0% found this document useful (0 votes)
29 views81 pages

Networking

The document provides an overview of computer networking, including definitions, evolution, components, and types of networks. It discusses various data communication terminologies, switching techniques, network devices, and protocols essential for data exchange. Key topics include wired and wireless media, network topologies, and specific protocols like TCP/IP and FTP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views81 pages

Networking

The document provides an overview of computer networking, including definitions, evolution, components, and types of networks. It discusses various data communication terminologies, switching techniques, network devices, and protocols essential for data exchange. Key topics include wired and wireless media, network topologies, and specific protocols like TCP/IP and FTP.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

COMPUTER

NET WORKS
(CBSE CLASS XII)
INTRODUCTION TO NETWORKING
• Network: A computer network is a set of computers connected
together for the purpose of sharing resources. Each computer on
the network is called a node.

• Networks can be connected via cable, telephone line, radio waves,


satellite, infrared etc.
EVOLUTION OF NETWORKING
• ARPANET (Advanced Research Projects Agency NETwork): In 1969, The US
Department of Defense Sponsored a project named ARPANET to connect
computers at various universities and US defense .

• In mid 80’s another federal agency, the National Science Foundation created a
high capacity network called NSFnet, which was more capable than ARPANET
and was strictly used for academic and engineering research.

• In 1990s the internetworking of ARPANET, NSFnet and other private networks


resulted into internet.
EVOLUTION OF NETWORKING
• The Internet (INTERconnection NETwork): : The Internet is a worldwide
network of computer networks. It is not owned by anybody.
• It allows the different computers to exchange Information with each
other.
• Email, audio-video conferencing, file transfer, instant messaging, financial
services, social networking, games etc. are some services supported by
the Internet
EVOLUTION OF NETWORKING

• The Interspace: it is a client/server software program


that allows multiple users to communicate online with
real-time audio, video and text chat in dynamic 3D
environments.
COMPONENTS OF DATA COMMUNICATION
COMPONENTS OF DATA COMMUNICATION
DATA COMMUNICATION
TERMINOLOGIES
• Data Channel: It is a path through which a message can
be transmitted. It can be a guided (wired) or unguided
(wireless) channel. It can be best referred as transmission
media.

https://www.youtube.com/watch?v=A_-L-kn9biw
Bit rate is the number of bits
transmitted during one second

Baud rate : Is the number of


signal units per second that are
required to represent those bits
SWITCHING TECHNIQUES
• Switching Techniques:
• In large networks, there may be more than one paths for transmitting
data from sender to receiver.
• Selecting a path from the available options is called switching.
• There are two popular switching techniques –
– circuit switching and
– packet switching.
CIRCUIT SWITCHING
• A dedicated path is established first between the sender and receiver.
• Then data transfer takes place on that same path.
• It is preferred for its reliability .
• It is used in Public telephone networks for voice communication.
PACKET SWITCHING
• No dedicated path is established from the source to the destination.
• The entire message is divided into smaller pieces, called packets.
• These fixed size packets are sent individually over the network. All packets are having
source and destination address.
• They may follow the different routes.
• When all the packets reach the destination, they are reassembled and the complete
message is received by the receiver
• It is used when speed is more important than reliability.
Electromagnetic interference (EMI) is a disturbance caused by an
electromagnetic field which impedes the proper performance of an electrical device. EMI can come
from man-made or natural sources such as the sun or the Earth’s magnetic fields.

Crosstalk :The bleeding of a signal from one wire to another and which can corrupt signal
and cause network errors. This form of signal interference is called Crosstalk.

