Updated Networking Notes
Updated Networking Notes
Network:
• A computer network is a set of computers connected together for the purpose of sharing resources.
Each computer on the network is called a node.
• Two computers are said to be interconnected if they are capable of sharing and exchanging
information.
network
2. Reliability: means to keep the copy of a file on two or more different machines, so if one of them is
4. Communication Medium: means one can send messages and whatever the changes at one end are
1. Cost Of Network : The cost of implementing the network including cabling and hardware can be
pricey.
2. Threat to Data: A computer network may be used by unauthorized users to steal or corrupt the data
and even to deploy computer virus or worms on the network.
3. Security Concerns: One of the chief downsides of computer networks involves security issues.
4. Virus and Malware: If even one computer on a network gets infected with a virus, there is a
possibility for the other systems to get infected too.
5. Lack of Independence: As networks generally have a centralised server and dependent clients, the
client users usually do not have any control whatsoever.
Evolution of Networking
1. ARPANET – 1960 –
• In the 1960s, the U.S. Department Of Defence had started a project named Advanced Research
Projects Agency Network (ARPANET) to provide an interconnection between academic and
research institutions for research purposes. They have started communication and the first
message was communicated between the University of California, Los Angeles (UCLA) and Stanford
Research Institute (SRI). Later on, other organizations had also joined ARPANET gradually and
formed small networks.
2. Email – 1971
• In 1971, Roy Romlinson develops a networking message popularly known as E-mail. With this, the
symbol @ is used the first time with the network.
4. TCP/IP – 1982
• By using the ARPANET project, now it is almost spread over countries with TelNet. In 1982 they
have started using TCP/IP protocol in ARPANET. This protocol was developed by Robert Kahn and
Vinton Cerf.
6. NSFNET – 1986
• NSFNET program was launched by National Science Foundation in 1986 to bring connectivity to
more people. It was popularly used to promote advanced research and education networking in
the United States.
7. WWW – 1990
• In 1990, Tim Berners Lee worked with European Organization for Nuclear research developed a
program to make information readily available to users with different URLs and create relationships
between websites, thus it gives birth to World Wide Web.
8. WiFi – 1997
• In 1997, the first version of WiFi was introduced. Later on, so many changes and evolution took
place and modern hi-speed internet came into the existence.
➢ Circuit establishment
➢ Data transfer
➢ Circuit Disconnect
2. Message Switching:
• In the Message switching technique, no physical path is established between sender and
receiver in advance. This technique follows the store and forward mechanism.
• Each intermediate device receives the message and stores it until the nest device is ready to
receive it and then this message is forwarded to the next device. For this reason a message
switching network is sometimes called as Store and Forward Switching.
• Message switching treats each message as an independent entity.
• Advantages Of Message Switching:
➢ Traffic congestion can be reduced because the message is temporarily stored in the nodes.
➢ The size of the message which is sent over the network can be varied. Therefore, it supports the
not recommended for real time applications like voice and video.
3. Packet Switching:
• This switching technique uses TCP/IP protocol and divide the data into fixed size of packet and
transmitted across the network.
• Every packet is independent contains some information in its headers such as source address,
destination address and sequence number.
• Packets will travel across the network, taking the shortest path as possible.
• At the destination, the TCP protocol re-assembles the packets into the complete message.
• If any packet is missing or corrupted, then a request is sent to retransmit the message.
• If the correct order of the packets is reached, then the acknowledgment message will be sent.
• Advantages Of Packet Switching:
➢ Cost-effective: Switching devices do not require massive secondary storage to store the packets, so
cost is minimized to some extent.
➢ Efficient: It does not require any established path prior to the transmission, and many users can use
the same communication channel simultaneously.
➢ Packet Switching technique cannot be implemented in those applications that require low delay and
high-quality services.
Channel:
• Channel is a medium through which a message is transmitted to its intended destination. Channel
can be wired (Guided) or Wireless (Unguided).
OR
• Physical medium like cables over which information is exchanged is called channel.
OR
• The information / data carry from one end to another in the network by channel.
