Computer Networks

Download as pdf or txt
Download as pdf or txt
You are on page 1of 74

INDEX

 Introduction to Computer Networks


 Evolution of Networking (ARPANET, NSFNET, INTERNET)
 Data Communication Terminology (Sender, Receiver, Message,
Communication, Channel, Baud, Bits per second, Bandwidth, Data &
Signals, Data Transfer Rate)
 IP Address
 Switching Techniques (Circuit Switching & Packet Switching)
 Transmission Media (Guided/Wired & Unguided/Wireless)
 Network Devices (Modem, Ethernet Cable, RJ-45, Repeater, Hub,
Switch, Router, Gateway and Wi-Fi Card)
 Types of Network (PAN, LAN, MAN & WAN)
 Network Topology (Bus, Star & Tree)
 Network Protocol (TCP, IP, FTP, SMTP, HTTP, HTTPS, POP3, PPP,
VOIP, TELNET)
 Introduction to Web Services (WWW, HTML, XML, Domain Name,
URL, Web Site, Web Server, Web browser, Web Hosting
COMPUTER NETWORKS
Introduction to computer networks:-
A collection of interconnected computers is called a
Computer Network. Which is used to share data and other
resources (Hardware and Software Resources)
A network can consist of a computer, fax machine,
printer, camera, cell phone etc.
 ADVANTAGES of Computer Networks:
A) Resource Sharing
B) Improve Communication
Fast Reliable and Secure communication between users.
C) Reduced Communication Cost
D) Reliability of Data
E) Central Storage of Data

 DISADVANTAGES of Computer Networks:


A) Cost of set-up and maintenance
B) Threat to data security
EVOLUTION OF NETWORKING 

 The network has passed through several stages which are


described below:
(1) ARPANET(Advanced Research Project Agency Network) – In
1969.
It was a project that connected a handful of computers at
different Universities and US DoD(US Department of
Defence) for sharing of data and messages and playing long
-distance games, and socializing with people to share their
views.
(2) NSFNET (National Science Federation Network) –
 In mid-80’s another federal agency NSFNET, created
new network which was more capable than ARPANET.
 It was use only for academic research and not for any
private business activity.
 It is the internet that links two or more networks to make a
large network for sharing information and messages.
EVOLUTION OF NETWORKING 

