COMPUTER NETWORK CONCEPTS
What is a Computer Network?
o Computer Network is a group of computers connected with each other through
wires, optical fibres or optical links so that various devices can interact with
each other through a network.
o The aim of the computer network is the sharing of resources among various
devices.
o In the case of computer network technology, there are several types of
networks that vary from simple to complex level.
Components Of Computer Network:
Major components of a computer network are:
NIC(Network interface card)
NIC is a device that helps the computer to communicate with another device. The
network interface card contains the hardware addresses, the data-link layer protocol
use this address to identify the system on the network so that it transfers the data to
the correct destination.
There are two types of NIC: wireless NIC and wired NIC.
o Wireless NIC: All the modern laptops use the wireless NIC. In Wireless NIC, a
connection is made using the antenna that employs the radio wave
technology.
o Wired NIC: Cables use the wired NIC to transfer the data over the medium.
Hub
Hub is a central device that splits the network connection into multiple devices. When
computer requests for information from a computer, it sends the request to the Hub.
Hub distributes this request to all the interconnected computers.
Switches
Switch is a networking device that groups all the devices over the network to transfer
the data to another device. A switch is better than Hub as it does not broadcast the
message over the network, i.e., it sends the message to the device for which it belongs
to. Therefore, we can say that switch sends the message directly from source to the
destination.67.9M
Cables and connectors
Cable is a transmission media that transmits the communication signals. There are
three types of cables:
o Twisted pair cable: It is a high-speed cable that transmits the data
over 1Gbps or more.
o Coaxial cable: Coaxial cable resembles like a TV installation cable. Coaxial
cable is more expensive than twisted pair cable, but it provides the high data
transmission speed.
o Fibre optic cable: Fibre optic cable is a high-speed cable that transmits the
data using light beams. It provides high data transmission speed as compared
to other cables. It is more expensive as compared to other cables, so it is
installed at the government level.
Router
Router is a device that connects the LAN to the internet. The router is mainly used to
connect the distinct networks or connect the internet to multiple computers.
Modem
Modem connects the computer to the internet over the existing telephone line. A
modem is not integrated with the computer motherboard. A modem is a separate part
on the PC slot found on the motherboard.
Uses Of Computer Network
o Resource sharing: Resource sharing is the sharing of resources such as
programs, printers, and data among the users on the network without the
requirement of the physical location of the resource and user.
o Server-Client model: Computer networking is used in the server-client
model. A server is a central computer used to store the information and
maintained by the system administrator. Clients are the machines used to
access the information stored in the server remotely.
o Communication medium: Computer network behaves as a communication
medium among the users. For example, a company contains more than one
computer has an email system which the employees use for daily
communication.
o E-commerce: Computer network is also important in businesses. We can do
the business over the internet. For example, [Link] is doing their
business over the internet, i.e., they are doing their business over the
Features Of Computer network
Communication speed
Network provides us to communicate over the network in a fast and efficient manner.
For example, we can do video conferencing, email messaging, etc. over the internet.
Therefore, the computer network is a great way to share our knowledge and ideas.
File sharing
File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.
Back up and Roll back is easy
Since the files are stored in the main server which is centrally located. Therefore, it is
easy to take the back up from the main server.
Software and Hardware sharing
We can install the applications on the main server, therefore, the user can access the
applications centrally. So, we do not need to install the software on every machine.
Similarly, hardware can also be shared.
Security
Network allows the security by ensuring that the user has the right to access the certain
files and applications.
Scalability
Scalability means that we can add the new components on the network. Network must
be scalable so that we can extend the network by adding new devices. But, it
decreases the speed of the connection and data of the transmission speed also
decreases, this increases the chances of error occurring. This problem can be
overcome by using the routing or switching devices.
Reliability
Computer network can use the alternative source for the data communication in case
of any hardware failure.
Computer Network Architecture
Computer Network Architecture is defined as the physical and logical design of the
software, hardware, protocols, and media of the transmission of data. Simply we can
say that how computers are organized and how tasks are allocated to the computer.
The two types of network architectures are used:
o Peer-To-Peer network
o Client/Server network
Peer-To-Peer network
o Peer-To-Peer network is a network in which all the computers are linked
together with equal privilege and responsibilities for processing the data.
o Peer-To-Peer network is useful for small environments, usually up to 10
computers.
o Peer-To-Peer network has no dedicated server.
o Special permissions are assigned to each computer for sharing the resources,
but this can lead to a problem if the computer with the resource is down.
Advantages Of Peer-To-Peer Network:
o It is less costly as it does not contain any dedicated server.
o If one computer stops working but, other computers will not stop working.
o It is easy to set up and maintain as each computer manages itself.
Disadvantages Of Peer-To-Peer Network:
o In the case of Peer-To-Peer network, it does not contain the centralized system.
Therefore, it cannot back up the data as the data is different in different
locations.
o It has a security issue as the device is managed itself.
