Rudiments of Computer Sclence
Cera N Oey a anna iat
and Wide Area Networ | was created by the US.
Air Force nthe ats
19508 t interconnect
‘esi th Ser
‘Automatic Ground
Environment (SAGE)
radar defence system.
==
= comeces
TW Wr neework is spread over a city or a town, itis [fj {Wisner ) | ARPANET anne
iow asa Metropolitan Area Network or MAN. Its |S 2\Whatapecticinocoes ae vatdina} | the wor st
a network which is spread over an area which is larger than a Healsovnn 7] success packet
Local Area Network butsmaleihn heuacoverebyaWide |_LSecessseatson {| | tater
Area Network. It can include several buildings to an entire city, —_—
—
ofan organisation in city to share the epional resources,
ttle ke FD (Fe isi ig teri) or ATM Ancona Tra | [Het
Mode) to conmest several component LANs tgeter to form 8 MAN. As aule, MAN does not || Rew aN
belong to any particular organisation. A network service provider generally owns the communication || Whar anetwr i
links of a MAN. send overs yor
town, ts known 28.
AMAN handles daa efficiently like a LAN while a the same time | | atetropoitan Area
saves the cost related to a WAN, Speeds of up to 1 Gbps can be Network Ris rer
achieved in a MAN. The eable television network is an example than a LANBut
ofa MAN. sale than WAN
ERIE wa
In addition to the existing LAN technologies, another
technology emerged during the 1960s and 70s which
connected networks over large geographical areas.
This new, long distance technology is called a WAN.
When computers and other network devices are
connected over a large geographic area like a city,
‘country, continent or the whole globe, it is known as a
Wide Area Network or WAN.
‘As shown in the diagram, a WAN can be formed by
‘connecting several LANs using special purpose devices like routers and gateways. Once the WAN
has been set up, network switching technologies are used along with proper communi
protocols to establish communication between the connected networks,
General Characteristics of a Wide Area Network:
en
+ Operation: Each LAN when connected to the WAN can usually communicate with any other | °* WAN
eles Pn enc OS yaar creas wae eee
P2541
59Difference biw
LAN and WAN,
like T1 lines provides a bandwidth of up to Ls
Part2: Chapter 5
+ Bandwidth: A WAN uses broadband transmission mode.
However, long distances reduce the bandwidth of a WAN.
to several Mbps only (1.844 Mbps for TI link, 44.184
Mbps for T3 link).
Sharing: A computer at one site ean be connected 0 a
‘computer at another site via a WAN and can access data
from that computer. This data sharing ability forms the basis ofthe Internet
Cost: Cost of setting up a WAN is higher compared to a LAN as it requires more planning,
‘more hardware (like routers) and leasing long distance transmission lines.
+ Protocols Used: Different protocols used in a WAN include X.25, ATM, TCP/IP, FTP ete.
+ Example: The Intemet
Differences between LAN and WAN
ea
Nena Doe neuas
1. The area covered by a LAN is small, usually
covering an office space, factory, or a campus.
1. The area covered by a WAN Is large, usually
covering cities, countries, or continents.
LLANs usually use baseband transmission. | 2, WANS use broadband transmission.
ata transmission rates
re higher than WAN. | 3. Data transmission rates are lower than LAN.
A LAN has bandwidth in the order of 10-100 | 4. A WAN has bandwidth in the order of several
Mbps. Mbps only (eg 44.184 Mbps for a T3 Link).
Data wansmission errors are more due w
longer distances.
Data transmission errors are less due to shorter
distances.
6. Cost of setting up @ LAN is usually low as | 6
Cost of setting up a WAN is high as it requires
‘compared toa WAN,
‘more hardware and long-distance transmission
7, Ethernet and Token Ring form two important |7. Different protocols used in a WAN include
LAN protocols, | __ various protocols under TCP/P protocol suite
8, The Internet is an example ofa WAN.
8._A school network isan example ofa LAN.
EMTS keno
‘Temporary and shs
ble communication links can be set up so that all computers connected over
long distances can communicate with each other within a reasonable cost. Depending upon the
‘method used, digital communication ean be of the following types:
. Leased cireuit networks: Here permanent lines are used for communication
». Switched Network Services: These can be further classified into:
* Circuit switched networks: Here temporary links are established for communication
+ Message switched networks: This is a store and forward type data communication
‘= Packet switched networks: Here data is transmitted in the form of data packets
| + Leased Line Services:
Dedicated Lented Line
Leased lines are permanent point-to-point links between ase
two oF more points and are suitable for building WANS. A
leased line connection doesnot passthrough the switching system ofthe telephone exchange and
‘can operate using both analogue and digital communication channels, Digital communication lines
14 Mbps whereas T3 lines works at about 45 Mbps.
P25-2
60‘Rudiments of Computer Sclonce Motropotan Area and Wide Area Networks
Advantage:
+ These lines are always *O)
~ thus providing o full-time dedicated connection
‘As the carrier's circuits are dedicated to the customer even when they are not in use, lensed
lines are more expensive than switched network connections.
+ Cast of implementation of dedicate lines is also higher, a cables need toe laid out
+ Switched Network Services:
When you post a leter, it zoes from your home to the local post
office, from there t the recipient post office and from there Finally
tothe recipient, Ina similar manner, when data is transmitted from
fone computer network to another, it travels through intermediate
rhodes before being delivered to the recipient network. Such a
network is called a switched communication network and these
intermediate nodes are called switching devises which mainly
consist of switehes and routers,
+ Circuit Switched Networks: In this ype, temporary eireult
is set up using electro:mechanieal switches during the time of
communication. The circuit link is maintained until the
communication session is over. Usually telephone companies ote |
tse such a network for continuous voice. communication
|
art: chapters
Disadvantage:
+ As there is no upper limit to the data block size, the routers atthe switching stations mus,
hhave sufficient physical storage disks to store the data on its way.