(3) Internet – In 1990’s


The internet has evolved from ARPANET.
The computers are connected through World Wide Web that
comprises a large network and shares a common
communication protocol
DATA COMMUNICATION TERMINOLOGIES
1. Channel - A channel is a communication path through which the data is
transmitted from the sender device to the receiver device.
2. Baud – The number of changes in a signal per second is known as Baud. It
is measuring unit of data transfer rate. 1 baud represents only 1 signal
change per second and is equivalent to 1 bit per second.
3. Bits per second – It is measuring unit of speed at which data transfer
takes places.
4. Bandwidth – The amount of data that can be passed along a
communication channel in a given period of time.
5. Data and Signals – Information that is stored within a computer systems
and transferred over a computer network can be divided into two
categories: Data & Signals. Data are the entities that are stored in the form
of 0’s and 1’s. when this data is transmitted from one place to another, it is
converted into signal. Signal are used to transmit data.
6. Communication/Transmission Media – It access setup between two
organizations to exchange data/information. It is used for sending and
receiving of data to and from the sender and receiver.
7. Data Transfer Rate - It is the amount of data transferred in one direction
over a link divided by the time taken to transfer it in bits per second.
CONCEPT OF COMMUNICATION
 It is the process of sending and
receiving information or data from
the sender to receiver.
 Components of data
communication:-
(1) Sender – A device or a computer
that sends the data.
(2) Receiver - A device or a
computer that receives the data.
(3) Message - Is the information to
be communicated. It may be
text, image, audio or video.
(4) Communication Medium – Is the
physical path through which the
data flows from sender to
receiver. A cable or wire or radio
waves can be the medium.
(5) Protocols – A set of rules that
governs data transmission
IP ADDRESS
 The computers connected to a network also need to follow
some rules to communicate with each other. These set of rules
known as Protocol.
 The internet is an example of the TCP/IP network.
 This unique address in known as IP address.
 IP address is short for Internet Protocol(IP) address.
 An IP address is an identifier for a computer or device on a
TCP/IP network.
 Network using TCP/IP protocol route messages based on the IP
address of the destination.
 The format of IP address is a 32-bit numeric address written as
four number separated by periods.
 Each number can be in the range of 0 to 255.
 Example, 192.168.1.2 and 109.134.2.2
 IP address of a computer is assigned by the ISP, whose internet
connection is used on that computer.
SWITCHING TECHNIQUES
The main goal of networking is the reliable exchange of data
or information among several interconnected nodes.
For the delivery of data with accuracy, various types of
switching technique are used,
(1)Circuit Switching –
 It provides end-to-end connection between two computers.
 It is established usually in a telephone network where one person
is making a call and another is receiving a call.
 In telephone system, the communication must be established
between the sender and receiver.
 The circuit establish between two participants before the
transfer of data takes place.
 In this technique, the entire link remains dedicated which
guarantees the full bandwidth of the link and no other user can
use it even if the path remains idle.
1. CIRCUIT SWITCHING
The following actions take place during circuit switching:
(1) A request signal is sent by the sender to set up the connection
with the receiver. It establishes the physical connection
between the two participants.
(2) All intermediate nodes are identified. These nodes are also
called switching nodes.
(3) If the destination node is available, it sends back the
acknowledgement of receiving a signal. Hence, data
transmission begins.
(4) When the data transmission is complete, the call can be
terminated.
2. PACKET SWITCHING
 The Entire data divided into small fragments called packets.
 Each packet is of a fixed size, usually 128 bytes or 512 bytes.
 It is same as post office operation. Each packet has a source
address and destination address(IP Address) for being
transmitted.
 As there is no direct connection established between the
sender and the receiver, each packet follows different routes
and, therefore the packets are delivered in a random order at
the destination address.
2. PACKET SWITCHING
 If the packet matches with the node address, it is received;
otherwise, it is passed on to the next node until it reaches the
destination address.
Diff. between Circuit Switching and Packet Switching:
(1) Circuit switching reserves the required bandwidth in advance,
whereas packet switching uses bandwidth as and when required by
the packets to be transmitted.
(2) Circuit switching is a fast technology as compared to packet
switching which is a slow mechanism of transferring packets from
sender to receiver.
(3) In circuit switching, if the path is overloaded, the call is blocked and
communication is delayed. But in packet switching, packets are
allocated to different paths.
(4) Circuit-switching networks are used for phone calls and packet-
switched networks handle data.
(5) Packet switching is more efficient because the cost of the link is
shared by many users.
TRANSMISSION MEDIA
 Transmission media is also called as Communication Media through
which data or signal is transferred between communicating devices.
 i.e. from one system to another system, through wires or without
wires.
 If the data is sent across network through wires, it is called guided
media(Wired Media) and if data is sent without wires, it is called
unguided media(Wireless Media).
 Guided Media(Wired Media): These media use wires for transmitting
data.
Various wired connections are twisted pair wire, coaxial cable and
fibre optic cable.
 Unguided Media(Wireless Media): A transmission media that does
not require the use of cables for transmission of data is know as
unguided media as the transmission takes place through various
types of electromagnetic waves, such as radio waves, infrared
waves, Microwave, satellite transmission etc.
TRANSMISSION MEDIA
 All the computers or communicating devices in the network, must
be connected to each other by a Transmission Media or Channel.
 A Transmission medium is a medium of data transfer over a
network
 The selection of media depends on the cost, data transfer speed,
bandwidth and distance.
1.TWISTED PAIR CABLE
 A Twisted pair cable is the oldest, simplest and the most common
type of conducted media.
 It is made of two plastic insulated copper wires which are twisted
together to form a single wire.
 Each wire is 1mm thick. Out of these two wires, only one carries the
actual signal while the other is used for ground reference.
 The wires so twisted are helpful in avoiding interference from the
nearby similar pairs, which is known as crosstalk.
1. TWISTED PAIR CABLE
 Advantages of Twisted Pair Cable:
(a) It is simple to use.

(b) It is inexpensive and does not require skilled personnel.


(c) These media can be used for both analog and digital data
transmission.
(d) If a portion of twisted pair cable is damaged, the entire network is
not shut.
(e) Signals can travel several kilometres without amplification.

 Disadvantages of Twisted Pair Cable:

(a) It is more difficult to connect to a terminating block.

(b) It easily picks up noise signals which results in higher error rates
when length exceeds 100 meters.
(c) Being thin in size, it is likely to break easily.
(d) It can support 19,200 bps up to 50 feet on RS-232 port.
2. COAXIAL CABLE
 A coaxial cable is generally called a coax wire.
 It consists of insulated copper wires surrounded by a braided metal
shield and covered in a plastic jacket.
 Coax cables are capable of carrying higher frequency signals than
twisted pair cables.
 The wrapped structure provides it a good shield against noise and
crosstalk.
 It provides high bandwidth rates of up to 450 mbps.
 There are 3 categories of Coax cables, RG-59, RG-58 and RG-11.
 It is widely used for internet connections and cable televisions.
2. COAXIAL CABLE
 Advantages of Coaxial Cable:
(a) It is widely used for cable television and internet connections.