➢ 1 KBps = 1 Kilo bytes per second = 1024 bytes per second = 1024 x 8 bits per second
➢ 1 MBps = 1 Mega bytes per second = 1024 KBps
➢ 1 GBps = 1 Giga bytes per second = 1024 MBps
➢ 1 TBps = 1 Tera bytes per second = 1024 GBps
Signal Rate:
• The signal rate is the numbers of signal elements sent in 1 second. The unit is baud.
• The signal rate is sometimes called the pulse rate, the modulation rate, or the baud rate.
• Each communication channel has certain capacity and it can carry information up to that extent
only. This capacity is measured in terms of Baud.
• One goal in data communications is to increase the data rate while decreasing the signal rate.
Increasing the data rate increases the speed of transmission. Decreasing the signal rate
decreasing the bandwidth requirement.
Bandwidth:
• Bandwidth is the capacity of a wired or wireless network communications link to transmit the
maximum amount of data from one point to another point over a computer network.
• Bandwidth is a range of frequencies within a given band that is used for transmitting an analog or
digital signal.
• For digital devices, the bandwidth is usually expressed in bits per second (bps) or bytes per second.
For analog devices, the bandwidth is expressed in cycles per second, or Hertz (Hz) or KHz, MHz.
Transmission media:
• Transmission media is a communication channel that carries the information from the sender to the
receiver.
• Transmission Media is broadly classified into the following types:
A) Guided Media:
• It is also referred to as Wired or Bounded transmission media. Signals being transmitted are directed and confined
in a narrow pathway by using physical links.
• Features:
➢ High Speed
➢ Secure
➢ Used for comparatively shorter distances
Disadvantages:
(i) It is incapable to carry a signal over long distances without the use of repeaters.
(ii) Due to low bandwidth, these are unsuitable for broadband applications.
(iii) It supports maximum data rates 1 Mbps without conditioning and 10 Mbps with
conditioning.
(ii) Shielded Twisted Pair (STP) Cable. This type of cables comes with shielding of the
individual pairs of wires, which further protects it from external interference. But these
also, like UTP, can have maximum segment length of 100 meters. The advantage of STP
over UTP is that it offers greater protection from interference and crosstalk due to
shielding. But it is definitely heavier and costlier than UTP and requires proper grounding
at both ends.
2. Co-axial Cables: It consists of a solid wire core surrounded by one or more foil or braided wire
shields, each separated from the other by some kind of plastic insulator. It is mostly used in the
cable wires.
Advantages:
(i) The data transmission characteristics of coaxial cables are considerably better than those
of twisted-pair cables.
(ii) The coaxial cables can be used as the basis for a shared cable network.
(iii) The coaxial cables can be used for broadband transmission i.e., several channels can be
transmitted simultaneously (as with cable TV).
(iv) Offer higher bandwidths-upto 400 MBPS.
Disadvantages:
(i) Expensive compared to twisted pair cables.
(ii) The coaxial cables are not compatible with twisted pair cables.
3. Optical fiber: - An optical fiber consists of thin glass fibers that can carry information in the form of
visible light.
Advantages:
(i) It is immune to electrical and magnetic interference i.e., noise in any form because the
information is travelling on a modulated light beam.
(ii) It is highly suitable for harsh industrial environments.
(iii) it guarantees secure transmission and has a very high transmission capacity.
(iv) Fiber optic cables can be used for broadband transmission where several channels (i.e.,
bands of frequency) are handled in parallel and where it is also possible to mix data
transmission channels with channels for telescope, graphics, TV and sound.
Disadvantages:
Maximum
Type Type Sub Segment Bandwidth Installation Cost Interference
Type Length Supported
transmission in everyday life – TV remotes, automotive garage doors, wireless speakers etc., all
make use of infrared as transmission media.
• The infrared light transmits data through the air and can propagate throughout a room (bouncing
off surfaces), but will not penetrate walls.
• The infrared transmission is considered to be a secure one.
5. Radio Wave: -
• The transmission making use of radio frequencies is termed as radio-wave transmission.
• Radio waves are the electromagnetic waves that are transmitted in all the directions of free
space.
• Radio waves are omnidirectional, i.e., the signals are propagated in all the directions.
• The range in frequencies of radio waves is from 3Khz to 1 khz.
• An example of the radio wave is FM radio.
