Networking Concepts
Networking Concepts
Networking Concepts
Networking Concepts
Computer networks:
A computer networks is an interconnection of two or more computers that
are able to exchange information.
Disadvantages of networking:
Expensive to install: The initial cast of installation is very high.
Requires administrative time: Proper maintenance of the network
requires considerable time and expertise.
Server failures: when the server goes down the entire network may come
to halt when this happens, the entire network may loose the access to
necessary programs and files.
Cable may break : If the main cable breaks the entire network stops its
working.
Network Protocol:
Protocol : A set of rules and procedures that determine how a computer systems
receives and transmits data
Network protocol means the rules that are applicable for a network.
It defines the standardized format for data package, techniques for deleting
and correcting errors and so on.
A protocol is formal description of message formats and the rules that 2 or
more machines must be followed to exchange those messages.
Internet
It is a network of networks that needs to operate around the world as if it
were one
The internet backbone is a network of high – capacity communications links
that provides the main routes for data traffic across the internet
Inter space:
Inter space is a client / server software applied that allows multiple users
to communicate online with real- time audio video and text chat.
Server : It is a specially designated computer where all the shareable stuff are
stored and able to process requests and deliver data to other s/m over a
network.
Types of networks:
Networks can be classified on the basis of their size, complexity and
geographical spread. Depending upon the geographical area covered by a
network, It is classified as,
(a) Local area Network (Lan)
(b) Metropolitan Area Network (MAN)
(c) Wide Area Network (WAN)
Network Topologies:
Topology refers to the arrangement computers and other devices in a
network
Network topologies can be classified as follows:
1) Bus Topology
2) Star Topology
3) Ring Topology
4) Mesh Topology
5) Tree Topology
A bus topology uses one main cable to connect all of the s/m together
Used in small Networks.
A bus topology is very easy to set up and requires no additional
hardware
Data flow takes place in single direction
Cost effective
It is slower and dependent on main cable
If main cable fails all the other s/m’s will also fails.
Advantages :
A bus topology requires less cost
A bus topology uses less cable and other devices such as hubs and
switches
Easy to install
It is easy to work with and a minimal amount of additional devices are
required
Disadvantages :
Difficulty of trouble shooting, when the network goes down
The bus topology is not very scalable (extendable)
2. Ring Topology:
In Ring topology computers are connected via a cable that loops in a ring
or circle
The data travels in one direction from node to node around the ring
Advantages:
Signal de generation is low because each computer is responsible for
regenerating or boosting the signal.
Suitable for optical fibers.
Each computer has equal access to resources.
Requires less cable length than star topology.
Disadvantages:
If one computer fails or the cable link is broken, the entire network could
go down
Isolating a problem can be difficult in some ring configurations
A small movement or cabling change can interrupt or bring down the
entire network
3. Star Topology :
In star topology all computers are connected through one central device
known as a hub or switch
It is the topology used in most existing networks involving data
processing or voice communications
Advantages :
Easy to add new system to the network
If there is a break in the cable it affects only the system that is connected
to that cable
It is easy to add or change configurations
Disadvantages:
If the switch fails the entire network comes down
Installation cost is high
Disadvantage:
Installation cost is very high
Tree Topology combines the characteristics of the linear bus and the star
topologies
It consists of groups of star configures computers connected to a bus
Advantages:
Eliminates network congestion
The network can be easily extended
Faulty nodes can easily be isolated from the rest of the networks
Disadvantages:
Uses large cable length
Requires a large amount of hardware components and hence it is
expensive
Installation and reconfiguration is very difficult
Types:
(a) Twisted pair
Unshielded Twisted pair (UTP)
Suma AJ Dept. of Computer Science Page 12
Networking Concepts
Advantages:
Reduces cross talk’s
Prevents from external form of signal interference
Simple and physically flexible
Low weight and cheaper
Easy to connect and maintain
Disadvantages:
Carrying a signal for a large distance without repeater is impossible
Its lower bandwidth capabilities make it unsuitable for broadband
applications
UTP is the copper media inherited from telephone wires, which is being
used for increasingly higher data rates
UTP is a very flexible low cost media, and can be used for either voice or
data communications.