Client/Server Network
o Client/Server network is a network model designed for the end users called
clients, to access the resources such as songs, video, etc. from a central
computer known as Server.
o The central controller is known as a server while all other computers in the
network are called clients.
o A server performs all the major operations such as security and network
management.
o A server is responsible for managing all the resources such as files, directories,
printer, etc.
o All the clients communicate with each other through a server. For example, if
client1 wants to send some data to client 2, then it first sends the request to the
server for the permission. The server sends the response to the client 1 to
initiate its communication with the client 2.
Advantages Of Client/Server network:
o A Client/Server network contains the centralized system. Therefore we can
back up the data easily.
o A Client/Server network has a dedicated server that improves the overall
performance of the whole system.
o Security is better in Client/Server network as a single server administers the
shared resources.
o It also increases the speed of the sharing resources.
Disadvantages Of Client/Server network:
o Client/Server network is expensive as it requires the server with large memory.
o A server has a Network Operating System (NOS) to provide the resources to
the clients, but the cost of NOS is very high.
o It requires a dedicated network administrator to manage all the resources.
Modem
o A modem is a hardware device that allows the computer to connect to the
internet over the existing telephone line.
o A modem is not integrated with the motherboard rather than it is installed on
the PCI slot found on the motherboard.
o It stands for Modulator/Demodulator. It converts the digital data into an analog
signal over the telephone lines.
Based on the differences in speed and transmission rate, a modem can be classified
in the following categories:
o Standard PC modem or Dial-up modem
o Cellular Modem
o Cable modem
Cables and Connectors
Cable is a transmission media used for transmitting a signal.
There are three types of cables used in transmission:
o Twisted pair cable
o Coaxial cable
o Fibre-optic cable
Computer Network Types
A computer network is a group of computers linked to each other that enables the
computer to communicate with another computer and share their resources, data, and
applications.
A computer network can be categorized by their size. A computer network is mainly
of four types:
o LAN(Local Area Network)
o PAN(Personal Area Network)
o MAN(Metropolitan Area Network)
o WAN(Wide Area Network)
LAN(Local Area Network)
o Local Area Network is a group of computers connected to each other in a small
area such as building, office.
o LAN is used for connecting two or more personal computers through a
communication medium such as twisted pair, coaxial cable, etc.
o It is less costly as it is built with inexpensive hardware such as hubs, network
adapters, and ethernet cables.
o The data is transferred at an extremely faster rate in Local Area Network.
o Local Area Network provides higher security.
PAN(Personal Area Network)
o Personal Area Network is a network arranged within an individual person,
typically within a range of 10 meters.
o Personal Area Network is used for connecting the computer devices of personal
use is known as Personal Area Network.
o Thomas Zimmerman was the first research scientist to bring the idea of the
Personal Area Network.
o Personal Area Network covers an area of 30 feet.
o Personal computer devices that are used to develop the personal area network
are the laptop, mobile phones, media player and play stations.
There are two types of Personal Area Network:
o Wired Personal Area Network
o Wireless Personal Area Network
Wireless Personal Area Network: Wireless Personal Area Network is developed by
simply using wireless technologies such as WiFi, Bluetooth. It is a low range network.
Wired Personal Area Network: Wired Personal Area Network is created by using the
USB.
Examples Of Personal Area Network:
o Body Area Network: Body Area Network is a network that moves with a
person. For example, a mobile network moves with a person. Suppose a
person establishes a network connection and then creates a connection with
another device to share the information.
o Offline Network: An offline network can be created inside the home, so it is
also known as a home network. A home network is designed to integrate the
devices such as printers, computer, television but they are not connected to the
internet.
o Small Home Office: It is used to connect a variety of devices to the internet
and to a corporate network using a VPN
MAN(Metropolitan Area Network)
o A metropolitan area network is a network that covers a larger geographic area
by interconnecting a different LAN to form a larger network.
o Government agencies use MAN to connect to the citizens and private
industries.
o In MAN, various LANs are connected to each other through a telephone
exchange line.
o The most widely used protocols in MAN are RS-232, Frame Relay, ATM, ISDN,
OC-3, ADSL, etc.
o It has a higher range than Local Area Network(LAN).
Uses Of Metropolitan Area Network:
o MAN is used in communication between the banks in a city.
o It can be used in an Airline Reservation.
o It can be used in a college within a city.
o It can also be used for communication in the military.
WAN(Wide Area Network)
o A Wide Area Network is a network that extends over a large geographical area
such as states or countries.
o A Wide Area Network is quite bigger network than the LAN.
o A Wide Area Network is not limited to a single location, but it spans over a large
geographical area through a telephone line, fibre optic cable or satellite links.
o The internet is one of the biggest WAN in the world.
o A Wide Area Network is widely used in the field of Business, government, and
education.