Attenuation Means loss of energy. When a signal travels through a medium for longer distance
it loses some of its energy in overcoming the resistance of the medium. Thus repeaters can be inserted
along the length of the cable to boost the signal strength
WIRED (GUIDED) MEDIUM: TWISTED PAIR
❑Twisted pair consist of two conductors (normally copper) each with its own plastic insulation,
twisted together.
❑The twists are done to reduce EMI and cross talk. (https://audiouniversityonline.com/twisted-pairs/)
❑These cables uses either voice grade or data grade cabling
❑Voice Grade Medium(VGM) is used for internal office telephone wiring
❑Data Grade Medium is used in LAN applications which has higher quality and speed
TYPES OF TWISTED PAIR
❑There are two types of twisted pairs cabling
• 1. Unshielded Twisted Pair (UTP)
• 2. Shielded Twisted Pair (STP)
TYPES OF TWISTED PAIR
• 1. shielded Twisted Pair (UTP)

It is similar to UTP but has a mesh shielding that’s protects it from EMI which allows for higher
transmission rate
TYPES OF TWISTED PAIR
• 1. Unshielded Twisted Pair (UTP)
WIRED (GUIDED) MEDIUM:COAXIAL CABLE
• Co-axial Cable
❑Example - TV wire is usually coaxial cable.
❑The center conductor in the cable is usually copper wire through which data travels.
❑Outside this central Conductor is a non-conductive material (insulation),usually white,
plastic material used to separate the inner Conductor form the outer Conductor.
❑The other Conductor is a fine mesh made from Copper. It is used to help shield the cable
form EMI(Electro magnetic Interference).
❑Outside the copper mesh is the final protective cover.
❑EMI interference is caught by outer copper mesh.
TYPES OF COAXIAL CABLE
• Types of Co-axial Cable
FIBRE OPTIC CABLE TRANSMITS SIGNALS IN THE
FORM OF LIGHT

WHEREAS

COAXIAL CABLE AND TWISTED PAIR CABLES


TRANSMITS SIGNALS IN THE FORM OF ELECTRIC
CURRENT
WIRED (GUIDED) MEDIUM:OPTICAL FIBRE CABLE
• Optical fiber:
❑An optical fiber consists of thin glass fibers that can carry information in the form of
visible light.
❑At the center of fibre cable is a glass strand or core. Light from the laser moves through this
glass to the other device.

❑-The glass is surrounded by a cladding which is a reflective material. No light escapes this
glass core because of this reflective cladding.
❑Protective coating – which protects the fiber cable from hostile environment.
TYPES OF FIBER OPTIC CABLE
❑Single node - that supports a segment length of upto 2km and bandwidth of upto 100 Mbps
❑Multinode – with a segment length of 100 kms and bandwidth of 2 Gbps.
COMPARISON TABLE
Wireless/ Unguided media

a. RADIO WAVES
b. MICRO WAVES
c. INFRARED WAVES
1. Radio Wave transmission

Terrestrial Micro Wave


transmission

2. Micro Wave transmission

Satellite micro Wave


transmission
3. Infrared Wave transmission
NETWORK DEVICES
• Modem (MOdulator DEModulator) is an electronic device which converts digital
signals into analog signals for transmission over telephone lines (Modulation).
• At the receiving end, a modem performs the reverse function and converts
analog signal into digital form (Demodulation)
• A modem can also amplify a signal so that it can travel a long distance without
attenuation.
NETWORK DEVICES
• RJ-45 (Registered Jack – 45) is an eight wired connector that is used
to connect computers on a local area network (LAN), especially
Ethernet.
• (Ethernet is a LAN architecture and uses either a bus or star topology)
NETWORK DEVICES
• Ethernet Card –
• Ethernet card, also known as Network Interface Card (NIC card ) is a network adapter used to set up a wired
network
• The Ethernet cable connects the computer to the network through NIC
• Ethernet cards can support data transfer between 10 Mbps and 1 Gbps (1000 Mbps)
• The NIC manufacturer assigns a unique physical address to each NIC card, this physical address is known as
MAC address.
• The MAC address(Media Access Control) helps in uniquely identifying the computer on the network
NETWORK DEVICES
• Ethernet Card –
• NIC is the generic “Network Interface Card” for any network technologies like
Ethernet, Token ring etc. but Ethernet Card is a type of NIC specific to Ethernet
technology.

