This document provides an overview of computer networks, including their goals, applications, terminology, and technologies. Some key points:
- Networks allow for resource sharing, reliability through redundancy, and lower costs through shared infrastructure. Common applications include file sharing, access to remote databases, and communication.
- Network components include nodes, servers, switches, routers, and more. Communication occurs via various transmission media like twisted pair, coaxial, fiber optic, radio waves, and satellites.
- Protocols govern network communication and include TCP/IP, HTTP, FTP, and others. Wireless technologies enable mobile computing through standards such as GSM, CDMA, GPRS, and emerging generations of cellular networks.
CNIC Information System with Pakdata Cf In Pakistan
Â
Comm. & net. concepts
1. Behind the need to communicate,
there is a need to share.
Behind the need to share, there is the
need to be understood.
â Leo Rosten
Communicate and
Share with NetworksâŠ
2. Network Goals :
Resource Sharing
Reliability
Cost Factor
Communication Medium
Application of Networks :
1.Sharing â Easy and flexible. 3 types of sharing :
Peripherals â Expensive, Each peripheral connected to main frame.
Sharing in a multi-user system â Controlled access
Traditional time sharing â Central control
2.Access to remote database
3. Communication facilities
3.
4. The Interspace :
ï¶ Client/server software which allows multiple users to
communicate online with real time audio, video and text chat in
dynamic 3D environments.
ï¶ Vision of what Internet will become.
Terminology of Networks :
Nodes(Workstations) - Computers in a network.
Server â A computer that facilitates data sharing.
Types of servers :
1.Non-dedicated â Workstation that can double up as server.
2.Dedicated â Computer reserved for serverâs job.
Network Interface Unit (NIU) â Interpreter that helps establish
communication between server and workstations.
5. 1.Circuit Switching :
Physical connection is established first b/w two
computers.
End-to-end path setup is needed to send any data.
2.Message Switching :
Data or message is sent to the switching office first.
The office sends this data to another office through a free
link.
Also known as store and forward.
3.Packet Switching :
Tight upper limit on block size.
Packets of fixed size are stored in main memory.
This improves performance Throughput improved.
6. Data Channel : Medium used to carry information from one point to another.
Baud : Unit of measurement for information carrying capacity of a channel.
Bits Per Second (bps) : Speed of data transfer.
Bandwidth : Difference between highest and lowest frequencies of a transmission channel.
Directly proportional to amount of data transmitted or received per unit time.
Higher bandwidth channels â broadband and lower ones â narrowband.
Data Transfer Rates : Amount of data transferred per second by a channel or a computing or
storage device.
7. âą Come in pairs, twisted
around each other.
âą Types â Shielded and
unshielded.
âą Advantages :
âą Disadvantages :
âą S
âą Solid wire core
surrounded by one or
more foil or wire.
âą Used for television
signals.
âą Types â Thicknet, Thinnet
âą Advantages :
âą Disadvantages :
âą Thin strands of glass or
glass like material.
âą Light sources â LEDs
or LDs.
âą Advantages :
âą Disadvantages :
o Simple, flexible
o Low weight
o Easy connection
o Inexpensive
o High attenuation â
Unsuitable for long
distances
o Low bandwidth
o Can be used as basis for
shared cable network.
o Higher bandwidths â upto
400 mbps
o Expensive
o Not compatible with
twisted pair cables
o Immune to electrical,
magnetic interference.
o Highly sustainable for harsh
industrial areas.
o Guarantees secure
transmission.
o Connection loss
o Difficult to solder.
o Fragile â Special care
(GUIDED)
TWISTE
D PAIR
COAXIAL OPTICAL
FIBRE
8. âą Parabolic antennas
mounted on towers.
âą Higher tower â greater
range
âą Line-of-sight transmission
âą Advantages :
âą Disadvantages :
âą S
âą Sine waves are used to
transmit information.