+ A large data block can also keep engaged a particular link between two switching offices
fora long time, delaying communication,
+ Packet Switched Networks: This technology is normally
suitable for text and data signals. In this scheme, the data to
be transmitted is first broken down into smaller units
called packets, where each packet contains a part of the
whole data and the sender and receiver addresses. Each
packet is then independently sent over the best possible route
to the destination. At the destination computer, the received
packets are again assembled together to get back the original data
‘The diagram shows how the data is broken down into five different packets marked 1 10 5 ang
sent over different paths through different routers from the source S to the destination D,
Advantage: 1 Sie deaharoge arose
+ In case there is a fault in a particular route then only the | 2 Wratepacetswtcrng? 3
data packets trough that route may be lost, which can then | 3 Gwe Zabigs foe oy,
be re-transmitted 4. Give 2 atartges pace
+ More than two stations can use the same channel | swiheg "°° TPO 2
simultaneously using multiplexing method ee
Disadvanta, 6. Ghot dtrences between eat
idvantage: ching apa sweneg
‘Since the same communication channel is shared by several
‘tations simultaneously, network traffic ean cause a delay in data transmission
+ A station cannot utilise the full bandwidth of a channel as itis shared by other stations
Differences between Leased Lines and Switched Lines
Sere
forthe dura
2. Cost of implementation is low
3. Multiple users share communication media |
ble ifnetwork is not loaded to capacity
ally
'._ Cheap per unit of time if used extensively
Differences between ‘Switching and Packet Switching
CIT IT
Teaporary creat ls se wp and tulnaned| |. Invomaton teamuet i on bree aber
dorm ti feo conmnieton, data packets dough tren avalos
BE Wink ibs fx de boven te oder wl] Does ot fen’ any elses
tercelte before tacanaton ar. Tranny ont lew eed
5. Teint be wasnidis tanita] 3 Te information tobe waned is ker dma
tesedauon at sven i smater ons eed packets.
TA poinnpaiatphyseal comnetion e]A Dat pokes wansmiedbareeon sane a
Iaumined baa sated dena" | _deinddon ogi sae
‘5. Only two stations can use the communication] 5. Several stations can use the same communication
channel atthe same time.uciments of Computer Science Metropolitan Area and Wide Area Networks
CS Panrn
+ Dial-up Lines and MODEM
‘The telephone company provides two types of telephone lines to serve as a media to connect LANS. | yopey
The first one is a Leased Line, as discussed earlier. The second type is a Dial-up Line, It is a
communication link connected to the public telephone network and used along with a MODEM
(refer diagram). In such a communication when a telephone number is dialled, the computers in the
telephone-exchange route the call and
setup temporary connection between
the source and end computers. The
connection is maintained until the signal
transfer is over.
The word MODEM stands for
MOduiator-DEModulator. It is a device
used for dial-up communication using
‘computers and the local telephone lines
‘The data transmitted by a computer is digital in nature. [= 7 yaasemoE 7
However, the local loop of the telephone company ean carry only |€B 2Wactu'emawoose 1
analogue signal. Hence, before transmission, a modem converts |} frunewennactssooe, 2 | The word MODEM
the digital signal from digital form to analogue form. This conmecion eee
process is called modulation. On reaching the destination, another | § Ss Wo dexsenmpesctusgad
2
modem converts the analogue signal back to digital form, |, arcie 2 || DEModultr tise
3
eves used for dal
‘up communication
using computers
andthe eel
telephone lines
We ne tent SO
before the computer accepts it. This process is called de- | 7 Waeasnon nit on SON
modulation. Each modem functions as a full duplex device, both | ® Nhsicoyoy nan ty Bars
haat SN 2
receiving and transmitting signals through them,
MODEMS are available as External and Internal modems. External modems are connected to the
computer through external ports and have their own power supplies. On the other hand, internal | =
‘modems are available as add-on cards for PCI slots on the motherboard. 4
j1som
‘Advantages: Nisan atl
+ Diak-up lines are shared with other subscribers tothe public telephone network. Accordingly, | | hop seve tat
these lines are much less expensive 10 use leone
+ As these connections use a standard modem, the hardware cost are minimal reocreamer car
rm oie, dt, auto 8
ees | | video at 128 Kbps
+ Dial-up connections are very slow compared to other connection types. reenter
+ Dial-up connections transfer data over an analogue line so before the data is sent it has to be | | ces wing existing
converted from digital to analogue and reconverted again atthe receiving end, This affets the || tephone network
connection speed.
+ ISDN: Integrated Services Digital Network y
ISDN is an all-digital dial-up service that uses standard telephone lines to simultaneously carry | 1SON
high quality voice, data, audio and video transmissions at 128KDbps across long distances using the
existing telephone network
‘The basic form of ISDN uses three channels of data over a single communication line. Out of these
two 64-Kbps full duplex channels called Bearer channels or B-channels are used for carrying
cither voice or data, These two B-channelscan also be combined to form a single 128-Kbps channel
P25-5
63Op
TCPIP model &
WAN Protocols
{CPAP Protocls
TCPIPis the name
given toa family of
| communication
protocols to
organise computers
from diferent
| networks into 2
single logical
network
o
TCPIIP model &
WAN Protocols
Part 2: Chapter 5
There is another single 16-Kbps full duplex Data channel or [q+ ihwidoyateanby 50 owen
D-channel used as a control channel for setting up connections. |Q son? 2
is TA wh
Hence, together itis also called a 28+D service S Soe trucrmope cesta!
A Network Termination Unit (NTU) is used to connect the | + Whatdeyey neanby he TCP
proeasut?|
telephone company’s line to the customer premises. For mon- | —5,How many ayers are ter fhe
NN devices a Terminal Adapter (TA) or ISDN modem is TCPIP reference made?
ted to dvcly conte! he neeenng SEN tne withneneisbN | Sheebeien Tone
Spam aes
‘Advantages of ISDX
+ ISDN can transfer data wo time faster than 286 Kbps modem
‘ISDN uses digital signal hich ses vulerableCo noise than an analogue signal
+ ISDN offers thee separate channels, 28 chants and 1D channel
* Voice, au, vide and data can be pased simultaneously through an ISDN line
ERR ene eee
+ The TCPIIP Protocol suite
| TCPIP is the name given to a family of
‘communication protocols developed in
the 1970-80s by the U.S. Department of
Defence to organise computers from
different networks into a single logical
network. The protocols, collectively
called the Internet Protocol Suite,
presently form the most important set of
| WAN protocols. Since TCP and IP are
the most important and best-known
protocols in this protocol suite, the whole
family of Intemet protocols are
commonly called the TCP/IP protocols.
