● Channels & Servers: Users can create or join chat rooms on different networks.
● Moderation & Administration: Channel operators (@) can ban users, set topic
restrictions, or require passwords.
● File Sharing: Some IRC clients support file transfers via the Direct Client-to-Client
(DCC) protocol.
● Bots & Automation: Many IRC channels use bots for moderation, games, and
notifications.
Relevance Today
Although IRC has declined in popularity with the rise of modern chat apps (like Discord and
Slack), it remains in use for technical discussions, open-source projects, and niche
communities. It is valued for its simplicity, low bandwidth usage, and decentralized nature.
Ans.
Today, when talking about networks, we are generally referring to three primary
categories:
Local Area Network (LAN): LAN spans only a small geographical area such as anoffice, home,
or building. In LAN one computer is designated as the file server, which stores all the software
that controls the network and other computers connected are
called workstations.
metropolitan area such as city and its suburbs. Operated by one organization (a
corporate with several offices in one city), or be shared resources used by several
Wide Area Network (WAN): Wide Area Network (WAN): WAN is a system of interconnecting
computers over a
large geographical area such as cities, states, countries, or even the world. These
kinds of networks use telephone lines, satellite links, and other long-range
Communication protocol
A protocol is a set of rules and procedures established to control transmission between two
points so that the receiver can properly interpret the bit stream transmitted by the sender. it
provides a method for orderly and efficient exchange of data by establishing rules for the proper
interpretation of controls and data transmitted as raw bits and bytes.Roles of protocol Roles of
protocol Data sequencing Data sequencing It refers to breaking a long transmission into smaller
blocks and maintaining control. That is, a long message is slit up into smaller packets of fixed
size. These packets are further fragmented into data frames. This technique is widely used in
conjunction with error control techniques to reduce the amount of data that must be
retransmitted in case of a detected error.
Routing algorithms are designed to find the most efficient paths between
sources and destinations. They can handle varying degrees of traffic on the
Error detecting and recovering routines are also an important element of communication
protocols. The most common method for correcting errors is to retransmit a block. This method
requires coordination of the two stations that the block having error is discarded by the receiving
station and is repeated by the transmitting station.
There are well defined rules to condition all stations about when to transmit their data and when
to receive data from other stations. It is ensured that all stations get a chance to use the
communication lines and other resources of the network depending upon the priorities assigned
to them. Connection establishment Connection establishment n establishment When two
stations of a network want to communicate with each other, the communication protocol
establishes and verifies a connection between the two.
Data security
Providing data security and privacy is also built into most communications
Log information
consists of all jobs and data communications tasks that have taken place. Such
information is normally used for financial purposes and the various users of
ISO/OSI Model
The initial computer networks had their own set of standards and conventions that were quite
hardware oriented. Each manufacturer used to develop their own communications protocols for
their network. thus the data communication protocols of one network were not compatible with
any other network. this problem was recognized by the International Standard organization(ISO)
which established a sub-committee to develop an international standard on network
architectures. The result was the open system interconnection (OSI) model, which is a
framework for defining standards for linking heterogeneous computers in a packet switched
network. The OSI model is also designed in a highly structured way. It is 7-layer architecture
and defines a separate set of protocols for each layer.
Physical layer- The physical layer covers the physical interface between devices. It defines the
electrical and mechanical aspects of interfacing to a physical medium for
transmitting data. it also defines how physical links are set up, maintained and disconnected.
In other words, it deals with the mechanical, electrical, procedural and functional characteristics
of transmission.
Data link layer- The data link layer is responsible for establishing an error-free communications
path between computers over the physical channel. It splits packets into data frames which are
transmitted sequentially by the ender and the receiver transmits the acknowledgement.
Network layer
1. MOSAICMosaic was the first widely used graphical web browser, developed in 1993 by the
National Center for Supercomputing Applications (NCSA) at the University of Illinois. It played a
crucial role in popularizing the World Wide Web (WWW) by allowing users to view text, images,
and hyperlinks in a single interface.
Features of Mosaic:
Available for multiple operating systems, including Windows, Mac, and Unix.
Impact of Mosaic:
It contributed to the rapid growth of the internet by making it more accessible to the general
public.
Inspired later web browsers like Netscape Navigator and Internet Explorer.
Although Mosaic is no longer in use, its influence is seen in modern web browsers.