Advantages:
7. Satellite link: -
• The satellite transmission is also a kind of line of sight transmission that is used to transmit signals
throughout the world.
• In satellite communication transmitting station transmits the signals to the satellite. (It is called
up-linking).
• After receiving the signals (microwaves) it amplifies them and transmits back to earth in whole
visibility area. Receiving stations at different places can receive these signals. (It is called down-
linking).
Advantages:
(i) Technological limitations preventing the deployment of large, high gain antennas on the
satellite platform.
(ii) Over-crowding of available bandwidths due to low antenna gains.
(iii) The high investment cost and insurance cost associated with significant probability of
failure.
(iv) High atmospheric losses above 30 GHz limit carrier frequencies.
(v) Installation is extremely complex.
Network devices:
1. Modem:
• A Modem is a computer peripheral that allows you to connect and communicate with other
computers via telephone lines.
• Modem is an electronic device which converts digital signals into analog signals for transmission
over telephone lines (Modulation).
• At the receiving end, a modem performs the reverse function and converts analog signal into
digital form (Demodulation).
2. RJ45 connector: -
• Ethernet Card is a kind of network adapter and is also known as Network Interface Card (NIC).
• These adapters support the Ethernet standard for high-speed network connections via cables.
• An Ethernet Card contains connections for either coaxial or twisted pair cables or fiber optic
cable.
4. Repeater –
5. Hub:
• A hub is a hardware device used to connect several computers together. Broadcasts the
information to all the connected nodes.
• A hub is basically a multiport repeater.
• Hubs cannot filter data, so data packets are sent to all connected devices.
• In other words, collision domain of all hosts connected through Hub remains one.
• Also, they do not have intelligence to find out best path for data packets which leads to
inefficiencies and wastage.
• Types of Hub :
➢ Active Hub: - These are the hubs which have their own power supply and can clean, boost
and relay the signal along with the network. These are used to extend the maximum
distance between nodes.
➢ Passive Hub: - These are the hubs which collect wiring from nodes and power supply from
active hub. These hubs relay signals onto the network without cleaning and boosting them
and can’t be used to extend the distance between nodes.
6. Switch:
• A switch is a device that is used to segment networks into different subnetworks called subnets or
LAN segments. Segmenting the network into smaller subnets, prevents traffic overloading in a
network.
• A switch (switching hub) is a network device which is used to interconnect computers or devices
on a network.
• Network switches appear nearly identical to network hubs, but a switch generally contains more
intelligence than a hub.
• Unlike hubs, network switches are capable of inspecting data packets as they are received,
determining the source and destination device of each packet, and forwarding them
appropriately.
7. Bridge
8. Router:
• A Router is a network device that works like a bridge to establish connection between two
networks but it can handle networks with different protocols.
• If the destination is unknown to a router it sends the traffic (bound to unknown destination) to
another router (using logical addresses) which knows the destination.
• A router differs from a bridge in a way that former uses logical addresses and the latter uses
physical addresses.
9. Gateway:
• Wi-Fi is the acronym for wireless fidelity. Wi-Fi technology is used to achieve wireless
connection to any network.
• Wi-Fi card is a card used to connect any device to the local network wirelessly.
• The physical area of the network which provides internet access through Wi-Fi is called Wi-Fi
hotspot.
• The primary benefit of using a WiFi card in a desktop computer is that it allows you to setup your
work- station or home office without considering the proximity or availability of hard line network
access.
COMPUTER NETWORK
Network Topologies and Types
1. Point-to-Point Link
• A P-P (Point to Point) link basically relies upon two functions- transmit and receive.
• The main characteristic of P-P network is that each station receives exactly from one transmitter,
and each transmitter transmits to exactly one receiver.
• Advantages:
(i) This is faster and highly reliable than other types of connections since there is a direct
connection.
(ii) No need for a network operating system.
• Disadvantages:
(i) The biggest drawback is that it only be used for small areas where computers are in close
proximity.
(ii) You can't back up files and folders centrally
2. The BUS Topology: -
• The bus topology uses a common single cable to connect all the workstations.
• Each computer performs its task of sending messages without the help of the central server.
• However, only one workstation can transmit a message at a particular time in the bus topology.
• Advantages:
(i) Easy to connect and install.