Examples Of Wide Area Network:
o Mobile Broadband: A 4G network is widely used across a region or country.
o Last mile: A telecom company is used to provide the internet services to the
customers in hundreds of cities by connecting their home with fiber.
o Private network: A bank provides a private network that connects the 44
offices. This network is made by using the telephone leased line provided by
the telecom company.
Advantages Of Wide Area Network:
Following are the advantages of the Wide Area Network:
o Geographical area: A Wide Area Network provides a large geographical area.
Suppose if the branch of our office is in a different city then we can connect with
them through WAN. The internet provides a leased line through which we can
connect with another branch.
o Centralized data: In case of WAN network, data is centralized. Therefore, we
do not need to buy the emails, files or back up servers.
o Get updated files: Software companies work on the live server. Therefore, the
programmers get the updated files within seconds.
o Exchange messages: In a WAN network, messages are transmitted fast. The
web application like Facebook, Whatsapp, Skype allows you to communicate
with friends.
o Sharing of software and resources: In WAN network, we can share the
software and other resources like a hard drive, RAM.
o Global business: We can do the business over the internet globally.
o High bandwidth: If we use the leased lines for our company then this gives the
high bandwidth. The high bandwidth increases the data transfer rate which in
turn increases the productivity of our company.
Disadvantages of Wide Area Network:
The following are the disadvantages of the Wide Area Network:
o Security issue: A WAN network has more security issues as compared to LAN
and MAN network as all the technologies are combined together that creates
the security problem.
o Needs Firewall & antivirus software: The data is transferred on the internet
which can be changed or hacked by the hackers, so the firewall needs to be
used. Some people can inject the virus in our system so antivirus is needed to
protect from such a virus.
o High Setup cost: An installation cost of the WAN network is high as it involves
the purchasing of routers, switches.
o Troubleshooting problems: It covers a large area so fixing the problem is
difficult.
What is Network Topology?
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and logical
topology.
Types of Network Topology
Physical topology is the geometric representation of all the nodes in a network. There
are six types of network topology which are Bus Topology, Ring Topology, Tree
Topology, Star Topology, Mesh Topology, and Hybrid Topology.
1) Bus Topology
o The bus topology is designed in such a way that all the stations are connected
through a single cable known as a backbone cable.
o Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
o When a node wants to send a message over the network, it puts a message
over the network. All the stations available in the network will receive the
message whether it has been addressed or not.
o The bus topology is mainly used in 802.3 (ethernet) and 802.4 standard
networks.
o The configuration of a bus topology is quite simpler as compared to other
topologies.
o The backbone cable is considered as a "single lane" through which the
message is broadcast to all the stations.
o The most common access method of the bus topologies is CSMA (Carrier
Sense Multiple Access).
Advantages of Bus topology:
o Low-cost cable:
o Moderate data speeds: Familiar technology:
o Limited failure:
o
o Disadvantages of Bus topology:
o Extensive cabling:
o Difficult troubleshooting:
o Signal interference:
o Reconfiguration difficult:
o Attenuation:
2) Ring Topology
o Ring topology is like a bus topology, but with connected ends.
o The node that receives the message from the previous computer will retransmit
to the next node.
o The data flows in one direction, i.e., it is unidirectional.
o The data flows in a single loop continuously known as an endless loop.
o It has no terminated ends, i.e., each node is connected to other node and
having no termination point.
o The data in a ring topology flow in a clockwise direction.
o The most common access method of the ring topology is token passing.
o Token passing: It is a network access method in which token is passed
from one node to another node.
o Token: It is a frame that circulates around the network.
Advantages of Ring topology:
o Network Management:
o Product availability
o Cost:
o Reliable:
o
o Disadvantages of Ring topology:
o Difficult troubleshooting:
o Failure:
o Reconfiguration difficult:
o Delay:
3) Star Topology
o Star topology is an arrangement of the network in which every node is
connected to the central hub, switch or a central computer.
o The central computer is known as a server, and the peripheral devices
attached to the server are known as clients.
o Coaxial cable or RJ-45 cables are used to connect the computers.
o Hubs or Switches are mainly used as connection devices in a physical star
topology.
o Star topology is the most popular topology in network implementation.
Advantages of Star topology
o Efficient troubleshooting:
o Network control:
o Limited failure: .
o Familiar technology:
o Easily expandable:
o Cost effective:
o High data speeds:
Disadvantages of Star topology
o A Central point of failure:
o Cable:
4) Tree topology
o Tree topology combines the characteristics of bus topology and star topology.
o A tree topology is a type of structure in which all the computers are connected
with each other in hierarchical fashion.
o The top-most node in tree topology is known as a root node, and all other nodes
are the descendants of the root node.
o There is only one path exists between two nodes for the data transmission.
Thus, it forms a parent-child hierarchy.