Data Transfer
Between Computers
Ina TCPIP Network
clap aes sla
TT
+ TOPIIP Reference Model
The TCP/IP reference model was developed
during the 1970s with the aim to interconnect
different types of computers over different
types of transmission media and to connect
computers through some alternate paths, The
‘model was also developed to support different
technologies that had emerged over the years
and the ability to carry different types of data like
text, audio, video, etc. at various speeds.
The TCPIP protocol suite comprises of different
protocols arranged in four layers (sce diagratn
‘on right), The layers ate Application, Transport,
Intemet, and Network Interface Layer. Each
layer is responsible for some aspect of the
overall communication effort. The processed
‘output of one layer becomes the input data for the next layer, till the last layer
2-5-6
64Rudiments of Computer Sclence Metropolitan As
Conceply& particular layer inthe source machine can be (APT HasTaaeeaROR
‘thought to be in direct communication with the same layer in ‘fhe TCPAP rterence model? oa
the destination machine irrespective of the intermediate layers, | _ 2 Slslv wo nto on Ropleton
though in reality the acl pial communion usally | 3 S"areratrae 2
traverses the intermediate ayers as shown in he fas pe Sheteletnd ten ©
The TCP/IP model is actually a truncated version of the OSI aatnte poet 7
‘model and is considered to be @ 4layered model with each layer | *N&TEssepen he ot ey wo
ite Tsai 2
sharing a different responsibility in the overall communication | — 6 Stew hain Pont Lye
between two computers in a network. It i used as a reference [__ abe Torr raw 7
* Layers in TCP/IP Model |
2 Itfomsthe wer interac beteen he wera he computer netork. apps per
». It consists of applications and protocols using which end-users interact with the network. ee
ise Caeemcigio ee ce cooey
* File Transfer Protocol (FTP): Used for interactive file transfer between hosts. andthe computer
Simple Mail Transfer Protocol SMTP); Used for uasfr of emai messages aoe
« HTTP: Used to transfer web pages of the World Wide Web. | | HTTP, Telnet, SMTP
* DNS: To getthe IF nas for de lphnumere dans ee of server URL
4 Thislayer helps o establish a communication link betwesn the communicating nodes | Tranapor Layer
b. It divides the data received from the Application layer into segments or packets. a
€ Tepes hn aranetinse tie patewetow | met
© TRS ut Feowledgement and error contrl schemes ofecover iter omup da | (beter
. Ithandesprotocas tke: [rena
and maintains
reliably in cata
rane using
protocols ike TCP
= Transmission Control Protocol (TCP): It is used to provide a connection-oriented,
reliable data transfer service that can be used for any data size.
User Datagram Protocol (UDP): It is used to provide a connectionless, unreliable data
transfer service and is suitable for small data size.
2, Internet Layer (Network Layer): This isthe layer ofthe TCP/IP model. The functions are: | <_ly
4. This layer adds the source and destination IP address o each data packet received from the | internet Layer
Transport layer and forms the IP datagrams,
b Ithelps to determine a path for the data to the destination and delivers the data following
that path. A hardware device called a router does the routing of data packets.
el lata travel independently to the destination using a best effort,
See ieee dmever does ot guaran he waster oda |
tithe 2nd layer
and els to
determine the path
for data vanster
uring communics
tin, eth the help of
IPadsrsses.
delivery scheme, However,
4. Ithandles protocols like:
= Internet Protocol (IP): It is used to determine the network path and transfer data through
different routers from the source node to the end node,
P25-7
65i
Network Interface
Layer
Part2: Chapters
‘+ Address Resolution Protocol (ARP): The transfer of data
from source to destination network usually takes place
though various intermediate networks and uses the IP
ia sano Baas)
Pesos Proce 2
2 hai te Uncen ce ene
adds ofthe outers todecine he pa However te | ioe” 3
final data delivery takes place using the actual physical |‘ YebeestmmdtoMe 4
address of the node that has the destination IP address. | Paras tere TMP oe 2
AARP is used to get the physical adress of’ node (ike | anew igen}
MAC adres ofthe NIU) fora given I address. i iasesann eee
+ The RARPor Reverse Address Resolution Protocol does
the reverse job of getting the IP address fora given physical or MAC address of anode,
+ Internet Controt Message Protocol (ICMP): It is used by network devices like routers to
send error and other messages generated by events lke unsuecessful delivery of IP packets,
+ Internet Group Management Protocol (IGMP): A data sent o a single multicast address in
an IP network can be distributed to an entire group of recipients. IGMP is responsible forthe
management of such IP multicast groups ina network.
| 1. Network Interface Layer (or Link Layer): This is the lowest ie, the I" layer of the TCP/IP
‘model. The functions of this layer are
4. Its used to physically connect the computer via the network interface unit (NIU) to the
extemal network transmission media.
b. Itdeals with transmitting the data to, and receiving the data from the external medium.
«. Concemed with signalling characteristis of the network (electrical, optical, wireless ete.)
44. The protocols inthis layer include
+ LAN protocols like Ethernet and Token Ring: These are used to ensure data transfer
within @ LAN and use the MAC address ofthe concerned nodes forthe data transfer.
+ WAN protocols like X.25, Frame Relay, ATM: These protocols are connection-oriented
protocols used for packet switched networks to transfer data over a WAN,
Ses
Since long distances are involved in delivering data across a WAN, the protocols involved in
‘maintaining the communication are also different from that in a LAN. As long distances demand
‘more reliability in data transfer, reliability features are stronger in WAN than in LAN protocols
+ X.25 Protocol: It is a connection-oriented service that was developed in the 1970s asa global
standard protocol fora packet-switching network. It defines how communication devives route
data over a WAN that uses the Public Switched Telephone Network.