2. USENET (User Network)
Usenet is a decentralized online discussion system that was developed in 1979 at Duke
University and the University of North Carolina. It allowed users to post and read messages in
newsgroups, similar to online forums.
Features of Usenet:
Divided into newsgroups, each focused on a specific topic (e.g., science, politics,
entertainment).
Messages were stored on news servers, and users accessed them through newsreader
software.
Importance of Usenet:
Still exists today but is less popular due to the rise of social media.
WAIS (Wide Area Information Server) was a search and retrieval system developed in 1990 by
Brewster Kahle and Thinking Machines Corporation. It was one of the early attempts to organize
and retrieve information from the internet.
Features of WAIS:
Significance of WAIS:
Each of these—Mosaic, Usenet, and WAIS—played a crucial role in shaping the internet as we
know it today.
Applications of FDM:
Advantages:
Disadvantages:
Client-Server Architecture
1. Client:
○ The medium (internet, LAN, WAN) through which clients and servers
communicate.
○ Uses networking protocols like TCP/IP for data transmission.
1. The client sends a request to the server (e.g., accessing a website).
2. The server processes the request and retrieves the required data.
3. The server sends the response back to the client.
4. The client receives and displays or processes the data.
Types of Client-Server Architecture
○ Expands the three-tier model with more specialized layers (e.g., caching servers,
load balancers).
○ Used in large-scale enterprise systems.
● Web Browsing: Clients (browsers) request web pages from servers (web hosting
services).
● Email Services: Clients (Gmail, Outlook) retrieve and send emails via mail servers.
● Online Banking: Users interact with bank servers to check accounts and transactions.
This architecture is widely used in modern applications due to its efficiency, scalability, and
centralized management.
Difference Between POP3 and IMAP Mail Servers
POP3 (Post Office Protocol 3) and IMAP (Internet Message Access Protocol) are two email
retrieval protocols that allow users to access emails from a mail server. While both are used for
retrieving emails, they differ in how they handle messages and synchronization across devices.
1. What is POP3?
POP3 is a one-way email retrieval protocol where emails are downloaded from the server to
the user's device and usually deleted from the server afterward.
Features of POP3:
Advantages of POP3:
Disadvantages of POP3:
2. What is IMAP?
IMAP is a two-way email retrieval protocol that keeps emails stored on the server and
synchronizes them across multiple devices.
Features of IMAP:
Advantages of IMAP:
Disadvantages of IMAP:
● Use POP3 if you want to download and store emails on a single device, need offline
access, and want to save server storage.
● Use IMAP if you access emails from multiple devices, need synchronization, and prefer
cloud-based email management.
Most modern email services (Gmail, Outlook, Yahoo) prefer IMAP by default because of its
flexibility and multi-device support.
● Ensuring compliance with IT policies, data protection laws, and industry standards.
● Keeping records of network configurations, system updates, and security incidents.
● Creating user manuals and technical guides.
Skills Required for a Network Administrator
✔ Technical Skills: Knowledge of networking hardware (routers, switches), protocols (TCP/IP,
DNS, DHCP), and security systems (firewalls, VPNs).
✔ Problem-Solving: Ability to diagnose and fix network issues efficiently.
✔ Security Awareness: Understanding of cybersecurity threats and protection measures.
✔ Communication Skills: Ability to explain technical concepts to non-technical users.
✔ Time Management: Handling multiple network tasks and troubleshooting efficiently.
A Network Administrator plays a crucial role in maintaining a stable, secure, and efficient IT
environment in any business or institution.
A network topology refers to the arrangement of computers, devices, and network components
in a communication network. It defines how data flows between connected devices and
influences network performance, scalability, and reliability.
Network topologies can be classified into physical topology (actual layout of devices) and
logical topology (how data moves between devices).
1. Ring Topology
In a Ring Topology, all computers and devices are connected in a circular path, where each
device is linked to two adjacent devices. Data travels in one or both directions in a ring-like
structure.
Advantages:
✔ Easy to install and manage.
✔ Reduces chances of data collision.
✔ Works well for small networks.
Disadvantages:
Example:
2. Bus Topology
In a Bus Topology, all devices are connected to a single central cable (called the "bus"), which
acts as a backbone for data transmission. Data travels in both directions along this cable.