Advantages of Tree topology
o Support for broadband transmission:
o Easily expandable:
o Easily manageable:
o Error detection:
o Limited failure:
o Point-to-point wiring:
o Disadvantages of Tree topology
o Difficult troubleshooting:
o High cost: Failure.
o Reconfiguration difficult:
5) Mesh topology
o Mesh technology is an arrangement of the network in which computers are
interconnected with each other through various redundant connections.
o There are multiple paths from one computer to another computer.
o It does not contain the switch, hub or any central computer which acts as a
central point of communication.
o The Internet is an example of the mesh topology.
o Mesh topology is mainly used for WAN implementations where communication
failures are a critical concern.
o Mesh topology is mainly used for wireless networks.
Advantages of Mesh topology:
Reliable:
Fast Communication:
Easier Reconfiguration:
Disadvantages of Mesh topology
o Cost: A mesh topology contains a large number of connected devices such as
a router and more transmission media than other topologies.
o Management: Mesh topology networks are very large and very difficult to
maintain and manage. If the network is not monitored carefully, then the
communication link failure goes undetected.
o Efficiency: In this topology, redundant connections are high that reduces the
efficiency of the network.
6) Hybrid Topology
o The combination of various different topologies is known as Hybrid topology.
o A Hybrid topology is a connection between different links and nodes to transfer
the data.
o When two or more different topologies are combined together is termed as
Hybrid topology and if similar topologies are connected with each other will not
result in Hybrid topology. For example, if there exist a ring topology in one
branch of ICICI bank and bus topology in another branch of ICICI bank,
connecting these two topologies will result in Hybrid topology.
The Transmission mode is divided into three categories:
o Simplex mode
o Half-duplex mode
o Full-duplex mode
Simplex mode
o In Simplex mode, the communication is unidirectional, i.e., the data flow in one
direction.
o A device can only send the data but cannot receive it or it can receive the data
but cannot send the data.
o This transmission mode is not very popular as mainly communications require
the two-way exchange of data. The simplex mode is used in the business field
as in sales that do not require any corresponding reply.
o The radio station is a simplex channel as it transmits the signal to the listeners
but never allows them to transmit back.
o Keyboard and Monitor are the examples of the simplex mode as a keyboard
can only accept the data from the user and monitor can only be used to display
the data on the screen.
o The main advantage of the simplex mode is that the full capacity of the
communication channel can be utilized during transmission.
Advantage of Simplex mode:
o In simplex mode, the station can utilize the entire bandwidth of the
communication channel, so that more data can be transmitted at a time.
Disadvantage of Simplex mode:
o Communication is unidirectional, so it has no inter-communication between
devices.
Half-Duplex mode
o In a Half-duplex channel, direction can be reversed, i.e., the station can transmit
and receive the data as well.
o Messages flow in both the directions, but not at the same time.
o The entire bandwidth of the communication channel is utilized in one direction
at a time.
o In half-duplex mode, it is possible to perform the error detection, and if any error
occurs, then the receiver requests the sender to retransmit the data.
o A Walkie-talkie is an example of the Half-duplex mode. In Walkie-talkie, one
party speaks, and another party listens. After a pause, the other speaks and
first party listens. Speaking simultaneously will create the distorted sound which
cannot be understood.
Advantage of Half-duplex mode:
o In half-duplex mode, both the devices can send and receive the data and also
can utilize the entire bandwidth of the communication channel during the
transmission of data.
Disadvantage of Half-Duplex mode:
o In half-duplex mode, when one device is sending the data, then another has to
wait, this causes the delay in sending the data at the right time.
Full-duplex mode
o In Full duplex mode, the communication is bi-directional, i.e., the data flow in
both the directions.
o Both the stations can send and receive the message simultaneously.
o Full-duplex mode has two simplex channels. One channel has traffic moving in
one direction, and another channel has traffic flowing in the opposite direction.
o The Full-duplex mode is the fastest mode of communication between devices.
o The most common example of the full-duplex mode is a telephone network.
When two people are communicating with each other by a telephone line, both
can talk and listen at the same time.
Advantage of Full-duplex mode:
o Both the stations can send and receive the data at the same time.
Disadvantage of Full-duplex mode:
o If there is no dedicated path exists between the devices, then the capacity of
the communication channel is divided into two parts.
Computer Network Models
A communication subsystem is a complex piece of Hardware and software. Early
attempts for implementing the software for such subsystems were based on a single,
complex, unstructured program with many interacting components. The resultant
software was very difficult to test and modify. To overcome such problem, the ISO has
developed a layered approach. In a layered approach, networking concept is divided
into several layers, and each layer is assigned a particular task. Therefore, we can say
that networking tasks depend upon the layers.
OSI Model
o OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer moves
through a physical medium to the software application in another computer.
o OSI consists of seven layers, and each layer performs a particular network
function.
o OSI model was developed by the International Organization for Standardization
(ISO) in 1984, and it is now considered as an architectural model for the inter-
computer communications.
o OSI model divides the whole task into seven smaller and manageable tasks.
Each layer is assigned a particular task.
o Each layer is self-contained, so that task assigned to each layer can be
performed independently.