âą Transmitter and receiver
use antennas to radiate
and capture the radio
signal.
âą Advantages :
âą Disadvantages :
âą Uses the synchronous
satellite to relay the radio
signal.
âą Security provided by
coding and decoding
equipment.
âą Advantages :
âą Disadvantages :
o Cheap
o Ease of communication
over difficult terrain
o Insecure
o Susceptible to rain, storm,
etc.
o Limited bandwidth
o Mobility
o Ease of communication
over difficult terrain
o Insecure
o Susceptible to weather
effects
o Large area cover
o Heavy usage of
intercontinental traffic â
commercial attractive
o Overcrowding of
available bandwidths
o High investment cost
(UNGUIDED
)
MICRO
WAVE
RADIO
WAVE
SATELLI
TE
9. COMPUTER NETWORK â Computers linked by means of communication system.
4 TYPES OF NETWORKS : (Based on geographical spread)
LAN WAN MAN PAN
10. Local Area Network(LAN):
Confined to a localized area.
Purpose: Resource sharing.
Most LANs use cables to connect network
interface cards.
Example : Network within office/building.
Metropolitan Area Network(MAN):
Spread over a city.
Purpose: Sharing hardware and software resources
among users.
Examples: Cable TV networks over a city
11. Wide Area Network(WAN):
Across Countries.
Can also be a big group of LANs.
Purpose:
Connected through public networks/leased lines/satellites.
Example : The Internet-The Largest WAN.
Fast and efficient exchange of information
cost , speed
Personal Area Network(PAN):
Interconnection of IT devices within range of an individual.
Purpose : Transferring files from one device
to another.
Can be connected without wires.
Example : Laptop with printer (or) mobile with laptop.
13. Factors which decide the best suited topology:
Cost â Minimum cost by minimizing distances.
Flexibility â Network should allow easy reconfiguration.
Removing old nodes and adding new ones.
Reliability â Allowing detection of fault location
and providing means to isolate it.
TOPOLOGY â Pattern of interconnection of nodes.
Let us now see about different network topologiesâŠ
14. 1.Point To Point Link :
Each station receives exactly from one transmitter and each
transmitter transmits to exactly one receiver.
Transmitting and receiving operations can occur over
separate/same wires.
2.Tree Topology :
Central root branching and sub-branching to the
network extremities.
Best suited for applications which have a hierarchial
flow of data control.
3.Graph Topology :
Arbitrary Linkage â A link may or may not connect two or more
nodes multiple links can also exist .
Connected Graph â Path established in two nodes via one or
more links.
15. ï± Single-path connection from all
nodes to a central node.
ï± Used in most info networks â data
processing, voice comm.
ï± Advantages :
ï± Disadvantages :
o Ease of service
o One device per connection
o Centralized control
o Simple access protocols
o Long cable length
o Difficult expansion
o Dependence on central node
ï± Various nodes attached to single
length of transmission media.
ï± Host at one end communicates with
several terminals.
ï± Advantages :
ï± Disadvantages :
o Short cable length
o Resilent architecture
o Easy extension
o Difficult fault detection and
isolation
o Repeater configuration â
necessary during extension
o Intelligent nodes needed
ï± Each node connects to only two
neighbours.
ï± Data travels in one direction only.
ï± Advantages :
ï± Disadvantages :
o Short cable length
o No wiring closet space needed
o Suitable for optical fibres
o Node failure Network failure
o Difficult fault diagnosis
o Very difficult fault isolation
4.STAR
TOPOLOGY
5.BUS/LINEAR
TOPOLOGY
6.RING/CIRCULA
R TOPOLOGY
16. 7.Mesh Topology :
Each node is connected to more than one node to
provide an alternate route.
Excellent for long distance networks .
Ideal for distributed networks.
Back up, re-routing, pass through capabilities.
8.Fully Connected Topology :
Link exists b/w each host.