• Ethernet card contains connections for


• either coaxial cable(BNC Connector – Bayone-Neill- Concelman) or
• twisted pair cables(RJ-45) or
• Both(AUI Connector – Attachment Unit Interface)
NETWORK DEVICES
• Switch/Hub is an electronic device that connects several nodes to form a network
and redirects the received information to the destination. It has ports into which
the cables from individual computers' NICs are inserted.
• Switch is an intelligent hub redirects the received information only to the
intended node(s).
• Hub broadcasts the information all the connected nodes.
Switch/ Hub
• Hubs can be either passive or active
• Passive Hub : allows the signal to pass form one computer to another without
any change.
• Active Hub : amplifies the signal as it moves from one connected device to
another
NETWORK DEVICES
• Repeater When the data is transmitted over a network for long distances, the
data signal gets weak due to attenuation.
• A repeater regenerates the received signal and re-transmits it to its destination.
NETWORK DEVICES
3. Bridge
• A bridge is a device that connects a local area network (LAN) to another
local area network that uses the same protocol.

• A bridge examines each message on a LAN, "passing" those known to be


within the same LAN, and forwarding only those known to be on the other
interconnected LAN (or LANs).
NETWORK DEVICES
4. Router
❖A device that works like a bridge but can handle different protocols is known as a router

❖A router is a device or a software in a computer that determines the next network point to
which a packet should be forwarded toward its destination

❖A router creates and maintains a table (Routing tables) of the available routes and their
conditions and uses this information along with distance and cost algorithms to determine
the best route for a given packet

❖A router differs from a bridge in a way that former uses logical address(IP address)
and the latter uses physical addresses(MAC address)
NETWORK DEVICES
• Gateway: It is an networking device which enables to connect two
dissimilar networks.
• It establishes an intelligent connection between a local network and
external networks with completely different structures.
NETWORK DEVICES
• Wi-Fi card: it is a small device which enables a
computer to connect to a wireless network.

• It is either and internal or external Local Area Network


Adapter with a built-in wireless radio and antenna.

• The most common wifi cards used in desktop


computers are PCI-Express Wifi cards made to fit PCI –
Express card slots on the motherboard.
TYPES OF NETWORK
T YPES OF NET WORK
PARAMETERS PAN LAN MAN WAN
Area covered Spread in the Spread across a small Covers group of office or Covers large geographical
proximity of an geographical area, nearby city area, country or continent
individual covering office or building
Network Owned, Privately owned by single Owned and operated by a Not owned by anyone,
ownership controlled, and person or organization government body or a WANs is interconnected
managed by a large corporation computers, LANs, MANs,
single person and maybe other WANs
Communicati Set up using Set up using wired media Set up using all types of all Set up using all types of all
on medium guided media (UTP cables, Co-axial guided and unguided guided and unguided
(USB cable) or cables etc.) or wireless media media
unguided media media ( Infrared, radio
(Bluetooth, waves) i.e. WLAN
Infrared). (wireless LAN)
Cost Less expensive Less expensive Expensive than LAN Most Expensive

Example Transferring songs Network in an A network of schools, or Internet


from one cell organization banks, or Government
phone to another offices etc.
Topology
The pattern of interconnection of nodes in a network is called the Topology.

Factors to be considered while choosing a toplogy


1. Cost : One should to try to minimize the installation cost

2. Flexibility : The topology should allow for easy reconfiguration of the


network.

3. Reliability : The topology chosen should easily detect the location of faulty
node and provide some means of isolating it.
▪ Transmission takes
place similar to a
bus topology.
▪ Also called hybrid
topology
▪ Ease of Service : The star topology has
number of concentration points which
provides easy reconfiguration of
network

▪ If backbone fails entire


segment goes down
NETWORK TOPOLOGIES
NETWORK PROTOCOL

• A protocol is a formal description of message formats and


the rules that two or more machines must follow to
exchange those messages
NETWORK PROTOCOL

• TCP/IP (Transmission Control Protocol / Internet Protocol):