+ Frame Relay: Iti also a connection-oriented service and a replacement o the X.25 technology
for transmitting data packets over a WAN. It was originally designed during the 80°s for use ovet
ISDN lines. It provides higher performance and greater efficiency than X.25
+ Asynchronous Transfer Mode (ATM): It is a connection-oriented, high-speed, broadband
data transmission service based on packet switching. Telecom companies use it to cary dl
voice, and video over a single channel. ATM encodes data into small fixed sized packets called
cells having 48 bytes of data and § bytes of control and routing information in the header
* Point-to-Point Protocol (PPP): Itis primarily used to establish a direet connection between 0
nodes ina computer network. Its commonly used by ISPs to establish a Digital Subseriber Live
(DSL) Internet connection with customers. Using PPP, data packets are delivered in order. i
4 fall duplex connection from the source tothe destination. The point-to-point link also ens
that the data packets flow straight from the user's computer tothe ISP's router
2-6-8
68Rasdment of Computer Science Metropolitan Area and Wide Area Networks
+ Transmission Control Protocol a
Transmission Control Protocol or TCP was invented to guarantee data delivery by using | transmission
acknowledgment schemes. With the help of IP. it ensures thatthe data is delivered properly Control Protocol
ror)
TCP first creates link or session between the host and the destination nodes. The data is then
transmitted in packets, with cach packet given a sequence number. At tbe receiving node, TCP | -~—@—
sends an acknowledgment tothe source node for the sequence number received. Incase a data | | TcP
packet gets lost on its way. the end node does not send an acknowledgement for that packet. TCP on | | The petals wed
‘he source computer monitors this and retransmits the lost data packet again. | terest a session
| setren tani
In case 2 router falls the packets are sent through other routers. This result in different packets |
szriving at different times a the destination. TCP checks the incoming packets and arranges them |
back in order based on the sequence number. Network hardware failure may also result in
uplication of data packets. This results in multiple copies of datagrams arriving atthe destination
TCP automatically detects duplicate data packets and accepts only the first copy of the data.
Advantages of using TCP:
+ Guarantees delivery of data packets across the network
‘Ensures data reaches destination in time
‘Ensures data is not duplicated
TwereteaaTe 1
LimeseomecTo 2
i Sue mossmmpecteng TO? 2
{Sec taemmape ergo |
iimerewenaiae
GWewemoteaonle 2
2
2
Disadvantages of using TCP: 7 Sano soc ng UEP.
‘+ Data acknowledgement schemes makes it slower than UDP | i wressuicsge
* Canmot be used for broadcast and multicast connections | {2 Yes sutrmeme.
i Wecraupe
+ User Datagram Protocol (UDP) | &
UDP is a reduced version of TCP. tis used in situations where the reliability overhead of TCP
‘ot required. Applications like steaming multimedia can tolerate some dats loss and hence can | Ser Datagram
‘se UDP slong with IP to deliver data. For example, a viewer may not detect a lost packet in video
‘seam when doing video-conferencing.
UDP does not use data acknowledgement schemes. Hence, it does not insert sequence numbers | | Y2P
cor keep wack ofthe data packets. These are expected wo artve in sequence or they are dropped. | |¥itariced |
Heoce. w maximise dats transfer UDP makes 1 communication channel between the | |"euena
‘communicating computers before transmission begins. oer te velbity
Advantages of using UDP: _overead of TOP 8
= Much faster tham TCP as it does not have the reliability overhead of TCP cee
+ More suitable for streaming multimedia applications and small data size [personas
‘© Canbe used for broadcast and multicast addresses [schemes
Disadvantages of using UDP:
+ Does not guarantee data delivery =
‘+ Data may not be delivered on time TT
+ Internet Protocol (IP)
‘The Internet Protocol (IP) was developed mainly for use in the Internet for addressing and
transporting data packets bowen compuerson a TCP/IP network. Any two computers in which
IPs mould! can communicate with each other independent of other interconnecting hardware.
e ‘switching network, a data packet that follows the IP specifications is called an IP
Ce PRES OFT pare an ener pr thar onan he source and dination P| oy
Satcors IP csc best effort delivery to deliver these datagrams. I doesnot provide any special | \ roe protcol
features to recover lost or corrupt data packets The recovery is handled by TCP. Hy
72.59
67|
|
VolP
&
File Transfer
Protocol FTP)
Ris a clen-server-
based protocal used
| to acess fies
| stores in tare
| FIP servers
| connected tothe
| eteret. works
slong with TCP to
‘malian relly in
data vanster
_—
(eae
mca
ce,
lars
eareem
{xeon
imei
aes
ar
&
Hyper Text
‘Transfer Protocol
(HTTP)
12: Chapter 5
Is a connectiontess protocol ic. it is not required to set up a
connection between the source and the end node before data
transmission begins. Its main function is to transport data packets
from source node to the next router connected to a network closer
tothe final destination node. As seen in the diagram, the data packet
iis forwarded from source S to end node Evia the routers Ri, Re, and Ry.
Voice over Internet Protocol (VoIP), is a technology that allows a user to make voice calls or make
‘multimedia sessions over an IP network, instead of using a regular (or analog) phone line.
Advantages of using
* Helps to find the optimal route for a data packet from source to destination node Makes
communication across computer networks independent of interconnecting hardware
= Transforms a collection of networks like the Internet to a seamless communication system
* File Transfer Protocol (FTP) FIP Server FTP Client
| eTP is a elentserverased Application Layer Pre rom
protocol uted to acces fils stoned tn diferent FIP 2
Servers connected tthe Internet FTP works lng With
‘TCP for maintaining reliability in data transfer. Seemed te
| Toimznetwithan FT? snr thle compat hast fist log into the server. The wera te
| browse truth the le econ nd owafeadluploa the speci is, During communis
FP epes to crmestons ist ope a Conte conesonf nd convo ial ad tes
Opens atn onnecion ase e's ata
| There are two different modes of file transfer. By default, FTP uses ASCII mode to download text
Ts Todovnlnd guy au, ideo exeubleor ber non tent eth Binary made sed
FTP can we eer secured ote wit gin name and pasrword for secured data transferor
tnonymous mode wih edeed incom all the general able oases les as goes
| Advantages of using FTP:
nT lows wns of map les and rector
Ifa file download gets interrupted midway due to some
reason, FTP downloads the remaining of the file only,
when the connection is resumed.
FTP can be used to automatically transfer files at specific
times to help in data backup.
Disadvantages of using FTP:
* Generally, requires a login name and password to access an FTP site
+ A-new session is required for each file transfer. Ths slows down multiple file transfer.
+ User may need to remember various commands to work with FTP downloads.