(b) It is used for transmitting several channels simultaneously, i.e.,


they are helpful in broadband transmission.
(c) It has extra protective plastic cover that helps keep moisture away.
(d) It is relatively inexpensive compared to fibre optic cable.
(e) It is useful for transmitting alalog as well as digital data across the
network.
 Disadvantages of Twisted Pair Cable:
(a) A thick Coaxial cable does not bend easily and thus is difficult to
install.
(b) It is expensive as compared to twisted pair cable.
3. FIBRE OPTIC CABLE
 Fibre optic transmits light signals rather than electrical signals.
 Several glass fibres are bundled together and are encased in an
insulated covering.
 Light signals travel into the fibre optic cable at one end and are
received at the other end.
 When light enters the fibre optic, the light pulse inside the cable hits
the outer walls of the wire at a similar angle, which helps in moving
the light wave forward.
 The outer surface of the glass wire provides just the right angle
reflection to keep the light bouncing back and forth along the length
of cable.
 The light source used in this process is light emitting diode (LED).
3. FIBRE OPTIC CABLE
 Advantages of Fibre Optic Cable:
(a) It typically offers better bandwidth and can carry more information
at once.
(b) They are much thinner and lighter than metal wires.

(c) Lighter weight makes fibre easier to install.


(d) They are also used in the fields of research and development.
(e) A signal can run for 50 km without requiring regeneration.

 Disadvantages of Fibre Optic Cable:

(a) A highly skilled labour is required for its installation and


maintenance.
(b) It is relatively expensive as compared to other guided media.
(c) As fibre optic made of glass, it can be easily broken.
(d) As light travels in a straight line, two fibres are needed if we need
bidirectional communication.
1. MICROWAVE
 Microwave signals are used to transmit data without the use of
cable.
 It is a line-of-sight transmission as signal travels in a straight line.
 In Microwave communication, two directional parabolic antennas
are mounted on towers, buildings or hills to send and receive signals
through air.
 However, they must be properly aligned with each other, otherwise
the signal will not be focused well at the receiving antenna.
1. MICROWAVE
 Advantages of Micro wave:
(a) It is a cheaper source of communication as it avoids using cables
and maintaining repeaters.
(b) Communication through microwave is much easier over difficult
terrain.
(c) Microwave system permits data transmission rate of about 16
gigabits per second.
 Disadvantages of Micro wave:

(a) It is insecure mode of communication.

(b) Signals can be split and propagated in different directions in air


and received by the receiver antenna with a reduced strength.
(c) Microwave propagation is affected by whether conditions such as
rain, thunderstorm, etc.
2. RADIO WAVES
 Radio waves use radio frequencies
which are allocated to private
businesses for direct voice
communication.
 Radio set-up uses transmitter and
receiver.
 A transmitter sends radio waves and
encodes them into sine waves which,
when received by a receiver, are
decoded and the message is received.
 Both the transmitter and receiver use
antennas to radiate and fetch radio
signals.
 They are not lone-of sight
transmission and, hence, can
penetrate buildings easily.
2. RADIO WAVE
 Advantages of Radio Wave:
(a) They can be used indoors or outdoors.

(b) They are omnidirectional and can travel in any direction.


(c) Transmitter and receiver antenna do not need to be physically
aligned.
(d) Radio wave transmission offers mobility.
(e) It is cheaper than laying cables and fibres.

(f) It offers ease of communication over difficult terrain.


 Disadvantages of Radio Wave:

(a) Radio wave communication is an insecure mode of


communication.
(b) Radio wave propagation is susceptible to Weather effects like rain,
thunderstorm, etc.
3. INFRARED
 The type of transmission that uses infrared light to send data is
known as infrared transmission.
 The data is transmitted through air and propagate in the open space;
however, it cannot penetrate the walls of the room.
 It is an example of short range wireless network.
 Infrared speed varies from 2.4 kbps to 16 mbps.
 Example, Handheld remote control such as remote control of a TV or
AC, etc.
3. INFRARED

 Advantages of Infrared:
(a) It is secure medium of transmitting data.
(b) It is cheap mode of transmission.
 Disadvantages of Infrared:
(a) It can work only for short distances.