Characteristics of OSI Model:
o The OSI model is divided into two layers: upper layers and lower layers.
o The upper layer of the OSI model mainly deals with the application related
issues, and they are implemented only in the software. The application layer is
closest to the end user. Both the end user and the application layer interact with
the software applications. An upper layer refers to the layer just above another
layer.
o The lower layer of the OSI model deals with the data transport issues. The data
link layer and the physical layer are implemented in hardware and software.
The physical layer is the lowest layer of the OSI model and is closest to the
physical medium. The physical layer is mainly responsible for placing the
information on the physical medium.
7 Layers of OSI Model
There are the seven OSI layers. Each layer has different functions. A list of seven
layers are given below:
1. Physical Layer
2. Data-Link Layer
3. Network Layer
4. Transport Layer
5. Session Layer
6. Presentation Layer
7. Application Layer
1) Physical layer
o The main functionality of the physical layer is to transmit the individual bits from
one node to another node.
o It is the lowest layer of the OSI model.
o It establishes, maintains and deactivates the physical connection.
o It specifies the mechanical, electrical and procedural network interface
specifications.
2) Data-Link Layer
o This layer is responsible for the error-free transfer of data frames.
o It defines the format of the data on the network.
o It provides a reliable and efficient communication between two or more devices.
o It is mainly responsible for the unique identification of each device that resides
on a local network.
3) Network Layer
o It is a layer 3 that manages device addressing, tracks the location of devices
on the network.
o It determines the best path to move data from source to the destination based
on the network conditions, the priority of service, and other factors.
o The Data link layer is responsible for routing and forwarding the packets.
o Routers are the layer 3 devices, they are specified in this layer and used to
provide the routing services within an internetwork.
o The protocols used to route the network traffic are known as Network layer
protocols. Examples of protocols are IP and Ipv6.
4) Transport Layer
o The Transport layer is a Layer 4 ensures that messages are transmitted in the
order in which they are sent and there is no duplication of data.
o The main responsibility of the transport layer is to transfer the data completely.
o It receives the data from the upper layer and converts them into smaller units
known as segments.
o This layer can be termed as an end-to-end layer as it provides a point-to-point
connection between source and destination to deliver the data reliably.
5) Session Layer
o It is a layer 3 in the OSI model.
o The Session layer is used to establish, maintain and synchronizes the
interaction between communicating devices.
6) Presentation Layer
o A Presentation layer is mainly concerned with the syntax and semantics of the
information exchanged between the two systems.
o It acts as a data translator for a network.
o This layer is a part of the operating system that converts the data from one
presentation format to another format.
o The Presentation layer is also known as the syntax layer.
7) Application Layer
o An application layer serves as a window for users and application processes to
access network service.
o It handles issues such as network transparency, resource allocation, etc.
o An application layer is not an application, but it performs the application layer
functions.
o This layer provides the network services to the end-users.
Introduction to Internet
Internet is a global communication system that links together thousands of
individual networks. It allows exchange of information between two or more computers
on a network. Thus internet helps in transfer of messages through mail, chat, video &
audio conference, etc. It has become mandatory for day-to-day activities: bills
payment, online shopping and surfing, tutoring, working, communicating with peers,
etc.
A network is a group of two or more computer systems (Multiple gadgets, additionally
called hosts), which are related through a couple of channels for the motive of sending
and receiving data (records/media) in a shared environment. The community also can
consist of several gadgets/mediums that resource communicate among or extra
machines; those gadgets are called Network devices and consist of routers, switches,
hubs, and bridges, amongst others.
Internet is a group of computer systems connected from all around the world. The
Internet protocol suite is a framework defined through the Internet standards. Methods
are divided right into a layered set of protocols on this architecture. The Internet gives
a huge variety of statistics and communique offerings, which includes forums,
databases, email, and hypertext. It is made of the neighbourhood to global personal,
public networks connected through plenty of digital, wireless, and networking
technologies.
The Internet is a worldwide interconnected network of hundreds of thousands of
computers of various types that belong to multiple networks.
Working of the internet: The internet is a global computer network that connects
various devices and sends a lot of information and media. It uses an Internet Protocol
(IP) and Transport Control Protocol (TCP)-based packet routing network. TCP and IP
work together to ensure that data transmission across the internet is consistent and
reliable, regardless of the device or location. Data is delivered across the internet in
the form of messages and packets. A message is a piece of data delivered over the
internet, but before it is sent, it is broken down into smaller pieces known as packets.
IP is a set of rules that control how data is transmitted from one computer to another
via the internet. The IP system receives further instructions on how the data should be
transferred using a numerical address (IP Address). The TCP is used with IP to ensure
that data is transferred in a secure and reliable manner. This ensures that no packets
are lost, that packets are reassembled in the correct order, and that there is no delay
that degrades data quality.
History of Internet
The ARPANET (Advanced Research Projects Agency Network, later renamed the
internet) established a successful link between the University of California Los Angeles
and the Stanford Research Institute on October 29, 1969. Libraries automate and
network catalogs outside of ARPANET in the late 1960s.