+ Hyper Text Transfer Protocol (HTTP)
1 Wt alton oT?
8 Wt ashore on HTTP
HTTP, which first appeared in 1990, is another clientserver-based Application Layer protocol
used for data transfer. A Web browser software acts as a client to download files from a WeD
server. HTTP works along with TCP for maintaining reliability in communication
To access any Web sit, the Web browser using HTTP makes a direct connection with the Web
server. The Web server in tur transfers the required file to the Web browser using HTTP. It allows
the client and the server to maintain the connection untit all objects on a page are transferred
‘After the transfer is completed, HTTP terminates the connection.
2-5-10
68Rudiments of Computer Science Motropottan Area and Wide Area Networks
HTTP does not use any encryption, and requests and rower
responses are visible to anyone between the Web Paoee a
communicating servers. HTTP comections can be fj
secured using the transport layer protocol Secure
iirtPoctrrs a 2 2
ITP Serer Chonttner
Advantages of using HTTP: [gq aaieumaan a]
+ Can be used to transfer large volumes of data 1 Sin ceterne an TP? ||
+ Multiple transfers can be made using a single connection. | * rpms TP)
* Pipelining allows user to ask for the next transfer before | _¢ Sve Ztiees sien HTTP ont
ending the previous one. ster be ule Hl
Sinise raeentena 3
Disadvantages of using HTT! 5 Gin nce Toe 2
+ HTTP uses large packet headers containing additional information like metadata
* Information sent over HTTP is not enerypted and can pose security problems.
ferences between HTTP and HTTPS
1, Itisan unsecured protocol 1. Htisa seeured protocol |
2. Itsends data over port 80 2. teuses p to send data |
3, _Itoperates atthe application layer 3. Toperates atthe transport layer |
4. Itdoes not have any encryption 44. The data is enerypted before sending
Differences between FTP and HTTP
1, Used to download/upload files to FTP server | 1. Used to download fils from Web server
2. Most FTP servers require the user to log on to |2. There is no such requirement for transfering
the server in order to transfer files Ses from a Web server using HTTP.
3._ FIP can transfer data both as ASCH or binary |3. HTTP always transfers data as binary data
4. FIP can be used on « command line interface, | 4. The browser Is the most common software for
a graphical client software, o browser using HTTP
3. FTP has to create anew seston, one foreach | 5 A client can mania a sage connexion a
new data transfer Server and we that fr mull transfers
+ TELNET Zl Tye
Telnet is a client-server protocol in the Application Layer. 54" _Glent
Ivallows users to login and run programs on a remote E24 SL
computer in @ network. It allows a user to connect to Remote =
fnother computer and access its data and programs, as if Computer Computer
the user's keyboard and display unit are attached directly tothe remote computer.
‘The user needs TCP/IP and a Telnet client program (like Tera Term, PUTTY etc.) o connect toa
remote computer. Once connection is made, the local application connects the user's display and.
keyboard to the remote computer. The user can then interact with the remote computer directly
Information entered by the user at the Telnet client computer is processed at the remote computer
‘and the output returned to the client. When the user finishes work and logs out of the remote
‘computer, control ofthe keyboard and display are again returned tothe local computer.
Advantages of using Telnet:
* [allows users at one site to interact with applications that run on a computer at another site
[tis a cent server
bated Transport
| Layer protocol used
for fle wanser ina
secured manner
‘ing encryption
&
Difference biw
HTTP and HTTPS
a
Difference biw
FTP and HTTP
P2514
69art 2: Chapter 5
‘+ One can fix problems in a computer from a remote computer using Telnet.
7 Gaia estan ang Taha
2 vis raters tteen
+ Remote computers can be monitored using Telnet.
Disadvantages of using Teinet: ‘ont A
ssn Pastons
Telnet is not secure as everything is sen in plaintext. beter emer
+ Working on a computer through Telnet is slow.
Differences between FTP and TELNET
User ean login to an FTP server and upload or | 1. User can login toa TELNET server and int
download any type of file
swith programs on the remote TELNET server,
2 While using FTP, most processes run on the
user's computer.
2, While using TELNET the majority of processe,
run on the remote host computer.
3. Using FTP, the user merely uploads!
downloads files from the FTP server hard disk.
3. The user's keyboard and display get attached
directly to the remote computer using Telne
4 FTP cannot be used to control remote servers,
4. An administrator can use TELNET to have
‘ts that part of an |
| network tis unique
fora given network.
‘access and control a remote server.
ers
‘+ The IP Addressing Scheme
‘Any device that uses TCP/IP needs at Jeast one unique IP address for each connection. An IP
address is a 32-bit binary number divided into 4 octets with eight bits per octet. The assignment
and maintenance of IP addressing is maintained by InterNIC. As it is difficult to remember a 32-bit
binary number, for convenience the address is writen by converting each octet to decimal, An
example ofan IP address and the corresponding decimal representation is given below.
0101000 nn
4 4 4
(x). ae). ao). AS) tess in deci
As an octet consists of 8 binary digits, each octet in an IP address can have a value from 0 to 255,
Before a computer uses this address, it converts it to binary. An IP address consists of 2 parts as
a. The Network ID: It is that part of an IP
address which is shared by all devices in a
network. It is unique for the entire
network and identifies a particular network.
b. The Host ID: Each device within @ given
network has a unique host ID. tis that part
of the IP address which separates different
devices with the same Network ID icc. in
the same network
‘The above diagram shows two different networks connected by a router. We find that all computers
in Network-I have the same network ID ic. 25, while all computers in the Network-2 have the sat
network ID i.e. 27. To distinguish between the different computers in Network-1 having the coma
network ID 25, different host IDs like 0.0.1, 0.0.2, 0.0.3 are given to each of them,
Thus, in the full IP address 25.0.0.2, the first octet here i.e. 25 represents the network ID. Its
common tall computers in Network-1. Last 3 octets ic. 0.0.2 form the host ID fora given compult
only. Combination of network ID and host ID forms a unique address of a computer in a netwott
25.0.0.2
1900000 op0i0r0 1 Adress ary
Different Host IDs, ferent Host Oe
P2-5-12Rudiments of Computer Science Metropolitan Area and Wide Area Networks
‘The Different Classes of
Addressing:
The following are the traditional modes of addressing using IP addresses. All addresses are divided
{nto certain Classes depending on the distribution of the network ID and the host ID.