(b) It cannot penetrate walls and is affected by distance, noise and


heat.
NETWORK DEVICES

 Networking Devices are equipments that allow receive or transmit


data or signal.
Some common Network Devices are,
1) Modem
2) Ethernet card
3) RJ45
4) Repeater
5) Hub
6) Switch
7) Router
8) Gateway
9) WIFI card
MODEM
 A Modem is a device that connect Telephone line to computer.
 It converts digital signals into analog signals and vice versa. This
conversion requires because Telephone lines can’t carry digital data.
 There are modems connected to both the source and destination
nodes. The modem at sender’s end acts as a Modulator that
converts the Digital data into Analog signals while the modem at
receiver’s end acts as a Demodulator that converts the analog
signals into digital data for the destination node to understand.
 There are two types of modems, namely internal modem and
external modem
ETHERNET CARD

 It is a hardware device that helps


in the connection of nodes within
a network.
 Ethernet card is also known as a
network card, network adapter or
NIC (Network Interface Card). It
is a card that allows computers
to communicate over a
computer network.
 On Ethernet card, a physical
address of each communicating
computer is mentioned. Physical
address is known as MAC
address
RJ-45 CONNECTOR

 RJ-45 is standard type of


connector for network cables.
 The RJ-45 (Registered jack)
connectors are the plug-in
devices used in networking and
telecommunications
applications.
 They are used primarily for
connecting LANs, particularly
Ethernet.
REPEATER

 A Repeater is a device that operates


only on physical layer of the OSI
model.
 It is an electronic device that
receives a signal before it becomes
too weak and regenerates the
original signal.
 A repeater does not change the
functionality of the network; it
makes the signal strong before it
degrades.
 Repeaters are also extensively used
in broadcasting where they are
termed as translators or boosters.
HUB
 It is multi-port and unintelligent network
device which simply transfers data from
one port of the network to another.
 It is used to connect several computers
together with different ports.
 When packet reaches one port, it is copied
to all other ports of the hub without
changing the destination address in the
frame.
 Rather, it simply copies the data to all of the
nodes connected to the hub.
 Hubs can be either active or passive.
 A Hub can both send as well as receive
information, but only one task at a time.
 However, a hub is an expensive way to
connect multiple nodes/devices to network.
SWITCH

 A switch is a network device which is used to interconnect


computers or devices on a network.
 It filters and forwards data packets only to one or more devices for
which the packet is intended across a network.
 It is also multi-port device but with some intelligence and so the data
packets received from one port of network are refreshed and
delivered to the other port of the network.
 The main difference between hub and switch is that hub replicates
what it receives on one port onto all the other ports, while switch
keeps a record of the MAC address of the devices attached to it.
ROUTER
 A Router is a networking device that forwards data packets from the source machine
to the destination machine over a network by using the shortest path.
 Router are used at the network layer, which is the third layer of the OSI model.
 It uses IP address to connect a local are network to the internet.
 Compared to a hub or a switch, a router has advanced capabilities as it can analyze
the data being carried over a network, decide how it is packaged, and send it to
another network of a different type.
 For example, suppose data has been divided into packets of a certain size and these
packets are to be carried over a different type of network which cannot handle
bigger packets
 In such a case, the data is to be repackaged as smaller packets and then sent over
the network by a router
GATEWAY
 A gateway is a device that connects dissimilar networks.
 In internet, several networks are communicating with each other and
each network has a different configuration.
 In order to make reliable communication, there must be a device that
helps in communicating.
 Gateway provides the necessary translation of data received from
network into a format or protocol recognized by devices within the
internal network.
 It is a device that establishes an intelligent connection between a local
area network and external networks with completely different
structures
WI-FI CARD
 A Wi-Fi card is either an internal or
external Local Area Network adapter
with a built-in wireless radio and antenna.
 A Wi-Fi card is used in a desktop
computer that enables a user to
establish an internet connection.
 Wi-Fi cards are known as wireless fidelity
cards as they allow the user to set up
connection without any wire.
 Wi-Fi cards are widely used in notebook
computers due to their highly portable
nature.
 The most common Wi-Fi card used in
desktop computers is PCI-Express Wi-Fi
card made to fit the PCI-Express card slot
on the motherboard.
TYPES OF NETWORK
 A computer network may be small or big depending upon the
number of computers and other network devices linked together.
 A computer network can be on a table, in a room, building, city,
country, across continents or around the world.
 It can be divided into two types:
1) Client-Server network:- In this multiple clients or workstations
are connected to at least one central server.
2) Peer-to-Peer network:- In this all nodes in the network have
equivalent capability and function as both client and server
 On the basis of geographical spread, network may be classified
as:
1) Personal Area Network (PAN)
2) Local Area Network (LAN)
3) Metropolitan Area Network (MAN)
4) Wide Area Network (WAN)
PERSONAL AREA NETWORK (PAN)

 PANs are small networks used to


establish communication between a
computer and other handheld devices in
the proximity of up to 10 meters using
wired USB connectivity or wireless
systems like Bluetooth or Infrared.
 PANs are used to connect computers,
laptops, mobiles and other IT-enabled
devices to transfer files including emails,
digital photos, audio and video, etc.
 PAN may include wireless computer
keyboard and mouse, Bluetooth-enabled
headphones, wireless printers and TV
remotes.
LOCAL AREA NETWORK (LAN)
 LAN is a privately owned computer network covering a small
geographical area, like a home, office or a building such as school.
 A LAN can span a group of nearby buildings. I addition to operating in
a limited space, a LAN is owned, controlled and managed by a single
person or organization.
LOCAL AREA NETWORK (LAN)