17. 1.RJ 45(Registered Jack-45):
ï Used to connect computers on LANs, especially ethernets.
Many devices play important roles in the smooth functioning of networks.
Let us discuss themâŠ
2.Ethernet Card :
ï Contains connections for co-axial or twisted pair cables.
3.Hub :
ï Hardware device to connect several computers.
ï Contains multiple independent, but connected network modules.
ï Types : Active and Passive
ï Functioning :
âą Forwards data packets over one port from one workstation to all other ports.
âą All users in a hub or stack of hubs are in the same segment, sharing the hubâs
bandwidth and data-carrying capacity.
18. 4.Modem :
ï A computer peripheral that allows us to connect and communicate
with other computers over telephone lines.
ï Does modulation â changes digital data to analog data and
demodulation â analog to digital data.
ï Types- internal and external
ï Working of a modem (Explained through diagram)
DTE
TXD
RXD
RTS
CTS
CD
DTR
DSR
1
3
4
6
2
5
7
DCE
Telephone
lines
Handshaking
Signal
SIMILAR
DTE
DCE
Micro controlled MODEM MODEM
terminal 1.TXD: Transmit
2.RXD:Receive
3.RTS: Request to send
4.CTS: Clear to send
5.CD : Carrier detect
6.DTR: Data Terminal
ready
7.DSR: Data set ready
Data Communication
Equipment
Data Terminal
Equipment
19. 5.SWITCH :
ï Used to segment networks into different
sub-networks called SUBNETS/LAN SEGMENTS.
ï Prevents traffic overloading in a network.
ï Functioning :
To insulate transmission from other parts , the switch
establishes a temporary connection b/w the source
and destination.
Connection is terminated once the conversation is over.
20. 6.REPEATER :
ï Amplifies and restores signals for long distance transmission.
ï Types:
AMPLIFIER â Amplifies all incoming signals over network.
SIGNAL REPEATER - Collects and retransmits the inbound
packet as if it were starting from source station.
7.BRIDGE :
ï Establishes an intelligent connection b/w two local networks.
ï Improves performances on both sides of the bridge.
ï Checks the passage of a packet by examining its physical address.
21. 8.ROUTER :
ï Used to separate different segments in a network Better
performance and reliability.
ï Routers and bridges differ by protocols .
ï If destination is unknown, traffic is sent to another
destination-known router.
ï Functioning:
Routers make sure that packets travel in the most efficient
paths by using a network road map â ROUTING TABLE.
If a link b/w two routers fails, the sending router can
determine an alternate route.
22. 9.GATEWAY :
ï Device that connects dissimilar networks.
ï Expands functionality of routers by performing data translation
and protocol conversion.
ï It is a node on a network that serves as an entrance to another.
10. WiFi CARD :
ï Internal and external LAN adapter with a wireless radio and
antenna.
ï Benefit â Allows to set up workstation or home office without
considering the proximity or availability of hard line network access.
23. GENERAL NETWORK DESIGN PROCESS :
ï¶ 3 MAIN ELEMENTS :
Environment given â Location of hosts, servers, terminals, etc.
Performance constraints â Network reliability, traffic throughput,
host/client speeds.
Internetworking variables â Network topology, line capacities
and packet flow assignments.
MAIN GOAL MINIMISING COST WITHOUT COMPROMISING ON AVAILABILITY
REQUIREMENTS.
24. LAN HARDWARE
The following hardware technologies can be applied to LAN design :
ï± Using Repeaters :
Repeaters â basic unit to connect separate segments.
Basic rule â 5-4-3 rule.
ï± Using Bridges :
Bridges â Operate in the data link layer of the OSI model.
Bridges implement Spanning-Tree Protocol to build loop
free topology.
25. ï± Using Hubs :
Hubs can be used when more than two computers
need to be networked.
ï± Using Switches :
Switch â Gives each LAN segment a dedicated
bandwidth.