TCP/IP (Transmission Control Protocol and Internet Protocol) is established in the
1970s, allowing internet technology to mature. The development of these protocols
aided in the standardization of how data was sent and received via the internet.
NSFNET (National Science Foundation Network), the 56 Kbps backbone of the
internet, was financed by the National Science Foundation in 1986. Because
government monies were being used to administer and maintain it, there were
commercial restrictions in place at the time.
In the year 1991, a user-friendly internet interface was developed. Delphi was the first
national commercial online service to offer internet connectivity in July 1992. Later in
May 1995, All restrictions on commercial usage of the internet are lifted. As a result,
the internet has been able to diversify and grow swiftly. Wi-Fi was first introduced in
1997. The year is 1998, and Windows 98 is released. Smartphone use is widespread
in 2007. The 4G network is launched in 2009. The internet is used by 3 billion people
nowadays. By 2030, there are expected to be 7.5 billion internet users and 500 billion
devices linked to the internet.
Uses of the Internet:
E-mail: E-mail is an electronic message sent across a network from one computer
user to one or more recipients. It refers to the internet services in which messages
are sent from and received by servers.
Web Chat: Web chat is an application that allows you to send and receive
messages in real-time with others. By using Internet chat software, the user can
log on to specific websites and talk with a variety of other users online. Chat
software is interactive software that allows users to enter comments in one window
and receive responses from others who are using the same software in another
window.
World Wide Web: The World Wide Web is the Internet’s most popular information
exchange service. It provides users with access to a large number of documents
that are linked together using hypertext or hyperlinks.
E-commerce: E-commerce refers to electronic business transactions made over
the Internet. It encompasses a wide range of product and service-related online
business activities.
Internet telephony: The technique that converts analog speech impulses into
digital signals and routes them through packet-switched networks of the internet is
known as internet telephony.
Video conferencing: The term “video conferencing” refers to the use of voice and
images to communicate amongst users.
Web Client
The client (or user) side of the Internet. The Web browser on the user’s computer or
mobile device is referred to as a Web client. It could also apply to browser extensions
and helper software that improve the browser’s ability to support specific site services.
Web browser
A web browser is a software program software that searches for, retrieves, and
presentations material which includes Web pages, photos, videos, and different files.
The browser sends a request to the Webserver, which then transmits the statistics
returned to the browser, which presentations the findings at the laptop. Example –
Mozilla Firefox, Microsoft Edge, Google Chrome, Safari etc.
Webpage
An internet web page (additionally called a web page) is a report that may be regarded
in an internet browser at the World Wide Web. HTML (Hypertext Mark-up Language)
and CSS (Cascading Style Sheet) are used to generate the primary shape of an
internet web page. An internet web page is generally a segment of an internet site that
carries statistics in plenty of formats, which includes textual content inside the shape
of paragraphs, lists, tables, and so on.
The home web page is the beginning or first web page of an internet site. It gives
trendy statistics and connections to all the internet pages which are associated. Every
internet web page has its personal deal with. This may be visible with inside the deal
with the bar. As a result, if we need to get admission to a selected internet web page,
the deal needs to be placed inside the browser’s deal with bar.
Website
An internet site, in trendy, is a group of statistics approximately statistics prepared into
many internet pages. An internet site is probably made for a sure motive, subject
matter, or to provide a service. An internet site (abbreviated as “website” or “site”) is a
group of online pages connected collectively through links and saved on an internet
server. By clicking on links, a tourist can pass from one web page to the next. An
internet site’s pages also are connected below one area call and proportion a not
unusual place subject matter and template.
Search Engine
Search engines are websites that search on the internet on behalf of users and show
a listing of results. More than actually written may be discovered on seek engines. You
can be capable of looking for different online content material which includes
photographs, video content material, books, and news, in addition to gadgets and
offerings, relying on the seek engine you are the use of.
To make use of the Internet, you do not always want to recognize the deal with an
internet site. It is crucial to recognize the way to do a look for statistics. Using a seek
engine is one of the only methods to seek. A seek engine can help you in finding what
you are looking for. You also can appearance up net maps and instructions to help
you to plot your adventure from one factor to some other. Example: Google, Bing,
DuckDuckGo, yahoo, etc.
Differentiation between Network and Internet
The number one distinction between a network and the internet is that a network is
made of computer systems that are bodily related and may be used as a personal
laptop at the same time as additionally sharing records. The Internet, on the alternative
hand, might be an era that connects those small and massive networks and creates a
brand new in-intensity community.
Advantages of the Internet:
It is the best source of a wide range of information. There is no better place to
conduct research than the internet.
Online gaming, talking, browsing, music, movies, dramas, and TV series are
quickly becoming the most popular ways to pass the time.
Because there are hundreds of thousands of newsgroups and services that keep
you updated with every tick of the clock, the Internet is a source of the most recent
news.