 The geographical area covered by a LAN is owned, controlled and


managed by a single room, a floor, an office having one or more
buildings in the same premise, a laboratory, school, college or a
university campus.
 The connectivity is done by means of wires, Ethernet cables, fibre optics
or Wi-Fi.
 A LAN can be set up using wired media (UTP cables, coaxial cables, etc.)
or wireless media (Infrared, Radio waves).
 LAN users can share data, programs, printer, disk, modem, etc.
 Data transfer rate speed over a Local Area Network can vary from 10
Mbps to 1Gbps.
 Ethernet is a set of rules that decides how computers and other devices
connect with each other through cables in a local area network or LAN.
METROPOLITAN AREA NETWORK (MAN)
 MAN is larger than LAN and can cover
a city and its surrounding areas.
 It usually interconnects a number of
LANs and individual computers, also
shares the computing resources
among users.
 All types of communication media
(guided and unguided) are used to set
up a MAN.
 A MAN is typically owned and
operated by a single entity such as a
government body or a large
corporation.
 A good example of MAN is the
interconnected offices of a
Multinational Corporation (MNC) or
cable television networks available in
the whole city
WIDE AREA NETWORK (WAN)
 WAN is a telecommunication network. This type of network
spreads over a large geographical area across countries.
 WANs are generally used to interconnect several other types of
networks such as LANs, MANs, etc.
 They facilitate fast and efficient exchange of information at a high
speed and low cost.
WIDE AREA NETWORK (WAN)

 Internet is the largest WAN that connects billions of computers,


smart phones and millions of LANs from different countries.
 A network of ATMs, banks, government offices, international
organizations, etc. spread over the country
 All types of communication media (guided and unguided) are
used to set up a WAN. The best known example of a WAN is
the internet.
 The internet is the largest WAN spanning the entire planet.
NETWORK TOPOLOGIES
 Topology is the way of connecting devices with each other
either physically or logically.
 Two or more devices make a link and two or more links form a
topology.
 It is basically a geometrical representation of how a network is
laid out.
BUS TOPOLOGY
 Bus topology is a multipoint configuration, i.e., several devices
are connected to a main long cable which acts as a backbone.
 Nodes are connected by drop lines.
 The cable has terminators at both ends which absorb signals
when the signal reaches the end, preventing signal bounce.
 However, as the signal travels a long distance, it becomes
weaker and weaker.
 Therefore there should be limited number of nodes connected
to a line.
 Ethernet is a common example of bus topology.

Terminator
BUS TOPOLOGY
 Advantages of Bus Topology:-
1) Nodes can be connected or remove easily from bus network.
2) It requires less cable length than a star topology
3) Bus network is easy to implement and can extended up to a certain
limit.
4) It works well for small networks.