ï± Using Routers :
Routers filter network traffic based on an IP address.
26. For a small LAN
âą Clients computers with NICs
âą Hub
âą Cabling
âą Networking OS
âą Server
For connecting offices &
departments
âą Clients computers with NICs
âą Hubs
âą Cabling
âą Switch
âą Networking OS
âą Servers
âą Router for shared Internet
access(opt.)
For connecting dispersed
office sites
âą Clients computers with NICs
âą Hubs
âą Cabling
âą Switches
âą Routers at each location for
WAN connections.
âą Access server for dialup access
âą WAN service (ISDN/leased line,
etc.)
NETWORK COMPONENT CHECKLISTS FOR DIFFERENT TYPES OF
NETWORKS
27. Twisted Pair Coaxial Fibre Optics
No high speed data
transmission
Short range transmission
Television signal
distribution
Long distance
telephone transmission
Short distance
computer links
Greater data capacity
Lower attenuation
Secure transmission
DIFFERENT TYPES OF GUIDED MEDIA WHEN TO USE WHICH ???...
28. Radio Wave Microwave Satellite
DIFFERENT TYPES OF UNGUIDED MEDIA WHEN TO USE WHICH ???...
Long distances
Signals need to
penetrate walls/buildings
Omni-directional
transmission
Long distance
telephone service
Minimize expenditure
Straight line
transmission
Transmission over very
large area
Long distance television
distribution
29. PROTOCOL â Rules that are applicable for a
network.
ï¶ Usually, multiple protocols will be in use
simultaneously.
ï¶ Most protocols support multi-tasking.
ï¶ One operation may involve several protocols.
SOME BASIC PROTOCOLS
Let us look at some most common protocolsâŠ
30. 1.HTTP(Hypertext Transfer Protocol) :
It is a set of rules for transferring hypertext on WWW.
HTTP is a generic protocol used for communication between
user agents and gateways to Internet Protocols.
The HTTP consist of two items: The set of requests from
browsers to servers and The set of responses going back to the
other way.
2.FTP(File Transfer Protocol) :
It is a standard for the exchange of files across internet.
It is a potent and popular way to share information over the
internet.
FTP works as a client/ server process.
31. 3.TCP/IP(Transmission Control Protocol/Internet Protocol) :
Layered set of protocols
It is responsible for making sure that the commands get through
to the other end.
It keeps tracks of what it sent and retransmits anything that did
not get through.
4.SLIP/PPP(Serial Line IP/Point-to-Point Protocol) :
SLIP is used for delivering IP packets over dial up lines.
SLIP has been largely supplanted by PPP.
PPP is used for transmission of IP packets over serial lines.
PPP is a layered protocol and it supports both synchronized
and unsynchronized lines.
32. WIRELESS COMMUNICATION â Data communication without landlines.
MOBILE COMPUTING â Computing device is not only continuously connected to
base or central network.
WIRELESS/MOBILE COMPUTING
TECHNOLOGIES :
1.GSM(Global System for Mobile) :
Leading digital cellular system.
GSM introduced SIM cards to connect to specific
service providers.
Works by dividing a radio frequency into time slots.
A single frequency can support multiple and
simultaneous data channels.
33. 2.CDMA(Code-Division Multiple Access) :
Uses spread spectrum technique.
Data is sent in small pieces over a number of discrete
frequencies.
Signal is spread over by a unique spreading code.
3.WLL(Wireless in Local Loop) :
Connects subscribers to the PSTN(Public Switched
Telephone Network) using radio signals.
Do not suffer from weather damage.
Service features and quality can be provided.
Support high quality data transmission and signals.
4.GPRS(General Packet Radio Service) :
Radio transmission of data by small packets between
the mobile devices and the internet.
High speed â 56 k bits/second to 114 k bits/second.
34. 5.Generation Networks :
1G : First analog cellular system designed for voice calls.