Because of virtual shops where you may buy anything you want and need without
leaving your house, internet shopping is becoming increasingly popular. Recently,
virtual shops have been making a lot of money.
With the emergence of online businesses, virtual stores, and credit card usage,
purchasing goods without going to the store has never been easier.
Disadvantages of the Internet:
Spending too much time on the internet is hazardous for the young generation’s
physical and mental health.
Children who use the internet develop an addiction, which is quite dangerous.
It is now quite easy to decipher someone’s chat or email messages thanks to the
hacking community.
With the emergence of online stores, people prefer to order online rather than going
to local stores which results in less social interactions among people.
types of Internet Protocols
Internet Protocols are a set of rules that governs the communication and exchange
of data over the internet. Both the sender and receiver should follow the same
protocols in order to communicate the data. In order to understand it better, let’s take
an example of a language. Any language has its own set of vocabulary and grammar
which we need to know if we want to communicate in that language. Similarly, over
the internet whenever we access a website or exchange some data with another
device then these processes are governed by a set of rules called the internet
protocols.
Working of internet protocol: The internet and many other data networks work by
organizing data into small pieces called packets. Each large data sent between two
network devices is divided into smaller packets by the underlying hardware and
software. Each network protocol defines the rules for how its data packets must be
organized in specific ways according to the protocols the network supports.
Why do we need protocols?
It may be that the sender and receiver of data are parts of different networks, located
in different parts of the world having different data transfer rates. So, we need
protocols to manage the flow control of data, access control of the link being shared
in the communication channel. Suppose there is a sender X who has a data
transmission rate of 10 Mbps. And, there is a receiver Y who has a data receiving
rate of 5Mbps. Since the rate of receiving the data is slow so some data will be lost
during transmission. In order to avoid this, the receiver Y needs to inform sender X
about the speed mismatch so that the sender X can adjust its transmission rate.
Similarly, the access control decides the node which will access the link shared in
the communication channel at a particular instant of time. If not the transmitted data
will collide if many computers send data simultaneously through the same link
resulting in the corruption or loss of data.
Types of internet protocol
The Internet Protocols are of different types having different uses:-
1. TCP/IP(Transmission Control Protocol/ Internet Protocol): These are a set of
standard rules that allows different types of computers to communicate with each
other. The IP protocol ensures that each computer that is connected to the Internet
is having a specific serial number called the IP address. TCP specifies how data is
exchanged over the internet and how it should be broken into IP packets. It also
makes sure that the packets have information about the source of the message data,
the destination of the message data, the sequence in which the message data should
be re-assembled, and checks if the message has been sent correctly to the specific
destination. The TCP is also known as a connection-oriented protocol.
The functionality of TCP/IP is divided into 4 layers with each one having specific
protocols:
1. Application Layer: The application layer makes sure that the data from the
sending end is received in a format that is acceptable and supported at the
receiving end.
2. Transport Layer: The transport layer is responsible for the smooth transmission
of data from one end to the other. It is also responsible for reliable connectivity,
error recovery, and flow control of the data.
3. Internet Layer: This Internet Layer moves packets from source to destination by
connecting independent networks.
4. Network Access Layer: The Network Access Layer sees how a computer
connects to a network.
2. SMTP(Simple Mail Transfer Protocol): These protocols are important for
sending and distributing outgoing emails. This protocol uses the header of the mail
to get the email id of the receiver and enters the mail into the queue of outgoing
mails. And as soon as, it delivers the mail to the receiving email id, it removes the
email from the outgoing list. The message or the electronic mail may consider of text,
video, image etc. It helps in setting up of some communication server rules.
3. PPP(Point to Point Protocol): It is a communication protocol that is used to
create a direct connection between two communicating devices. This protocol
defines the rules using which two devices will authenticate with each other and
exchange information with each other. For example, A user connects his PC to the
server of an Internet Service Provider also uses PPP. Similarly, for connecting two
routers for direct communication it uses PPP.
4. FTP (File Transfer Protocol): This protocol is used for transferring files from one
system to the other. This works on a client-server model. When a machine requests
for file transfer from another machine, the FTO sets up a connection between the
two and authenticates each other using their ID and Password. And, the desired file
transfer takes place between the machines.
5. SFTP(Secure File Transfer Protocol): SFTP which is also known as SSH FTP
refers to File Transfer Protocol (FTP) over Secure Shell (SSH) as it encrypts both
commands and data while in transmission. SFTP acts as an extension to SSH and
encrypts files and data then sends them over a secure shell data stream. This
protocol is used to remotely connect to other systems while executing commands
from the command line.
6. HTTP(Hyper Text Transfer Protocol): This protocol is used to transfer hypertexts
over the internet and it is defined by the www(world wide web) for information
transfer. This protocol defines how the information needs to be formatted and
transmitted. And, it also defines the various actions the web browsers should take in
response to the calls made to access a particular web page. Whenever a user opens
their web browser, the user will indirectly use HTTP as this is the protocol that is
being used to share text, images, and other multimedia files on the World Wide Web.