 Disadvantages of Bus Topology:-


1) If there is a fault or break in the main cable, the entire network shuts
down.
2) Terminators are required at both ends of the backbone cable.
3) Fault isolation is difficult to detect if the entire network shuts down.
4) When the network is required in more than one building, bus network
cannot be used.
5) The signal becomes weaker if number of nodes becomes large.
6) Performance degradation occurs with the increased number of
nodes.
STAR TOPOLOGY
 In Star topology, each communicating device is connected to a central
controller called hub or switch
 The devices in start topology send and receive data indirectly, the data
passes to and from the hub.
 If the data is required to be sent from one computer and received by
another computer, then this can be accomplished only by the central
controller as each data is first sent to the hub, which then relays that
data to the destination computer.
 The most popular and widely used LAN technology, Ethernet, currently
operates in Star Topology.
STAR TOPOLOGY
 Advantages of Star Topology:-
1) Installation and maintenance of network is easy and takes less time.
2) Fewer wires are required for installation.
3) It is easy to detect faults in this network as all computers are
dependent on the central hub.
4) The rate of data transfer is fast as all the data packets.
5) As the nodes are not connected to each other, any problem in one
node does not hamper the performance of other nodes in the
network.
6) Removal or addition of any node in star topology can take place easily
without the entire performance of the network
 Disadvantages Star Bus Topology:-
1) Extra hardware is required of central controller known as hub.
2) All nodes of star topology are dependent on central hub and,
therefore, any problem in the hub makes the entire network shut
down.
3) If Server is slow entire network also slow down.
TREE TOPOLOGY
 In tree topology, all the devices are connected to the central
hub, called active hub, and some of the devices are connected
to the secondary hub, which may be an active hub or passive
hub.
 An active hub contains the repeater that regenerates the
signal when it becomes weaker with longer distances.
 A passive hub simply provides a connection between all other
connecting nodes.
TREE TOPOLOGY
 Advantages of Tree Topology:-
1) The tree topology is useful in cases where a star or bus cannot be
implemented individually.
2) The network can be expanded by the addition of secondary nodes.
Thus, scalability is achieved.
3) Fault identification is easy
4) Each star segment gets a dedicated link from the central bus. Thus,
failing of one segment does not affect the rest of the network.
5) It is most suited in networking multiple departments of a university
or corporation, where each unit functions separately, and is also
connected with the main node.
 Disadvantages of Tree Topology:-
1) As multiple segment are connected to a central bus, the network
depends heavily on the bus. Its failure affects the entire network.
2) Though it is scalable, the number of nodes that can be added
depends on the capacity of the central bus and on the cable type.
3) Owing to its size and complexity, maintenance is not easy and costs
are high.
4) Configuration is difficult in comparison to other topologies.
NETWORK PROTOCOL
 A protocol is an agreement between the communicating parties
on how communication is to proceed.
 It means set of rules that governs a network.
 it is a formal description of message formats and the rules that
two or more machines must follow to exchange those
messages over a network.
 For example, using library books.
 Protocols also define:
* How computers identify one another on a network.
* The form to which the data should be converted for
transmission.
* How to ensure that all the data reaches the destination
without any loss.
* How to rearrange the packets and process them at the
destination.
TYPES OF PROTOCOLS
(1) TCP(Transmission Control Protocol)
(2) IP(Internet Protocol)
(3) FTP(File Transfer Protocol)
(4) SMTP(Simple Mail Transfer Protocol)
(5) (HTTPs)Hypertext Transfer Protocol Secure
(6) HTTP(Hypertext Transfer Protocol)
(7) VOIP(Voice Over Internet Protocol)
(8) POP3(Post Office Protocol 3)
(9) PPP(Point-to-Point Protocol)
(10) TELNET
1. TRANSMISSION CONTROL PROTOCOL (TCP)
 It is one of the main network in TCP/IP networks.
 The IP deals only with the packets but TCP enables two hosts
to establish a connection and exchange streams of data.
 TCP works with IP, which defines how computers sends
packets of data to each other.
 The packets are delivered not in a sequential order; instead,
they are delivered randomly. Now, TCP at the receiver side
collects all packets and arranges them in sequential order.
 TCP is a reliable stream delivery service that guarantees that
all bytes received will be identical with bytes sent and in the
correct order.
 Since packets are transferred over many networks and, thus,
not reliable, a technique known as positive acknowledgement
with retransmission is used to guarantee reliability of packet
transfers.
2. INTERNET PROTOCOL (IP)

 It is responsible for delivering packets from the source host to


the destination host based on the IP address mentioned in the
packets header.
 It forwards each packets based on a four byte destination
address (the IP number).
 The packets are moved randomly from source to destination,
which are then assembled in a sequential order at the
destination computer.
 IP stores destination addresses in the form of IP addresses so
that the packets will move to the destined address only by
following the shortest route
3. FILE TRANSFER PROTOCOL (FTP)