(ii) Involves a low cost of installation time.
(iii) Can be easily extended.
(iv) Short cable length and simple wiring layout.
• Disadvantages:-
(i) The entire network shuts down if there is a failure in the central cable.
(ii) Only a single message can travel at a particular time.
(iii) Difficult to troubleshoot an error.
• A STAR topology is based on a central node which acts as a hub. A STAR topology is common in
homes networks where all the computers connect to the single central computer using it as a
hub.
• Advantages:
(i) Easy to troubleshoot
(ii) A single node failure does not affect the entire network.
(iii) Fault detection and removal of faulty parts is easier.
(iv) In case a workstation fails, the network is not affected.
• Disadvantages:-
(i) Difficult to expand.
(ii) Longer cable is required.
(iii) The cost of the hub and the longer cables makes it expensive over others.
(iv) In case hub fails, the entire network fails.
• The tree topology combines the characteristics of the linear bus and the star topologies.
• It consists of groups of star – configured workstations connected to a bus backbone cable.
• Advantages:
(i) Eliminates network congestion.
(ii) The network can be easily extended.
(iii) Faulty nodes can easily be isolated from the rest of the network.
• Disadvantages:
(i) Uses large cable length.
(ii) Requires a large amount of hardware components and hence is expensive.
(iii) Installation and reconfiguration is very difficult.
• Advantages:
(i) Easy to install and reconfigure.
(ii) Adding or deleting a device in-ring topology needs you to move only two connections.
(iii) Failure of one computer can disturb the whole network.
• Disadvantages:
(i) Unidirectional traffic.
(ii) In the ring, topology signals are circulating at all times, which develops unwanted power
consumption.
(iii) It is very difficult to troubleshoot the ring network.
(iv) Adding or removing the computers can disturb the network activity.
Types of Networks:
1. LAN (Local Area Network):
• A Local Area Network (LAN) is a network that is confined to a relatively small area.
• It is generally limited to a geographic area such as writing lab, school or building.
• It is generally privately owned networks over a distance not more than 5 Km.
(ii) a protocol such as TCP that provides services need by many applications
(iii) IP, which provides the basic service of getting datagrams to their destination
(iv) the protocols needed to manage a specific physical medium, such as Ethernet or a
NOTE: -
• TCP and IP were developed by a Department of Defense (DOD) research project to connect a
• SLIP/PPP provides the ability to transport TCP/IP traffic ever serial line between two computers.
• The home user’s computer has a communications link to the internet.
• The home user’s computer has the networking software that can speak TCP/IP with other
computers on the Internet.
• The home user’s computer has an identifying address (IP address) at which it can be contacted by
other computers on Internet. E.g. dial up connection.
5. SMTP :-
• SMTP (Simple Mail Transfer Protocol) is a TCP/IP protocol used in sending and receiving e-mail.
• However, since it is limited in its ability to queue messages at the receiving end, it is usually used
with one of two other protocols, POP3 or IMAP, that let the user save messages in a server
mailbox and download them periodically from the server.
• In other words, users typically use a program that uses SMTP for sending e-mail and either POP3
or IMAP for receiving e-mail.
• On Unix-based systems, send mail is the most widely used SMTP server for e-mail.
• A commercial package, Sendmail, includes a POP3 server.
• Microsoft Exchange includes an SMTP server and can also be set up to include POP3 support.
6. POP3:-
• POP3 (Post Office Protocol 3) is the standard way which has been around for decades.
• It is very similar regular mail.
• Messages are delivered to our computer, put in our mailbox, and are then our responsibility.
• Advantage of POP3 :
➢ Email is available when we are offline
➢ Email is not stored on the server, so our disk usage on the server is less
➢ Just about any email client (software) supports POP3
7. IMAP:-
8. Telnet-
Note: -
• Remote login: Remote login is the process of accessing a network from a remote place without
actually being at the actual place of working.
COMPUTER NETWORK
Web Services:
• The World Wide Web or W3 or simply the Web is a collection of linked documents or pages,
stored on millions of computers and distributed across the Internet.
• It is a small part of Internet. It is a kind of Application of internet.
• It is a set of protocols that allows us to access any document on the Net through a naming system
based on URLS.