(oss
as B [Newark Newor Hos. Haat —| oat] Te
[cuss ¢— [Network Network Network; Har] 10 [108 33] 2097150
[cs DE [Spec Asses andre ovale rconaling
Thus, it can be seen thatthe address classes specify which octet of [fy 7 Novete atwenasesd® 7
the IP address isthe network ID and which pat isthe host 1D. It |} 2 wets Aang? 2
also specifies the number of hosts supported by each class iWsnersteay 2
+ Class A Address: Any IP address that starts with a °0° in | *Wihencisst ates fare |
binary in the first bit of the first octet is a Class A address, (6. Which clans of IP aséresves has te
The first octet epresents the network IDandthe last} octets | hemes?
represent the host ID. Thus, a Class A address is of the form | Viteassdae tetoug P| |
(where each x can be a 0 oF I) Dates omcntt 230082?
Qexexnry . vauxvcnnxxvanany. vsannsay | Maceo stSThO
Qexexuny « Survxany -uneanaen uexeeay a
‘Network ID weno
i.e» includes the range of addresses 1.0.0.0 to 126.255.255.255 in dotted decimal form.
A total of 126 Class-A type networks exist. Each such network can accommodate a total of |
about 16.7 million host computers in a network. Such addresses are generally used by
‘multinational companies with very large networks.
= Class B Address: Any IP address that starts with a‘10" in binary in the frst 2 bits ofthe first,
‘octet is @ Class B address. The first 2 octets represent the network ID and the last 2 octets
represent the host ID. Thus, a Class B address is ofthe form (where each x ean be a 0 of |)
JOxwxxex . crEEKaAy . saxsaay. LasxAry
CESEE REE SEEREEES rete aearanas
Network Hosti0
ic, includes the range of addresses 1280.0. to 191.285.255.255 in dotted desimal form
A total of 16,384 Class-B type networks exist. Each such network can accommodate a total
of about 65,534 host computers ina network, Such addresses are generally used by ISPs.
+ Clase C Address: Any addres tht starts with 4110" in binary in the fst 3 its ofthe fis |
octet isa Class C address The first 3 octets represent the network ID andthe last octet
‘Epresents the bos ID. Thus, a Class Cares i ofthe frm (where each can be 0 or 1)
etl esto
ies includes the range of adresses 192.0.0.0 to 228.255.258.255 in ded decimal form,
‘Atotal of about 2 millon Class-C type networks exist. Each such network can have a toa
2S5a het computers Such adresses re generally wed by small or midsized compe.
these addresses are used for Multicast addressing i.., addressing a group
Class D Address:
‘of Inermet addresses and start with 1110 inthe first octet It includes the range of addresses | | epenmens!
224,0,0.0 to 239.255.255.255 in doted decimal form. [sa
+ Class E Address: These addresses are experimental addresses and reserved for future use. 1P | |‘Mureune
addresses in this clas ranges fom 240.0.0.0 to 255.255.255.254 Pissersetny-9
—eee Pc TF | HE ETH
725-13
”
&
Classes of iP
addresses,
| addres that
[sats with 0 as
| rt ofthe ist
| octets a Cass &
address. Fistoctet
| Network nee 2
octets Hot
| cuss Ades
Padaress that
|stats wah 110 25
[frst 3s ofthe rst
|ectets a Class ¢
| dare First
octets Network,
|lastectet Host.
| Tess adresses are—
|
| + Internet Protocol version-6 (Pv) Addressing:
| Internet Protocol version 4, generally referred to as IPv4, was
| the intemet grew, with today’s smartphones and IoT (Internet of
| Things) devices, it quickly ran out of addresses.
| intemet Protocot version 6, or IPV6, was first introduced in the late 1990s as a replacement for
IP4, when it could no longer support the load. At present, {Pv coexists on the internet with IPv6,
‘though eventually, everything will use IPV6. In addition to increasing the range of IP addresses, TPvg
ey
224.0.0.0 10
239.255.255.255
Seo
192,0.0.x t0
223,255.255.x
Pv
ps
tis a replacement
forlPvt as an
| adressing scheme
|forcomputers
connected tothe
lintemet Risa 128] also has better security features.
Jit adsres divided
pee IPV6 uses 128-bit addresses, allowing for theoretically a very large number of addresses. IPv6
addresses are represented as eight groups of four hexadecimal digits, with the groups being separated
by colons. An example of such an address is 2002:0de6:0001 0042-0100:8c20:0370:7234.
Difference between IPv4 and IPv6
separated by colons
a mE
'Pv4.and'Pv6 || 2. itis numeric address separated by periods | 2. Itis alphanumeric address separated by colons
[Wists secure an 16 3 is more secure tha IPv4
| [4 Teases ARP (Address Resolution roweal | 4 Ituses NDP (Neighbour Discovery Protocol) ©
| |< map MAC addresses map MAC adéreses
5 Offers five classes of P Addess (Class AoE) | 5. Offers an uallmited numberof I addresses
‘+ Domain Name System (DNS)
It can be difficult to remember the IP address of a computer. To overcome this problem,
alphanumeric names called domain names are used in place of IP addresses to communicate with
‘computers. Each domain name corresponds to a particular IP address. The Domain Name System
‘or DNS was invented during 1983-84 for the Internet and maintained by InterNIC. It is used for
Biving specific names called domain names to computers corresponding to particular IP addresses.
A special computer called a domain name server is used to translate an alphanumeric domain
name (like www:googlecom) 10 its
| corresponding IP address before using it
‘A. domain name normally has. the
following parts
* Root Domain; At the top of the
hierarchical structure of the domain
name system isthe Root Domain which
is represented by a dot (.)