Note: Hypertext refers to the special format of the text that can contain links to other
texts.
7. HTTPS(HyperText Transfer Protocol Secure): HTTPS is an extension of the
Hypertext Transfer Protocol (HTTP). It is used for secure communication over a
computer network with the SSL/TLS protocol for encryption and authentication. So,
generally, a website has an HTTP protocol but if the website is such that it receives
some sensitive information such as credit card details, debit card details, OTP, etc
then it requires an SSL certificate installed to make the website more secure. So,
before entering any sensitive information on a website, we should check if the link is
HTTPS or not. If it is not HTTPS then it may not be secure enough to enter sensitive
information.
8. TELNET(Terminal Network): TELNET is a standard TCP/IP protocol used for
virtual terminal service given by ISO. This enables one local machine to connect with
another. The computer which is being connected is called a remote computer and
which is connecting is called the local computer. TELNET operation lets us display
anything being performed on the remote computer in the local computer. This
operates on the client/server principle. The local computer uses the telnet client
program whereas the remote computer uses the telnet server program.
9. POP3(Post Office Protocol 3): POP3 stands for Post Office Protocol version 3.
It has two Message Access Agents (MAAs) where one is client MAA (Message
Access Agent) and another is server MAA(Message Access Agent) for accessing the
messages from the mailbox. This protocol helps us to retrieve and manage emails
from the mailbox on the receiver mail server to the receiver’s computer. This is
implied between the receiver and receiver mail server. It can also be called as one
way client server protocol. The POP3 WORKS ON THE 2 PORTS I.E. PORT 110
AND PORT 995.
The foundations of networking: switches, routers, and wireless access points
Switches, routers, and wireless access points are the essential networking basics.
Through them, devices connected to your network can communicate with one another
and with other networks, like the Internet. Switches, routers, and wireless access
points perform very different functions in a network.
Switches
Switches are the foundation of most business networks. A switch acts as a controller,
connecting computers, printers, and servers to a network in a building or a campus.
Get started with a free trial of Cisco Meraki cloud networking
On-premises or cloud-managed? Discover which network switch fits your small
business needs.
Explore switches
Switches allow devices on your network to communicate with each other, as well as
with other networks, creating a network of shared resources. Through information
sharing and resource allocation, switches save money and increase productivity.
There are two basic types of switches to choose from as part of your networking
basics: on-premises and cloud-managed.
A managed on-premises switch lets you configure and monitor your LAN, giving you
tighter control of your network traffic.
Have a small IT team? A cloud-managed switch can simplify your network
management. You get a simple user interface, multisite full-stack management, and
automatic updates delivered directly to the switch.
Routers
Routers connect multiple networks together. They also
connect computers on those networks to the Internet. Routers
enable all networked computers to share a single Internet
connection, which saves money.
A router acts a dispatcher. It analyzes data being sent across a network, chooses the
best route for data to travel, and sends it on its way.
Routers connect your business to the world, protect information from security threats,
and can even decide which computers receive priority over others.
Beyond those basic networking functions, routers come with additional features to
make networking easier or more secure. Depending on your security needs, for
example, you can choose a router with a firewall, a virtual private network (VPN), or
an Internet Protocol (IP) communications system.
Access Points
An access point* allows devices to connect to the wireless network without cables. A
wireless network makes it easy to bring new devices online and provides flexible
support to mobile workers.
Stay connected from anywhere with wireless access points.
An access point acts like an amplifier for your network. While a router provides the
bandwidth, an access point extends that bandwidth so that the network can support
many devices, and those devices can access the network from farther away.
But an access point does more than simply extend Wi-Fi. It can also give useful data
about the devices on the network, provide proactive security, and serve many other
practical purposes.
*Access points support different IEEE standards. Each standard is an amendment that
was ratified over time. The standards operate on varying frequencies, deliver different
bandwidth, and support different numbers of channels.
Wireless Networking
To create your wireless network, you can choose between three types of deployment:
centralized deployment, converged deployment, and cloud-based deployment. Need
help figuring out which deployment is best for your business? Talk to an expert.
1. Centralized deployment
The most common type of wireless network system, centralized deployments are
traditionally used in campuses where buildings and networks are in close proximity.
This deployment consolidates the wireless network, which makes upgrades easier
and facilitates advanced wireless functionality. Controllers are based on-premises and
are installed in a centralized location.
2. Converged deployment
For small campuses or branch offices, converged deployments offer consistency in
wireless and wired connections. This deployment converges wired and wireless on
one network device—an access switch—and performs the dual role of both switch and
wireless controller.
3. Cloud-based deployment
This system uses the cloud to manage network devices deployed on-premises at
different locations. The solution requires Cisco Meraki cloud-managed devices, which
provide full visibility of the network through their dashboards.