The disadvantage is the limited bandwidth which restricts long distance
transmission with low error routes
Twisted pair is commonly used for LAN
STP include two individual wires covered with a foil shielding , which
prevents electromagnetic interference, there by transporting data faster.
STP is similar to unshielded twisted pair (UTP), it contains an extra foil
wrapping or copper mesh jacket
STP are costlier than UTP
Advantages:
It is easy to install and maintain.
Disadvantages:
It is incapable to carry a signal over long distances without the use of
repeaters.
These are not suitable for broadband application
Thick net : The thick net co-axial cable segments can be up to 500 meters
long.
Thin net: This form of co-axial cable is thinner and it can have maximum
segment length of 185 meters.
Advantages:
Data transmission rate is better than twits pair cables
Used for broadband transmission
Higher bandwidth upto 400 mbps
Disadvantages:
Expensive than twisted pair cables
Difficult to manage and reconfigure
(c)Optical Fibers:
Advantages:
Transmits data over long distance with high secuiry
Data transmission speed is high
Provide better noise immunity
Bandwidth is up to 100 Gbps
Disadvantages:
Expensive as compared to other guided media
Need special care while installation
Difficult to repairs.
2. Unguided media:
Unguided transmission media the data signals How through the air. They
are not guided or bounded or covered to channel to follow
Advantages:
Free from land acquisition rights.
Provides easy communication ever difficult places
Provide mobility.
In Expensive.
Disadvantages:
Insecure Communication
Susceptible to weather effects.
Advantages:
The area coverage through satellite transmission is quite large
The maintenance of intercontinental cable is easy in satellite
communication.
Towers are not required
They can carry high quantities of information due to their high operating
frequencies.
Disadvantages:
Reflected from Hat Surface like water and metal
Diffracted (Split) around solid objects.
Reflected by atmosphere, thus causing beam to be projected away from
receiver.
Suma AJ Dept. of Computer Science Page 17
Networking Concepts
c. Infrared transmission:
This type of transmission uses infrared light to send the data. The infrared
light transmits data through the air and can propagate throughout a room
But will not penetrate walls. The infrared transmission commonly used PDA'S
[Personal digital Assistants]
d. Laser transmission:
The laser transmission required direct Line-of-sight It is unidirectional
like microwave and much speed than microwaver
The laser, transmission requires the use of a transmitter and a photo
sensitive receiver at each end.
The laser transmission is point – to- point transmission
There are 3 types of switching techniques available for digital data transfer
1. circuit Switching:
It is a method of implementing a telecommunication network in which two
networks nodes establish a dedicated communication channel through the
network before the nodes may communicate
The circuit guarantees the full bandwidth of the channel and remains
connected for the duration of the Communication session. The Circuit
functions as if the nodes were physically connected as with an electrical
circuit.
Suma AJ Dept. of Computer Science Page 18
Networking Concepts
Communication modes:
Depending on the type of media used one of three distinct transmission modes
is available.
Network Devices:
Servers: It is a very fast computer with a large amount of RAM and Storage
space, along fast network interface card.
workstation / client: All the computers other than the server connected to a
network are called work station or client
Network Interface cards: The network Interface card (NIC) provides the
physical connection b/w the network and the computer work station.
Switch : switch is a device that channels incoming data from any of multiple
input ports to the output Port
Gateway:
A gateway is a device that connects dissimilar networks.
A gateway is a hardware device that acts as a "gate" between 2 networks.
It is node on network that provides entry to another network.
It performs data translation and protocol conversions.
Modem: The modem modulates the signal at the sending end and demodulate
at the receiving end.
Wireless Computing:
Wireless refers to the method of transferring information b/w a computing
device and a data source, without physical connection.
GSM [Global system for mobile communication]: GSM is the one of the
leading digital cellular systems.
GSM uses narrowband, which allows eight simultaneous calls on the same
radio frequency.
Generations of Networks:
a. 1G Network :
1G Network are considered to be the first analog cellular technology
system which was started in early 1980's
Data bandwidth 2 kbps.
Service mobile telephony (voice).
Circuit Switching is used.
b. 2G Network:
2G Network started in early 1990's.