 FTP is the simplest and most secure way to exchange files


over the internet.
 The main objectives of FTP are:
* Transmitting and sharing of files.
* To transfer data reliably and efficiently.
* FTP uses the internet’s TCP/IP protocols to enable data
transfer.
 FTP is most commonly used to download a file from a server
using the internet or to upload a file to a server.
 While sharing files from one system to another, we may
encounter several problems, two systems may have different
file-naming conventions, or two systems may have different
ways to represent text and data. All these problems are solved
by FTP.
4. SIMPLE MAIL TRANSFER PROTOCOL (SMTP)
 It is used for sending email messages to other networks or
computers.
 It handles only outgoing messages and not incoming
messages.
 SMTP does not create messages; rather, it helps in forwarding
messages between client servers.
 It uses TCP to send messages to another host.
 For receiving messages, another protocol POP is used.
 Thus, email client require addresses of both SMTP server and
another server that processes incoming messages(usually
POP or IMAP).
 SMTP uses TCP port number 25 for standard communication.
 IMAP (Internet Mail Access Protocol) is used for accessing and
storing emails from a mail server over a TCP/IP connection.
5. HYPERTEXT TRANSFER PROTOCOL (HTTP)
 HTTP is used to transfer all files and other data from one
computer to another on the World Wide Web.
 This protocol is used to transfer hypertext documents over the
internet.
 It defines how the data is formatted and transmitted over the
network.
 When an HTTP client sends a request to an HTTP server, the
server responses back to the client.
 This transfer of request and responses is done following HTTP
protocol.
 The main features of an HTTP protocol are:
1. It is a stateless protocol; this means that http server need
not keep track of any command and each command is
independent of any other command.
2. It is an object-oriented protocol that uses client server model.
3. The browser sends request to server, the server processes it
and sends responses to the client.
4. It is used for displaying web pages on the screen.
6. HYPERTEXT TRANSFER PROTOCOL SECURE (HTTPS)
 HTTPS stands for Hyper Text Transfer Protocol Secure.
 It is a protocol for securing communication between two
systems, e.g., the browser and the web server.
 HTTP transfers data between the browser and the server in
the hypertext format, whereas https transfers data in the
encrypted format.
 Thus, https prevents hackers from reading and modifying data
during the transfer between the browser and the web server.
 Even if the hackers manage to intercept a communication,
they will not be able to use it because the message is
encrypted.
7. VOICE OVER INTERNET PROTOCOL (VOIP)
 It is used for transferring of voice, over Internet Protocol.
 The voice calls are first digitized, compressed and then fragmented
into small packets, which are then relayed by Internet Protocol (IP)
cross network.
 It enables user to carry voice traffic (e.g., telephone calls and faxes)
over an IP network.
 So, VOIP can be achieved on any data network that uses IP, like the
internet and Local Area Network.
 It allows both voice and data communications to be run over a single
network, which can significantly reduce infrastructure costs.
 Services provided by VOIP are:
1. Phone to phone 2. PC to phone
3. Phone to PC 4. Fax to email
5. Email to fax 6. fax to fax
7. Voice to email 8. IP phone
9. toll free number 10.Call centre Applications
8. POST OFFICE PROTOCOL 3 (POP3)
 It is a simplest and standard method to access mailbox and
download messages to the local computers.
 The advantages is that once the messages are downloaded, an
internet connection is no longer needed to read the mail.
 A user and read all emails offline as these are saved on the
computer’s hard disk.
 It sends text commands to the POP server like SMTP protocol.
 There are two main versions of this protocol – POP2 and POP3 –
to which ports 109 and 110 respectively are allocated and which
operate using radically different text commands.
 To get email from POP server, a user must enter a valid username
and password for their email account.
 The POP3 thus manages authentication using the user name and
password; however, it is not secure because the passwords, like the
email, circulate in plain text over the network.
 POP3 protocol blocks inbox during its access which means that
simultaneous access to the same inbox by two users is impossible.
9. POINT-TO-POINT PROTOCOL (PPP)
 It is most commonly used data link protocol.
 It is a protocol used to establish a direct connection between two
nodes.
 It can provide connection authentication, transmission encryption
and compression.
 It is used to connect the Home PC to the server of ISP.
 PPP is used to connect telephone dial-up lines to the internet.
 Internet service provider may provide you with a PPP connection so
that when you send any request, the provider’s server can respond to
your requests, forward it to the internet server, and then forward
responses back to you.
 The various features of PPP are:
1) Establishing the link between two devices.
2) Maintaining this established link
3) Configuring this link.
4) Terminating this link after the transfer.
5) PPP provides error detection.
6) It supports multiple protocols.
7) It also defines how two devices can authenticate each other.
10. TELNET

 Telnet protocol allows a user to communicate with remote machine.


 A user who is logging in to their own system can also get access to
log on to another user system and perform various functions such as
accessing files from or sharing files to the remote system with the
help of command line interface.
 With Telnet, a user logs in as a regular user with whatever privileges
that may have been granted to the specific application and data on
that computer.
10. TELNET
Working of Telnet:-
1) A user is logged in to the local system and invokes a Telnet program
by typing telnet<host address> or telnet<IP address>
2) The Telnet client is started on the local machine. The client then
establishes a TCP connection with the Telnet server on the
destination system.
3) Once the connection has been established, the client program
accepts characters from the keyboard feed by the user and passes
one character at a time, to the Telnet server.
4) The server on the destination machine accepts the characters sent
to it by the client and passes them to the terminal server.
5) The terminal server gives outputs back to the Telnet server and
displays them on the user’s screen.
The user can terminate the Telnet session by typing LOGOFF or
LOGOUT on the system prompt.
INTRODUCTION TO WEB SERVICES
WWW (World Wide Web):-
 It is an information service that can be used for sending and receiving
information over the internet through interlinked hypertext
documents.
 Web pages may contain text, images, videos and other multimedia
components as well as navigation features consisting of hyperlinks.
 The documents are formatted in a mark-up language called HTML
that provides links to other documents as well as graphics, audio and
video files.
 The WWW is based upon client-server architecture where a client
sends a request and the server processes that request and sends
responses.
 WWW client is called a web browser and a WWW server is called a
web server.
HTML(HYPERTEXT MARKUP LANGUAGE)
 HTML is a language that is used to create web pages which are then
displayed by web browsers.
 This language tells the browser how to display text, pictures and links
on the screen.
 This language supports multimedia documents and consists of audio,
video, graphics, pictures, etc.
 It also helps in creating hyperlinks so that various documents can be
linked together.
 HTML document can be written using any text editor such as Notepad
and save a file with extension ‘.html’.
 It contains at least three elements – HTML, HEAD and BODY.
 These elements are specified by the following respective tags:
1) <HTML>……</HTML>
2) <HEAD>……</HEAD>
3) <BODY>…….</BODY>
XML(EXTENSIBLE MARKUP LANGUAGE)
 XML is a text-based Markup Language that allows the user to create
their own tags to store data in a structured format.
 In XML, the tags are not predefined; rather, they are created by the
user for their own purpose.
 Unlike HTML, in XML, tags are case-sensitive and each tag must have
a corresponding closing tag.
 It was designed to carry data and not to display data.
 For formatting data, a separate style sheet known as cascading style
sheet is used.
 XML is recommended by the World Wide Web Consortium (W3C). It is
a free open standard.
 Structure of XML documents:
<?xml version=“1.0”>
<Client_Detail>
<Client>
<Clientid> C100 </Clientid>
<Clientname> Johnson </Clientname>
</Client>
</Client_Details>
</xml>
DOMAIN NAMES
 To communicate over the internet, we can use IP addresses. But it is
not possible to remember the IP address of a particular website or
computer every time.
 Domain names make it easier to resolve IP addresses into names,
for example, cbse.nic.in, google.com, meritnation.com, etc.
 It is the system which assigns names to some computers(web
servers) and maintains a database of these names and
corresponding IP addresses.
 A domain name consists of the following parts:

1. Top-level domain name or primary domain name:-


(a) Generic Domain Names
.com – commercial business
.edu – educational institutions
.gov – government agencies
.org – organizations
.net – network organizations
.mil – Military
DOMAIN NAMES
(b)Country-Specific Domain Names
.in – India
.us – United States of America
.au – Australia
.ca – Canada
.ch – China
.pk – Pakistan
.jp – Japan
.nz – New Zealand

2. Sub-domain name(s):-
For example,
In the domain name cbse.nic.in:
 ‘in’ is the primary domain name
 ‘nic’ is the sub-domain name
 ‘cbse’ is the sub-domain of nic
URL (UNIFORM RESOURCE LOCATOR)

 URL stands for Uniform Resource Locator that helps in locating a


particular website or a web page.
 It stores the address of a web pages.
 For Example, http://www.academics.html is a URL for a specific
website.
 In this URL, ‘http’ stands for hypertext transfer protocol, and
www.cbse.nic.in indicates the IP address or the domain name where
the source is located.
 ‘academics.html’ specifies the name of the specified html document
on the website cbse.nic.in.
WEBSITE

 A website is a collection of various web pages, images, videos, audios


or other kinds of digital assets that are hosted on one or several web
servers.
 The first page of a website is known as home page where all the links
related to other documents are displayed.
 The web pages of a website are written using HTML and the
information is transferred over the internet through HTTP protocol.
 The HTML documents consist of several hyperlinks that are accessed
through HTTP protocol.
 Examples of various websites are:
cbse.nic.in, google.com, amazon.in, etc.
WEB BROWSER

 It is a software that helps in accessing web pages and, thus is also


called web client.
 It helps the user to navigate through the World Wide Web and
display web pages.
 Some popular web browsers are:
Mozilla Firefox, Opera, AOL, Google Chrome, Internet Explorer
WEB SERVER
 It is used to stores web pages and when a client sends any request
to a server, the server responds to the request and displays the
requested web pages.
 A web server is a program that runs on a computer connected to
the internet.
 Web server waits for a request, finds the documents and generates
information, if required, and sends it back to the browser that
requested for it.
 A single web server may support multiple websites, or a single
website may be hosted on several linked web servers.
 Some popular web servers are:
Apache web server, Netscape enterprise web server, Microsoft
internet information server, etc.

Sends request
WEB WEB
BROWSER Sends response SERVER
Fig. Sending and Receiving Request
WEB HOSTING
 Web hosting is a service which is provided by companies to its
clients to allow them to construct their own websites which are
accessible to the internet users via World Wide Web.
 Such companies are known as web hosts.
 These companies provide space on a web server they own for use
by their clients as well as provide internet connectivity.
 The website which are constructed display information for their
organization in the form of web pages.
 The host may also provide an interface or control panel for
managing the web server so as to add news and events related to
their organization or for uploading some information which may be
valuable for the internet users.
 A client can also use control panel for installing scripts as well as
other modules and service applications like email.
 webhostingsitesindia.co.in is one of the top domain name
registration and web hosting companies in India.
 It is the only hosting company which provides support in regional
languages.
THANK YOU!!!

ASHWINI BAMBALE
PGT(CS)

You might also like