• Communication between two computers on internet is done using TCP/IP protocol.
• It provides reliable delivery of messages between networked computers.
• TCP/IP is a two-layer protocol.
• ➢ Using the TCP protocol a single large message is divided into a sequence of packets of
size limits.
• ➢ Each packet is independent and has the address of sender and destination.
• ➢ The IP (Internet protocol) does the routing for the packets. It keeps track of all the
different routes available to the destination. If one route is not available it finds the alternate
route to the destination.
• ➢ At the destination, the TCP protocol re-assembles the packets into the complete message.
• ➢ If any packets are lost or damaged, a request is sent to retransmit the same message
FTP (FILE TRANSFER PROTOCOL)
• The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of
files across internet.
• The objectives of FTP are:
• ➢ To promote sharing of files (computer programs and/or data).
• ➢ To encourage indirect or implicit (via programs)use of remote computers.
• ➢ To shield a user from variations in file storage systems among different hosts.
• ➢ To transfer data reliably, and efficiently
• Ex. Filezilla FTP software
ELECTRONIC MAIL PROTOCOLS
• Simple Mail Transfer protocol (SMTP):
• It is used when you want to send email to another email users.(the recipient)
• The SMTP protocol can only be used to send emails not to received them.
ELECTRONIC MAIL PROTOCOLS
• Post Office Protocol Version 3 (POP3):
• It provides a simple way for the users to access mailboxes and download messages to
their computers.

• IMAP (Internet Message Access Protocol)


• IMAP is a standard protocol for accessing e-mail from local server.
• POP3 downloads the email from a server to a single computer, then deletes the email
from the server. It is a protocol for receiving email on a single device
• On the other hand, IMAP stores the message on a server and synchronizes the
message across multiple devices.
HYPER TEXT TRANSFER PROTOCOL
SECURE(HTTPS)
• Https: A protocol used to transfer data (like text, hypertext,
audio, video , images) between browsers and web servers but in an
encrypted form
• The 'S' at the end of HTTPS stands for 'Secure’.
• It means all communications between your browser and the
website are encrypted.
REMOTE ACCESS PROTOCOL
(TELNET)
• Remote Access Protocol (Telnet) : This protocol helps a user (Telnet Client) to
log in at a remote computer (Telnet Server) and function as if he/she were
connected directly to that computer.
• It allows you to connect to remote computers (called remote hosts) over a
TCP/IP network (such as the Internet).
• Once your telnet client establishes a connection to the remote host, your client
becomes a virtual terminal, allowing you to communicate with the remote
host from your computer with whatever privileges you may have been granted
to the specific application and data on that host computer.
VOICE OVER INTERNET PROTOCOL

• VOIP: Voice over Internet Protocol is a group of technologies for the delivery
of voice communications and multimedia sessions over Internet.
• Voice over Internet Protocol (VoIP), is a technology that allows you to make voice
calls using a broadband Internet connection instead of a regular (or analog) phone
line.
• This method of making phone calls is much cheaper than convectional way
POINT TO POINT PROTOCOL(PPP)
❑ PPP (Point-to-Point Protocol) is used for communication
between two computers using a serial interface, mostly a
personal computer connected by phone line to a server.

❑ For example, an Internet Service Provider(ISP) may provide


you with a PPP connection so that the ISP’s server can
respond to your requests, pass them on to the Internet, and
forward your requested Internet responses back to you.

❑ It was basically designed to help communication between


two systems through telephone lines as it supports
transmission of network packets over a serial point to point
link.

❑ PPP is sometimes considered a member of the TCP/IP suite


of protocols. Essentially, it encapsulates and packages your
computer's TCP/IP packets into PPP frames and then
forwards them to the server over serial transmission lines
such as telephone lines, ISDN etc.
INTRODUCTION TO WEB SERVICES

• The World Wide Web (WWW) or web in short, is an ocean of


information, stored in the form of trillions of interlinked web pages
and web resources.
• The resources on the web can be shared or accessed through the
Internet
I N T R O D U C T I O N TO W E B S E RV I C E S

It is a language for defining a structured


information
I N T R O D U C T I O N TO W E B S E RV I C E S - - - - E X A M P L E - - X M L
I N T R O D U C T I O N TO W E B S E RV I C E S

Domain Names:
• Every computer on the network has a unique numeric address
called IP address.
• Since it is practically impossible for a person to remember the IP
addresses, a system has been developed which assigns domain
names to web servers and maintains a database of these names
and corresponding IP addresses on DNS (Domain Name System)
server.
• This character based naming system by which servers are
identified is also known as domain name system(DNS)
• Examples of some domain names are cbse.nic.in,
indianrailway.gov.in etc.
IN TRO DUC TION TO W E B S E RV ICES
A domain name usually has more than one part.