‘+ Top Level Domain: Below the Root
Domain are situated the TLDs or Top-
Level Domains. This is the rightmost
part of a domain name. There are two
types of TLD extensions. These are:
species
| the purpose and
| country of oii,
72ema Metropolitan Area and Wide Area Networks
Generie: This type usually indicates the purpose of an organisation. Some of these include:
om [0 | For commerei
‘edu | For educational organisations,
net | For ntemet Service Providers gov | For government organisations
org | For ther non-profit organisations | mil | For military organisations (US mainly) |
biz | For busines organisations ib [For ibary sites —]
Country: These are used to specify the country where the sever is located, Some ofthese include:
ia Forindia ‘ca | For Canada ‘ap __| For Nepal ]
‘au For Australia ‘de_| For Germany nz | For New Zealand |
fr | ForFrance Ik _| For Hong Kon plc] For Pakistan ]
es_| For Spain ip | For Japan ru_| For Russia
tuk_| For the United Kingdom [tk —[ For Si Lanka en For China ]
* Second-Level Domain: This is the middle section of a domain name and indicates a unique
‘name for an organisation. Different organisations with same top-level domains are distinguished
by their second level domain names. For example google.com and onge.com are both commercial |
‘organisations but differ from each other by their second level domain names google and onge
+ Third-Level Domain: To identify closely related divisions of an organization another word
called a third-level domain or « sub-domain may be added at the very beginning of a domain
name. Example sales.onge.com, www.yahoo.com etc. However, tis is fully optional
How DNS works:
‘Computers can work with IP addresses only. Hence, to access a computer in a network using domain
names, first the domain name needs to be translated to the corresponding IP address. To do that,
the application program contacts the DNS server and sends a request to translate the domain name
‘The DNS server contains a list ofall computer names along with their IP addresses. The server
looks up the answer in its list and returns the correct IP address tothe application. The application
program finally connects to the desired computer using the IP address received ftom the DNS server.
Differences between IP and DN:
aries Pena
1, Itisa numeric address 1. Itis an alphanumerie addres.
S-No translation ofthe aro svequed Weta [2 Needs tobe ransnted oh consenting P
tose Mares before
3._Dicult to remember such numeric addresses. | 3. I is easy to remember such an addres
4. Example 192,168.20.8 4. Example www.google.com
‘© Uniform Resource Locator (URL) |
To access a particular file or Web-site on the Intemet, one has to know the IP address or the domain
ame of the server where the file resides. Apart from this, the fle path and the protocol used to
tet the file also needs to be given. The general form of such a process is given below:
name: // domain_name_of server / path_of file
protoc |
‘The complete information having file retrieval protocol, domain name ofthe server on which the
fle resides and the file path is called the Uniform Resource Locator or URL of th fle. When a
tise enters the URL ofa Website int the browser the browser extracts the domain name from the
URL and connects tothe server. The retrieval scheme is used to retrieve the file from the given path
‘The most commonly used URLs one encounters are when using the World Wide Web (WWW).
To understand the different parts of a URL, let us use the example of the URL of a web page as given |
inthe next page: -
20 73 ao
Second Level
| Domain
| este mia
section ofa domain
name andiniates
‘unigue name for
an omanisaton
a
Difference biw
IP Address and
Domain Name
&
Uniform
Resource
Locator (URL)
at
isthe complete
information wih fie
retreal protocol,
| domain name of the
[server on wtih the
|i esaop
Virtual Private
Network (VPN)
Part 2: Chapter §
ttp/yww.ShopOnline.comy/index. html,
hi
hetpsitqwr ind
The Trnser Protocol Comainname ofserver Patho Flato Open
The above address gives the full information a browser or any other application needs to access
file on the web site www. ShopOnline.com.
* The first partic. httpr// indicates the protocol used for the communication. Web browsers
use Hypertext Transfer Protocol or http to connect to and exchange information with Web
servers. It can be other protocols like https, ftp, telnet etc.
‘The next part je. www.ShopOnline.com indicates the domain name of the server or the Web
site to access. The application will connect to this server and get the required information
‘The part after domain name indicates the path of the file to access is index.html. It shows the
default web file to open is “index.html”, which is located under the root directory of the server.
‘With HTTP servers if the file or path is not given, the server returns the default index file which
's generally the "index.html", "homepage html”, "home_htm!", or the "weleome.html” file.
|
| + Virtual Private Network (VPN)
A virtual private network of VPN allows a user to create a secure connection to another network
over the Internet. In doing so, it protects the user's identity and browsing activity from hackers and
other unwanted people.
‘When one signs up with a VPN provider, the user first logs into that service before connecting to the
internet. Once connected, others can't see the user’s activity. The VPN provider will encrypt the
user data, so that hackers, government agencies, and other businesses can't see what websites are
visited, messages sent, social media sites used, or files downloaded. This keeps others from spying
‘on a user's online activity
eee)
‘© When computers and other network devices are connected over
city, country, continent or the whole globe, itis known as a Wide Ar
+ Long distances and use of leased lines usually reduces the bandwidth of a WAN and makes it slower
than a LAN. Thus a WAN has bandwidth likel.544 Mbps fora TI digital WAN link to 44.184 Mbps
for a T3 digital WAN link
+ Different protocols used in a WAN include X.25, ATM, TCP/IP, FTP ete.