• Internet was mainly used for obtaining textual information. But post-WWW the internet
popularity grew tremendously because of graphic intensive nature of www.
• Attributes of WWW
➢ User friendly- www resources can be easily used with the help of browser.
➢ Multimedia documents-A web page may have graphic, audio, video, and animation etc at a
time.
➢ Hypertext and hyperlinks- the dynamic links which can move towards another web page is
hyperlink.
➢ Interactive -www with its pages support and enable interactivity between users and servers.
➢ Frame- display of more than one section on single web page.
• HTML is a computer language that describes the structure and behavior of a web page. This
language is used to create web pages.
• Used to design the layout of a document and to specify the hyperlinks.
• Tells the browser how to display text, pictures and other support media.
• Support multimedia and new page layout features.
• Provides many tags for control the presentation of information on the web pages, such as
<body>, <li>, <hr> etc.
• Extensible Markup Language (XML) is a meta language that helps to describe the markup
language. A markup language is a mechanism to identify structure in a document.
• XML defines a standard way to add markup to documents.
• Provides an ability to define tags and the structural relationship between them.
• All of the semantics of an XML document will either be defined by the application that process
them or by style sheets.
Domain Names:
• A domain name is a unique name that identifies a particular website and represents the name of
the server where the web pages reside.
• An Internet address which is character based is called a Domain Name, such as com, org etc. Here
“com” indicates Commercial and “org” indicates non-profit Organization.
• Two letter short form indicating the country name may be used with URL e.g.,
http://www.microsoft.co.in here the last “in” suggest that it is based in India.
URL:-
• The Uniform Resource Locator is a means to locate resources such as web pages on the Internet.
• URL is also a method to address the web pages on the Internet.
• There are two types of URL, namely, absolute URL and relative URL.
• URL specifies the distinct address for each resource on the Internet, such as ftp, http etc.
• URL looks like this: type://adress/path.
• Where, - type specifies the type of the server in which the file is located.
➢ Address is a address of the server.
➢ Path is a location of the file on the server.
Website:
• A collection of related web pages stored on a web server is known as a website.
Web browser:
• A software application that enables to browse, search and collect information from the Web is
known as Web browser, web browsers are used at client side.
Web Servers:
• The web pages on the Internet are stored on the computers that are connected to the Internet.
These computers are known as web servers.
Web Hosting: -
• Web Hosting or website hosting is the service to host, store and maintain the websites on the
World Wide Web.
• Web Hosting is a means of hosting web-server application on a computer system.
• By using web hosting electronic content on the Internet is readily available to any web browser
client.
• The computer system providing the web-hosting is known as web-server or the web host.
• Web hosting can be classified into following four categories :
➢ Free Hosting: available with many famous sites which offer to host some web pages for no
cost.
➢ Virtual or Shared Hosting: here one’s web site domain is hosted on the web server of
hosting company along with the other web sites. Use “shared” if you have a professional
website.
➢ Dedicated Hosting: here, the company wishing to go online rents an entire web server from
Web Scripting: -
• The process of creating and embedding scripts in a web page is known as Web Scripting.
• Script:
➢ A Script is a list of commands embedded in a web page. Scripts are interpreted and
executed by a certain program or scripting –engine.
➢ Types of Scripts:-
1. Client Side Scripts: - Client side scripts supports interaction within a webpage. E.g. VB
Script, Java Script, PHP (PHP‟S Hypertext Preprocessor).
2. Server Side Scripts: - Server-side scripting enables the completion or carrying out a task
at the server-end and then sending the result to the client –end. Some popula server-
side Scripting Languages are PHP, Perl, ASP(Active Server Pages), JSP(Java Server Pages)
etc.
1. Script code is downloaded and executed at The script is executed at the server-end and
client end. the result is sent to the client-end.
2. Response to interaction is more immediate Complex processes are more efficient as the
once the program code has been down- program and associated resources are not
loaded. downloaded to the browser.
3. Services are secure as they do not have Have access to files and data bases but have
access to files and databases. security considerations when sending
sensitive information.
4. Browser dependent Does not depend on browsers
5. Affected by the processing speed of user’s Affected by the processing speed of the host
computer server.