INTRODUCTION TO WEB SERVICES
URL (Uniform resource locator)
• It is a unique address or path for each resource located on the web.
• Network resources can be plain Web pages, text documents, graphics, downloadable files, services or
programs.
• Every network resource on the web has a unique URL in the following format:
Protocol: // domain name /path / file name

❖ Network Protocol: The network protocol identifies the protocol to be used to access the network
resource.
❖ Domain name: It identifies the host/server that holds the resource. For example: www. School.com
is a domain name.
❖ Resource Location: It consists of the path or directory and the file name of resource.
I N T R O D U C T I O N TO W E B S E RV I C E S

Website: Related webpages from a single web domain is termed as a website. A


website has multiple webpages providing information about a particular entity.

Web browser: Web browser is software program to navigate the web pages on
the internet. A bowser interprets the coding language of the web page and
displays it in graphic form. Internet works on client -server model.
A web browser is a client which requests the information from the web server.
The web server sends the information back to the client. Some of the web
browsers are: Netscape Navigator, Internet Explorer, Mozilla Firefox etc.
I N T R O D U C T I O N TO W E B S E RV I C E S
Web Server:
▪ A Web server is a computer or a group of computers that stores web pages on the internet.
▪ It works on client/server model. It delivers the requested web page to web browser.
▪ Web servers use special programs such as Apache or IIS to deliver web pages over the http
protocol.
▪ Each server has a unique IP address and domain name.
▪ In order to access a webpage, the user writes the URL of the site on the address bar of the
browser. The machine on which the browser is running sends a request to the IP address of
the machine running the web server for that page.
▪ Once the web server receives that request, it sends the page content back to the IP address
of the computer asking for it.
▪ The web browser then translates that content into all of the text, pictures, links, videos, etc.
▪ A single web server may support multiple websites or a single website may be hosted on
several linked servers.
I N T R O D U C T I O N TO W E B S E RV I C E S

Web hosting: Web hosting is the process of uploading/saving the web content
on a web server to make it available on WWW.
In case an individual or a company wants to make its website available on the
internet, it should be hosted on a web server.
❑Types of Website Hosting
➢Free hosting
▪ There are some hosting websites which provide you free
hosting of the website for limited period of time.

69 Advanced Web Designing


❑Types of Website Hosting
➢Shared Hosting :
▪ Shared Hosting refers to several different websites residing on
one web server of a hosting service.
▪ It is cost effective. It gives domain name to your website.

70 Advanced Web Designing


❑Types of Website Hosting
➢Dedicated hosting
▪ Dedicated server involves one server that is leased by the
customer and is not shared to others.
▪ The customer also can choose the server hardware within
limits allowed by the hosting service.
▪ These are paid hosting servers for large websites.

71 Advanced Web Designing


1. The 80-20 rule:
In a properly designed environment 80 percent of the traffic, on a given network
segment is local (destined for a target in the same workgroup) and not more
than 20 percent of the network traffic should need to move across the
backbone.(the spine that connects various segments or subnetworks)

CASE STUDY BASED QUESTIONS TIPS:

1. Name the most suitable wing where the server should be installed.
Ans. Server is to be placed in the building/wing where number of computers are
maximum.
2. Draw the cable layout.
a) Use star topology / Bus topology or
b) (connect the buildings having shortest distance)
a) Suggest the placement of networking devices.
a) Hub/Switch: In a all building/office/wing to connect all computers.
b) Repeaters: In between the building/office/wing where distance is
more than 100 meters
c) Modem(Internet connecting device) : Should be installed at
wing/building/office that have maximum number of computers (or
where server is installed)
d) Firewall(Hardware or Software): A network security device to prevent
unauthorised access to or from the network.
Radio waves : omni directional, can penetrate through obstacles
Microwaves – line-of-sight, cannot propagate through obstacles
Satellite – very long range communication
Placement of Server:
Cable Layouts(Star/Bus):
Network Device(hub/switch/repeater):
Type of network(lan/man/wan):
Communication media/technology/cable type(twisted pair/coaxial
cable/satellite):
Internet connection technology: dial-up/broadband
THANK YOU

You might also like