computer-networks-class-xii-part-2-eng
computer-networks-class-xii-part-2-eng
20. POP
Topology
Topology is the manner of connecting computers in a network, as shown in given diagrams.
Topology is of following types-
Network Stack
• Protocol stack or Network stack is a implementation of a
computer networking protocol suite.
• Suite is a medium of transmission protocols and stack is
a software to implement these suites.
• In a suite, individual protocols are designed to achieve
one common goal.
• It ease the process of modularization, design and
evaluation.
• While implementing, protocol stack is generally divided
in to three main parts- Media, Transport and Application.
• In a special operating system or platform, there are two
well designed software interface exists- one in between
a media layer and transport layer and one in between
transport layer and application layer.
Neha Tyagi, K V 5 Jaipur II Shift
Modulation
• Modulation is a technique of conversion of an electronic or optical carrier signal in to radio waves.
There is a carrier signal in a stationary wave with certain height or dimensions or frequency. For
optical signals, its dimensions, frequency, phase, polarization and spin like quantum level entities are
to be separated to add in carrier. It is of three types-
– Amplitude Modulation (AM)
– Frequency Modulation (FM)
– Phase Modulation (PM)
It Supports Manual and DHCP address configuration It supports Auto and renumbering address configuration
In IPv4 end to end connection integrity is Unachievable In IPv6 end to end connection integrity is Achievable
It can generate 4.29×109 address space Address space of IPv6 is quite large it can produce 3.4×1038 address space
Security feature is dependent on application IPSEC is inbuilt security feature in the IPv6 protocol
Address representation of IPv4 in decimal Address Representation of IPv6 is in hexadecimal
Fragmentation performed by Sender and forwarding
routers In IPv6 fragmentation performed only by sender
In IPv6 packet flow identification are Available and uses flow label field in
In IPv4 Packet flow identification is not available the header
In IPv4 checksum field is available In IPv6 checksum field is not available
It has broadcast Message Transmission Scheme In IPv6 multicast and any cast message transmission scheme is available
In IPv4 Encryption and Authentication facility not provided In IPv6 Encryption and Authentication are provided
IPv4 has header of 20-60 bytes. IPv6 has header of 40 bytes fixed
Neha Tyagi, K V 5 Jaipur II Shift
Domain Name System (DNS)
• Domain name system (DNS) is a hierarchical and decentralized naming system for
computers, services or other resources connected to the internet. Domain Name system
delegates the responsibility of assigning domain names and mapping those name to internet
resources by designating authoritative name servers for each domain.
• Domain Name makes it easy to change names in IP addresses. Domain name is used to
identify a web server in a URL i.e. a domain name is an address of a web server, for ex.-
http://cbse.nic.in/index.html , index.html is a file here and this file is places at the server
cbse.nic.in which is a domain name.
• A domain name has two parts-
– Top-level domain name (.in is primary domain name in above example.)
– Sub-domain name (.nic is sub domain name in above example and cbse is also sub domain name.)
• Example of domain names are- .com, .edu, .gov, .mil, .net, .org etc
• Domain name of some countries are- : .in, .au, .nz, .jp, .us etc
.
Neha Tyagi, K V 5 Jaipur II Shift
URL(Uniform Resource Locator) Structure
• URL is used to identify a website or webpage. HTTP locators are used to access distributed
documents world wide.
• URL is used to specify any information on internet.
• URL structure has four factors-
– Protocol → like http: , ftp:, https: etc.
– Host computer → like cbse.nic.in
– Port → it is optional. Like, a port has a number 8080 and it is placed between host and path.
– Path → it is the name of that path or place where file is stored.
• whois – it is a query tool with which we can get information about registered user. It is an
external command.
• Speedtest – We can use various web services to get information about network speed like
ookla.
t
Protocols
• In a Network, there is a group of rules for transmission of data, developed by the organization
AIEEE. These rules are termed as Protocols. i.e. Protocols are the set of rules to transmit the
data over the network.
• As when we walk/drive on road, we need to follow traffic rules so that we can safely reach to
our destination. Similarly, when the data flows in a network from sender to receiver, it needs
to follow network rules. These rules are known as protocols.
• Some of the common protocol are-
– TCP/IP
– http:
– https:
– FTP
– Telnet
– POP
– SMTP
E-mail
• Most common service of internet is e-mail used to send a message from sender to receiver.
• An email address is required for it like [email protected] where xyz is a unique ID of a user and
gmail.com is its service provider for e-mail.
• A service provider has a mail server to keep all the mail safe. A user can access it’s mail after
login to his account. It is also based on client-server architecture. 2 protocols works together
here- SMTP works during sending of email and POP works during receiving of email. Email
sending has following phases- –
– Composition → get ready the mail
– Transfer → sending of mail from computer to server.
– Reporting → informing the sender about status
of mail i.e. it is delivered or not.
– Displaying → reading of mail by user.
– Disposition → act is decided by user after reading mail.
Neha Tyagi, K V 5 Jaipur II Shift
HTTP
• Hyper Text Transfer Protocol is a protocol used to access data on internet or on world wide
web.
• It is a mixture of FTP and SMTP protocol.
• It is based on client-server architecture.
• Here, client sends a request to server and server respond to this request. http send the code
of a webpage for this.
• Remote Login →accessing a remote computer using user name and password.
• Telnet → also used for remote login where many users can connect to a server.
• SMTP→ it is a protocol used for e-mail . SMTP stands for Simple Mail Transfer Protocol.
• VoIP→ it means Voice over Internet Protocol , used to carry voice over internet.
• POP → it means Post Office Protocol used for distribution of mails from server.