+ Leased lines are permanent point-to-point lis between two ot more points. A leased line connection
does not pass through the switching system of the telephone exchange and are always "ON"
+ In Circuit Switched Networks a fixed ciruit is set up during the time of communication and the |
circuit is maintained till the communication session is over
+ In Packet Switched Networks the information is transmitted in the form of discrete data packets. The
information that needs to be transite is fst broken down into smaller units called packets
+ Dial-up Line is any tclecommunication link that is used along with a modem. It is connected tothe
public telephone network and uses circuit switching technology to connect the two lncations
‘+ ISDN is aal digital dial-up service that uses standard telephone lines rather than dedicated digital ies
to simultaneously carry high quality voice, data, audio and video transmissions at 128Klbps across lon
distances using the existing telephone network
+ Basic Rate Interface (BRI) ISDN uses 3 channels of data over a single communication line. Its
also referred (0 as a 2B+D service. There are two 64-Kilobit full duplex Bearer channels OF
Bechannels used for carrying either voice or data and another single 16-Kbps full duplex Dstt
‘channel or D-channel. Its 1 control channel for setting up the connector
———————————
P2-5-16
14aan ae Metropolitan Aren and Wide Area Networks
* Primary Rate Interface (PRI) ISDN is usually designated as a 23B+D service. This supports up to 23
BE Cumelo( 64 Kips cochent resin ae
+ AMODEM is «device that swe te convert dg dat to analogue one and vice verso
communication through the local telephone lines. The word MODEM stands for MOdulator-
DiMaduatar Le thee devices arcane sone ot mans wget gual 6 malgue
femal (mdulation) and snsoges teed ieee
+ Tein Point Protea (FP comist ofaseto ptclht at edd rarsmison nr
‘valerie Eni te Seat Line eras Paden tithe wa dts se wrk, The
PP roto ste was devtape tanec cor ie eb nat SP
+ x2sisa pachetsvtching proton standard twa devdaped nthe 197s 8 goal standard
pratt ora pockecoeeinnsernd
+ Frame rely technology isa packecsching sevice nd react the le X25 ehology
for WAN links. " : a sa "
+ Asynchronous Traaser Mode or ATM is a bighapesd, bresdbandsrenminion date
csmmericaton techonogy bund sa ail a pein et tctanogy anche by
tclocoettealation pesto cary Sa rb snd a tn
+ TCPMP nthe name given oa amy of a conmreaton pcs sued apne compari
heterogenous netwerks «sgl opl neva aunt rscoleensoeelcdae ne
Pooiaoe
+ The TCPMP reference model was developed daring the 1970 with the sim to interconnect
lead pis at eaxpuecr rer amet tanec sca tear ns emcee
tGrooghootesbaruni phn ie ane Seen ame eben
+The TCPMP rte st = deyred dl wi caer sai eet reebiliyand
il ea ibace aelal St coneseiatie tas ase
Turco Preccl (yes sreer pe prc adr coped ly res a
Inrae mt Soareaey talteriag pocees aaa ceoae bees vente tare
pelle the ret Searane Lott coupe shad comnts wi enor |
vert ke he ert |
IY er bi nk a pct tn fey een sled Dera
> iP doo oo guavas ley of ta Te eerie tr problem the gv anapercayr |
Pesase cama iaetaedee Cosel eats Tes ees eeeastoeavenaat oa
by using acknowledgment schemes
«Scena ne TOF ee ennpr ayer proce laity a esteing tr nt inde
Sites web towers FTP Teneo
«UDP cteedsevion cTCF het wort We exebmeta wih IF best er caer serves
ee apa et reper bal tbat etd
rae ete stent Tras andbencecn te UDF rong uf Savers
= aolannee dares TOPAT nou oat or wir ade Brecher The des
is a 32 bit binary number divided into 4 octets with eight bits per octet like
Foust soyo11s 1011001000101
Dest WUAMaiaa aes cence a seme pee
etwork or pyle spent
dana re newak ora py vgmen browse Ho ID. tp of
Bach a ve a aonb wk nv cane Neyo
Fe Reta antec her Basa eratccm Neen)
Aa re tata anh a3 one rpreet he oa
conse een nas m brary inte fs 2s of eft ons Ca es
fay des ht a ec ID athe ois oer he He D
co nace ee vent inary Inthe feo 3 Ula of anit ott a Cas C
Ayn sry in 1 nuh ft fh i i is
ce eee we taantenng kg fon om stom arte overs emp network
|__Ofthese FTP is among the earliest and mostefficientone 0
P2517
75|
Part 2: Chapter §
les, change directories et. from
+ There are two different modes of FTP file transfer. For downloading text files one has t0 select the
ASCII option. For downloading graphics, audio, video, executable or any other non-text file one has
|| select Binary mode
| | + Using FTP; fies can be queued up for upload and download purpose
+ During FTP file transfer ifa file download gets interrupted midway due to some reason, then FTP wit,
‘download the remaining ofthe file only, when the connection is resumed
+ One can make a program use FTP to automatically transfer files at specific times during a day
+ Uploading a single file using FTP is much easier than using HTTP
‘+ HTTP is another file transfer protocol, which has essentially replaced FTP's command based
interface for file transfer, with a more user-friendly point-and-click graphical interface, that
supports hyperlinks
‘+ HTTP isa client-server protocol inthe application layer of the TCP/IP model that supports hypermedia
‘+ Using HTTP, web browser software acts asa client to download HTML files from the Web server
HTTP does not use any encryption and requests and responses are visible to anyone between the
communicating servers
‘+ HTTPS or HTTP Secure is a better secure version to transfer files over the Internet
+ TELNET (or TELetype NETwork) protocol permits users to login and run programs on a remote
computer over the Internet
‘Telnet allows a user to remotely connect to another computer and access it, as if the use
keyboard and display unit are attached directly to the remote computer
‘Information entered by the user atthe Telnet client computer is processed atthe remote computer and |
the output retumed to the client. When the user finishes work and logs out of the remote computer, |
control of the keyboard and display are again retumed to the local computer
+A remote login service like Telnet allows a user at one ste o interact with application programs
that run on a computer at another
+ Onecan
problems in a computer fom a remote computer using Tenet
+ DNS or Domain Name System was invented for the Internet and maintained by the InterNIC. It
isa hierarchical distributed database system used for translating domain names to IP addresses,
| | + domain name is an alphanumeric name of computer in a ntwork with each name coreesponding o
‘unique I address. On the Intret & computer can have more than one domain names but only one
address
+ Atte top ofthe hierarchical structure ofthe domai
represented by a dot ()
+ Below the Root Domain are situated Top Level Domains Thi is the rightmost part ofa domain name
Examples include com, edu ore, i,k te |
+ The Second-Level Domain isthe middle section of «domain name and indicates unique name |
for the organisation. Different organisations with same top-level domains are distinguished BY
their second evel domain names
+ To identity closely related divisions of an organization another wor called a third-level domino ¢
sub-domain may be added at the very begining ofa domi name
+ To access a particular file or Web-site on the Internet, one has to know the IP address or the
domain name of the server on which the file resides. Apart from the domain nasa teo other
things need tobe specified These are the path ofthe filet acces and the scheme or proteca sed
torretreve the file
+ The complete information containing the ile revival scheme, domain name of server on which the le
resides andthe file path, is called the Uniform Resource Locator or the URL of te leo ta Wee ste
+ Voice over Internet Protocol (VoIP), is technology that allows auserto make voice calls or make
multimedia sessions over an IP network, instead af wsinga regular (or analog) plane ing |
+A virual private network of VPN allows @ user to create a secure connection to another network Ov"
the Intemet. In doing so, it protects the identity and browsing activity from hackers and other people
to
P2-6-18
76