Data bandwidth 14 to 64 Kbps
Standards used COMA, GSM, GPRS, EDGE
Digital cellular technology was used,
Service - Digital voice, short messaging.
Uses circuit switching for network access and packet switching for core
network and data
c. 3G Network
It was Started in 1990 to 2002 data bandwidth 2 mbps.
Broad band, CDMA, IP technology
Service Integrated high quality audio video and data
Both Circuit and packet Switching.
d. 4G Network:
This technology was in b/w 2000 to 2010
Data bandwidth 200mbps to 1Gbps for low mobility.
Technology used is unified IP and combination of broadband, LAN/WAN
etc.
Service-Dynamic information access portable and Wearable device.
Uses all types of switching techniques.
e. 5G Network:
2. E-mail:
E-mail is sending and receiving message by computer
E-mail is an extremely cost-effective way to move information around,
especially when it must be moved quickly.
E-mail can be delivered almost as fast as the wire can carry it.
3. Voice mail:
The voice-mail refers to e-mail systems. that support audio.
Users can leave audio message.
Voice message or voice mail is a method of storing voice massages
electronically for later retrieval by intended recipients. Callers leave
short messages that are stored on digital media or in some older
Systems, on analog recording tape.
4. Chat:
Chatting is talking to other people who are using the internet at the
same time.
Chatting is exchange of typed in messages requiring one site as the
repository for the messages or "chat site".
5. Video conferencing:
Video conferencing is a two-way video phone conversion among multiple
participants. To make use of video conferencing you need to install a
Computer Viruses:
A computer virus is a program that enters a computer usually without the
Knowledge of the operator.
Types of viruses:
1. File viruses: A file infecting virus is a type of malware that infect
executable files with the infects cause permanent damage or make them
unusable.
2. Boot Sector Viruses: A Boot Sector viruses is a Computer virus that
infects virus a strange device's master boot record. These viruses сору
their infected code either to the floppy disk boot Sector or to the hard
disk.
3. Macro viruses: A macro viruses is a computer virus written in the same
macro language used for the software programs.
When a macro virus infects a software application it causes a sequence
of actions to begin automatically when the application is opened.
4. Network viruses : These are new type of malware that Spreads from
computer to other computer without having to drop a file based сору.
The virus can hide on any computer in an infected network
5. Bomb viruses: A logic bomb is a piece of code infects an operating
system or software application that implement a malicious function after
a certain amount of time or Specific Conditions are met.
6. Worm Virus: A computer worm is a standalone malware computer
program that replicates itself in order to spread to other computers .
often, it a computer network to Spread itself..
7. Trojan Horse: A Trojan horse is a type of malware that is often disguised
as legitimate Software Trojan can be employed by cyber-thieves and
hackers trying to gain access to users systems.
Protection methods:
(a) Authorization: Determines whether you are authorized to access the
resources.
The method of giving access to only authorized person. This can be done
by using, a legal Login- id and password.
(b) Authentication: Confirms user's identity to grant access to system it
ensures that each entity involved in using a web service the requestor,
the provider and the broker etc. is what it actually claims to be
(c) Encrypted smart cards: The hand-held Smart card can generate a
token that a computer system can recognize. Every time a new and
different token is generated which even though Cracked or hacked,
cannot be used later.
(d) Bio-metric Systems: This method involve identifying some unique
aspect of a person's body such as finger prints, retinal patterns etc.
(e) Fire wall: A System designed to prevent unauthorized access to or from
a private network is called firewall.
(f) Packet filter: It looks at each packet entering or " leaving the network
and accept or reject it based on User defined
(g)Application gateway: This type of firewall security mechanisms to
Specific application.
(h)Circuit-level gateway: This type of firewall applies mechanisms when a
connection is established.
(i)Proxy Server: This type of firewall intercepts all messages entering
leaving the network. The proxy server effectively hides the true network
addresses.
(j)Intrusion detection: This type of firewall senses the unauthorized
intruders trying to access the system and then denies the access to such an
authorized persons.
Cookies: Cookies are messages that a web Server transmits to a web browser
so that a web server can keep track of the user's activity.
Cracker: A cracker is one who breaks into or otherwise violates the system
integrity of remote machines.