Advantages:
Disadvantages:
✖ If the main cable (bus) fails, the entire network goes down.
✖ Performance decreases as more devices are added.
✖ Data collisions can occur, slowing communication.
Example:
3. Star Topology
In a Star Topology, all devices are connected to a central hub or switch, which controls data
transmission. Each device communicates directly with the central hub.
Advantages:
✔ Highly reliable—if one device fails, others remain unaffected.
✔ Easy to troubleshoot and expand.
✔ Offers high-speed data transfer.
Disadvantages:
Example:
Conclusion
Each topology has its own strengths and weaknesses, making them suitable for different
types of networks. Ring topology is simple but vulnerable to failures, Bus topology is
cost-effective but prone to data collisions, and Star topology is reliable but depends on a
central hub. The choice of topology depends on factors like network size, cost, and performance
needs.
What is Multicasting?
● A single sender transmits data once to a group of receivers instead of sending multiple
individual copies.
● Only devices that have joined the multicast group receive the data, reducing network
congestion.
● It operates using IP multicast, primarily relying on protocols like IGMP (Internet Group
Management Protocol) and PIM (Protocol Independent Multicast).
Types of Multicasting
1. IP Multicasting – Used for delivering internet-based media content to multiple users
efficiently.
2. Ethernet Multicasting – Used in local networks (LANs) for efficient data distribution.
3. Application-Level Multicasting – Used by applications like video conferencing and
online gaming.
Advantages of Multicasting
✔ Efficient bandwidth usage – Sends a single data stream instead of multiple copies.
✔ Reduces network congestion – Avoids unnecessary data duplication.
✔ Scalability – Supports large audiences without overloading the sender.
Examples of Multicasting
Multicasting is widely used in modern networking to ensure efficient data transmission while
optimizing bandwidth and reducing network load.
The Domain Name System (DNS) is a hierarchical naming system that translates
human-readable domain names (like www.google.com) into IP addresses (like
142.250.190.78) that computers use to identify each other on the internet.
Computers communicate using IP addresses, which are difficult for humans to remember. DNS
acts like a phonebook of the internet, allowing users to access websites using
easy-to-remember domain names instead of numerical IP addresses.
1. User Request: When a user types a URL (e.g., www.example.com) in a web browser,
the request is sent to the DNS resolver.
2. Recursive Query: The resolver asks DNS servers for the corresponding IP address.
3. Root Server: The request is sent to a Root DNS Server, which directs it to the correct
Top-Level Domain (TLD) Server (e.g., ".com", ".org").
4. TLD Server: The TLD server directs the request to the correct Authoritative DNS
Server for the domain.
5. Authoritative Server: It returns the correct IP address for the domain.
6. Website Access: The browser connects to the web server using the retrieved IP
address, loading the requested website.
Components of DNS
1. DNS Resolver: Acts as an intermediary between users and DNS servers.
2. Root DNS Server: The top-level directory of domain names.
3. TLD Server: Manages specific domain extensions (e.g., .com, .org).
4. Authoritative DNS Server: Stores actual domain-to-IP mappings.
Advantages of DNS
DNS is an essential internet service that enables smooth communication between users and
web servers by converting domain names into machine-readable IP addresses.
The Application Layer is the topmost layer in the OSI (Open Systems Interconnection)
model. It serves as an interface between the user and the network, allowing applications to
communicate over the internet or other networks.
1. User Interaction – Provides services directly to end users, such as email, file transfer,
and web browsing.
2. Network Services – Supports application services like HTTP (web browsing), FTP (file
transfer), SMTP (email), and DNS (domain name resolution).
3. Data Formatting & Encoding – Ensures data is in the correct format before
transmission.
4. Session Management – Establishes, maintains, and terminates communication
sessions between applications.
Examples of Application Layer Protocols:
The Application Layer plays a crucial role in enabling user-friendly communication over
networks.
Point to Point protocol helps communication between 2 computers over a serial cable, phone
line or other fiber optic lines. E.g. Connection between an Internet Service Provider and a host.
PPP also provides authentication. PPP operates by sending Request packets and waiting for
Acknowledge packets that accept, reject or try to change the request. The protocol is also used
to negotiate on network address or compression options between the nodes. PPP has a number
of phases as below:
* Network-Layer Protocol Phase: - here, the network control protocols come into play. Data
transport, closing of the protocols takes place in this phase: - Used to establish connection. If
authentication is desired, it moves to next phase.
