Chapter-9 Introduction To Computer Networks
Chapter-9 Introduction To Computer Networks
PGT (I P)
8800191961
Chapter-9 COMPUTER NETWORKING
Evolution of networking:-
1969 (ARPANET) was started to connect computers at US defense department &
different universities.
1980 (NSFnet) was started to make a high capacity network to be used strictly for
academic & engineering research.
1990 (INTERNET) internetworking of ARPANET, NSFnet and other private
networks resulted into internet. (Network of networks is called internet.)
CLIENT:- It is the user interface which is responsible for sending users query to
request to the Server / Database Server.
SERVER:- A computer that facilitates the sharing of data, software and hardware
resources (e.g. printers, modem etc.) on the network. (or it is responsible for receiving
clients request, processing the request and sending back the result to the client).
(Non-dedicated Servers:- On smaller networks, the computer works both as
workstation and as well as server.
Dedicated Servers:- On bigger network, the computer is reserved for server’s job and its
only job is to help workstations access data, software and hardware resources).
Network Interface Unit [NIU] / NIC [Network Interface Card] :- A Network Interface
unit is an interpreter that helps establish communication between the server and
workstations.
MAC Address:-(Media Access Control) It is unique physical address assigned by
NIC manufacturer to NIC. It is a 6 byte address with each byte separated by a colon e.g.
a sample MAC address could be : 10 : B5 : 03 : 63 : 2E : FC
Manufacturer id Card no
1
ANUJ KUMAR
PGT (I P)
8800191961
Types of switching:
(a) Circuit switching:- In this technique, first the complete physical connection
between two computers is established and then data is transmitted from the source
computer to destination computer.
(b) Message switching:- In this technique, the source computer sends data or
message to the switching office first, which stores data in its hard disk. It then
looks for a free link to another switching office and then sends the data to this
office. This process is continued until the data are delivered to the destination
computer(s).
Block size of data to be transmitted is not fixed.
(c) Packet switching:- In this technique, the source computer sends data or
message to the switching office first, which stores data in its RAM. It then looks
for a free link to another switching office and then sends the data to this office.
This process is continued until the data are delivered to the destination
computer(s).
Block size of data to be transmitted is fixed.
TRANSMISSION MEDIA/CHANNEL:-
(Guided/ Wired Twisted pair, Co-axial, optical fibres.)
(Unguided/Wireless Micro waves, radio waves, satellite communication, infra
red, LASER)
Guided/ Wired Transmission Media:-
Twisted pair :- Two identical insulated copper wires wrapped together in a
double helix. (Twisting is to reduce cross-talk i.e. bleeding of signal from one wire to
another)
2
ANUJ KUMAR
Advantages: PGT (I P)
(i) It is easy to install and maintain. 8800191961
3
ANUJ KUMAR
PGT (I P)
Un-Guided/ Wireless Transmission Media:- 8800191961
Infra red communication:- The infra red light transmits data through air and can
propagate throughout a room (bouncing off surfaces) but will not penetrate walls. (such as
TV remotes)
4
ANUJ KUMAR
PGT (I P)
TYPES OF NETWORKS:-
8800191961
WAN (Wide Area Network) :- It is spread across country. These are the
networks spread over large distances, say across countries or even continents through
cabling or satellite uplinks are called WAN.
Types of topologies:-
Advantages:
(i) Easy to connect and install.
(ii) Involves a low cost of installation time.
(iii) Short cable length and simple wiring layout.
(iii) Can be easily extended.
Disadvantages:-
(i) The entire network shuts down if there is a failure in the central cable.
(ii) Only a single message can travel at a particular time.
(iii) Difficult to detect fault and remove faults.
5
ANUJ KUMAR
PGT (I P)
8800191961
Advantages:
(i) Easy to troubleshoot
(ii) A single node failure does not affect the entire network.
(iii) Fault detection and removal of faulty parts is easier.
Disadvantages:-
(i) Difficult to expand.
(ii) Longer cable is required.
(iii) Central node dependency.
(iii) The cost of the hub and the longer cables makes it expensive over others.
(iv) In case hub fails, the entire network fails.
Advantages:
(i) Short cable length required.
(ii) No wiring closet space required
Disadvantages:-
(i) Node failure causes network failure.
(ii) Difficult to diagnose faults.
(iii) It is not possible to shut down a small section of the ring while keeping the majority
of it working normally.
6
ANUJ KUMAR
PGT (I P)
8800191961
Tree :- The shape of the network is that of an inverted tree with the
central root branching and sub branching to the extremities of the network.
7
ANUJ KUMAR
PGT (I P)
NETWORK DEVICES:- 8800191961
RJ45 connector: - The RJ-45(Registered Jack) connectors are the plug-in devices used in
the networking and telecommunications applications. They are used primarily for
connecting LANs, particularly Ethernet.
Repeater :- It is a network device that amplifies and restores signals for long
distance transmission. (It used in between two nodes where distance exceeds 70meters)
Router :- It is a network device that works like a bridge but can handle
different protocols.
CRACKERS :- The crackers are the malicious programmers who breaks into
secure system.
OSS(Open Source Software):- Software whose source code is available to the user.
FS(Free Software):- Software which is available to an user without paying any cost for
it.