IGMP protocol The Internet Group Management Protocol (IGMP) is a communications protocol
used by hosts and adjacent routers on IPv4 networks to establish multicast group memberships.
IGMP is an integral part of the IP multicast specification, enabling efficient one-to-many data
distribution over networks.
1. **Group Membership Management**:- Hosts use IGMP to inform their local router about
their interest in receiving multicast traffic for specific groups.Routers use IGMP to determine
which multicast groups have active listeners on their directly connected subnets.
2. **Efficient Data Delivery**:- IGMP ensures that multicast traffic is only sent to networks with
interested receivers, reducing unnecessary bandwidth usage.
3. **Version Variants**:
- **IGMPv1**: The initial version, defined in RFC 1112, supports basic join and leave
functionality.
- **IGMPv2**: Defined in RFC 2236, it adds the ability for hosts to explicitly leave a group,
improving efficiency.
- **IGMPv3**: Defined in RFC 3376, it supports source filtering, allowing hosts to specify
which sources they want to receive multicast traffic from.
- A host sends an IGMP report to its local router to join a multicast group.
- The router forwards the multicast traffic for that group to the host's subnet.
- In IGMPv2 and IGMPv3, a host can send a leave message to stop receiving traffic for a
specific group.
3. **Query-Response Mechanism**:
- Routers periodically send IGMP queries to check for active group members.
### Applications:
NetBIOS protocol
NetBIOS (Network Basic Input/Output System) is a networking protocol that allows applications
on separate computers to communicate over a local area network (LAN). Developed in the early
1980s by Sytek Inc. for IBM, it operates at the session and transport layers of the OSI model.
NetBIOS provides services such as session establishment, name resolution, and datagram
distribution. It enables devices to identify each other using unique 16-character names and
supports both connection-oriented (for reliable communication) and connectionless (for faster,
less reliable communication) modes. While NetBIOS itself is not routable, it is often used in
conjunction with NetBIOS over TCP/IP (NBT), which allows it to operate over larger networks,
including the internet. Despite its age, NetBIOS remains relevant in legacy systems, particularly
in Windows environments for file and printer sharing. However, due to security vulnerabilities, its
use has diminished in favor of more modern protocol
Token Ring is a local area network (LAN) technology that uses a ring topology to facilitate data
transmission between devices. Developed by IBM in the 1980s, it operates at the data link layer
(Layer 2) of the OSI model. In a Token Ring network, devices are connected in a circular
fashion, and a special frame called a "token" circulates around the ring.
1. **Token Passing**: Only the device holding the token can transmit data. When a device has
data to send, it waits for the token, attaches its data to the token, and sends it around the ring.
2. **Data Transmission**: The data travels around the ring until it reaches the destination
device, which copies the data and marks the token as received.
3. **Token Release**: The token continues to circulate, allowing other devices to transmit data
when they receive it.
- **Deterministic Access**: Token Ring ensures fair access to the network, as each device gets
a turn to transmit.
- **Reliability**: It includes error detection and recovery mechanisms, such as beaconing to
identify and isolate faults.
### Decline:
Token Ring was largely replaced by Ethernet due to its higher speeds, lower cost, and simpler
implementation. However, it remains a notable example of early LAN technologies.
digital signature
A digital signature is a cryptographic technique used to validate the authenticity and integrity of
digital messages, documents, or software. It functions like a handwritten signature but provides
higher security and verification capabilities. Digital signatures rely on public key infrastructure
(PKI), which uses a pair of keys: a private key (known only to the signer) and a public key
(shared with others).
1. **Hashing**: The sender generates a unique hash (a fixed-length string) of the document
using a cryptographic hash function.
2. **Encryption**: The hash is encrypted with the sender’s private key, creating the digital
signature.
3. **Verification**: The recipient decrypts the signature using the sender’s public key to retrieve
the hash. They also generate a new hash of the received document and compare it with the
decrypted hash. If they match, the document is authentic and unaltered.
- **Non-Repudiation**: Prevents the sender from denying they signed the document.
Digital signatures are widely used in secure communications, e-commerce, software distribution,
and legal agreements, providing a robust mechanism for trust and security in digital
transactions.