8
ANUJ KUMAR
PGT (I P)
PROTOCOL:- Set of rules used for communication. 8800191961
A protocol means the rules that are applicable for a network.
It defines the standardized format for data packets, techniques for detecting and
correcting errors
and so on.
A protocol is a formal description of message formats and the rules that two or more
machines must follow to exchange those messages.
NETWORK TERMINOLOGIES
Cookies: Cookies are the text messages sent by a web server to the web browser primarily for
identifying the user.
Firewall: A firewall is used to control the traffic between computer networks. It intercepts the
packets between the computer networks and allows only authorized packets to pass.
Cyber Law: Cyber law refers to all the legal and regulatory aspects of Internet and the World
Wide Web.
Cyber Crimes: Cyber crime involves the usage of the computer system and the computer
network for criminal activity.
Hacking: Hacking is an unauthorized access to computer in order to exploit the resources.
Web Services:
WWW: The World Wide Web or W3 or simply the Web is a collection of linked documents or
pages,
stored on millions of computers and distributed across the Internet.
HTML (Hyper Text Markup Language):- HTML is a computer language that describes the
structure and behavior of a web page. This language is used to create web pages.
XML (eXtensible Markup Language):- Extensible Markup Language (XML) is a meta
language that helps to describe the markup language.
HTTP (Hyper Text Transfer Protocol):- A protocol to transfer hypertext requests and
information between servers and browsers.
Domain Names: A domain name is a unique name that identifies a particular website and
represents the name of the server where the web pages reside.
URL:- The Uniform Resource Locator is a means to locate resources such as web pages on the
Internet. URL is also a method to address the web pages on the Internet. There are two types of
URL, namely,absolute URL and relative URL.
Website: A collection of related web pages stored on a web server is known as a website.
Web browser: A software application that enables to browse, search and collect information from
the Web is known as Web browser.
Web Servers: The web pages on the Internet are stored on the computers that are connected to the
Internet. These computers are known as web servers.
Web Hosting: - Web Hosting or website hosting is the service to host, store and maintain the
websites on the World Wide Web.
Web Scripting: - The process of creating and embedding scripts in a web page is known as Web
Scripting. Types of Scripts:-
(i) Client Side Scripts: - Client side scripts supports interaction within a webpage. E.g. VB
Script, JavaScript, PHP (PHP‟S Hypertext Preprocessor).
(ii) Server Side Scripts: - Server side scripting supports execution at server – end. E.g. ASP, JSP,
PHP
(Note:- The highlighted portion web scripting is deleted for 2020-21)
Cookies: Text files that are created by web servers on client system
for maintaining session with them.
Spams: Unwanted e-mail (usually of a commercial nature sent out
in bulk)
Internet VS Intranet
The Internet is a wide network of computers that is available to all
whereas Intranet is a network of computers designed for a certain
group of users. Internet is a public network and Intranet is a private
network. Internet contains various source of information while
Intranet only contains group-specific information.
11
ANUJ KUMAR
PGT (I P)
8800191961
Add-on Vs Plug-in
Add-on and plug-ins are two widely used terms in browsers. Both the terms boost the
performance of browser. Add-ons to add extra features to a web browser and plug-ins to
add some missing functionalities.
Plug-in is a complete program and add-on is not a program.
For example Flash is an plug-in which is a complete program. Flash player made by
Adobe is required to play a video in web browsers.
Java is a plug-in made by Sun Microsystem which is used to run programs based on Java.
Plug-in is not bounded for browsers only.
12
ANUJ KUMAR
PGT (I P)
8800191961
ABBREVIATIONS:-
LAN Local Area Network
MAN Metropolitan Area Network
WAN Wide Area Network
WWW World Wide Web
WLL Wireless in Local Loop
GSM Global System for Mobile
CDMA Code Division Multiple Access
SIM Subscriber Identification Module
3G 3rd Generation of mobile communication technology
EDGE Enhanced Data rates for Global Evolution
SMS Short Message Service
NIU Network Interface Unit
TAP Terminal Access Point
AM Amplitude Modulation
FM Frequency Modulation
PM Phase Modulation
NFS Network File Server
FTP File Transfer Protocol
HTTP Hyper Text Transfer Protocol
HTML Hyper Text Markup Language
DHTML Dynamic Hyper Text Markup Language
XML Extensible Markup Language
ARPANET Advanced Research Projects Agency Network
NSFnet National Science Foundation network
VGM Voice Grade Medium
DGM Data Grade Medium
OSS Open Source Software
FLOSS Free Libre or Livre and Open Source Software
GNU GNU’s Not Unix
FSF Free Software Foundation
OSI Open Source Initiative
W3C World Wide Web Consortium
BNC connector Bayone Neill Concelman connector
AUI connector Attachment Unit Interface connector
VOIP Voice Over Internet Protocol (used in voice communication)
SIP Session Initiation Protocol (used in voice & video calls, instant messaging)
H.323
PAN Personal Area Network
VPN Virtual Private Network
MMS Multimedia Messaging Service
DHCP Dynamic Host Configuration Protocol
GPRS General Packet Radio Service
GPS Global Positioning System
SMTP Simple Mail Transfer Protocol
POP Post Office Protocol (used for retrieving emails)
IMAP Internet Mail Access Protocol (used for retrieving emails)
GPS Global Positioning System
13