Popular 1G networks - Nordic Mobile Telephone(NMT) , Advanced Mobile
Phone System (AMPS).
2G : First digital cellular system. Offers better sound quality and capacity
and services such as paging faxes and text messages.
Popular 2G networks â GSM, CDMAOne, D-AMPS.
3G : Newer cellular networks. It is a broadband , packet based
transmission and delivers a speed up to 2Mbps.
Popular 3G networks - UMTS FDD and TDD.
4G : Offers downlink rates , low latency and efficient spectrum use.
Convergence of wired and wireless network.
4G â MAGIC- Mobile Multimedia, Anywhere, Global Mobility Solutions
Over, Integrated Wireless and Customized Services.
35. 6.SMS(Short Message Service) :
Transmission of short text messages.
Message is received by SMSC(Short Message Service Centre).
SMSC sends a SMS request to HLR.
7.Chat :
Online textual talk.
Communication over the internet.
Enables participants to respond quickly.
Most common chat protocol - IRC
8.Video Conferencing :
Video phone conversation among multiple participants.
Communicate by simultaneous two way video and audio
transmission.
Most common video conferencing protocols â H.323 and SIP
36. 9.Voice over Internet Protocol :
Enables voice communication over the internet.
Voice is efficiently compressed into data packets and is transmitted over
the networks.
Data networks like LAN uses the Packet Switched Technology.
Common protocol for packet-witched networks - Internet Protocol(IP).
10.Connecting Wirelessly to Internet :
Wi-Fi
âą Connects to Internet without a direct line from PC
to ISP.
âą Need : i)A broadband Internet , ii) A wireless
router and iii)A PC with net card/external wireless
adapter.
âą Range : 30 â 100 m
WiMax
âą Can provide wireless broadband access.
âą Need : WiMax Base Station
âą Range : 5 â 15 km
37. 1.WWW(World Wide Web) :
This is a set of protocols that allows us to access any document
on the net based on URLs.
One can set up a server and construct hypertext documents with
links on them.
Graphic-intensive nature makes internet more popular and easily
reachable.
Attributes :
ï§ User friendly
ï§ Multimedia documents â Users can create, link or display web pages.
ï§ Hypertext and hyperlinks â By incorporating images, videos and audios, net
surfing seems easier.
ï§ Interactive
ï§ Frames â More than one independently controllable section.
38. 2.Telnet :
Character-based terminal window on another system.
Used by people who have logins on remote systems.
Widely used to connect to thousands of catalogs at libraries around
the world.
3.Web Browser and Web Server :
Web Browser â WWW client, navigates though WWW and displays
web pages.
Web Server â WWW server, responds to userâs requests.
4.Web Sites, Web Addresses and Web Pages :
Web Site â Location on a net server.
Web Address â Each web site has a unique URL.
Web Page â Documents residing on web sites.
39. 5. URL and Domain Names :
General structure of a URL: type://address/path
type : specifies the type of the server
address: address of the server
path : location of the file on the server
Domain Name â Character-based Internet address.
Example:
http://www.sports123.com/about/reachus
type address domain path
indicator
6.Web Hosting :
Means of hosting web-server application on a system through
which electronic content on the Internet is available to any web-
browser client.
Types:
âą Free â Hosting web pages for no cost.
âą Virtual/Shared â Fully independent to oneâs own web audience.
âą Dedicated â A company rents entire web server from a hosting one.
âą Co-location â Only physical needs managed by host.
40. 7.Web 2.0 : - Added features and apps.
Revolutionized info-sharing, user-oriented design,
interoperability on Internet
Interactive platform â blogs, forums, social sites, etc.
8.HTML(Hypertext Markup Language) :
Used to design the layout of a document and specify
hyperlinks.
Provides layout commands â TAGS â Lets the user control
the presentation of information on a web page.
9.XML(eXtensible Markup Language) :
For documents containing structured information.
Provides facility to define tags and the structural
relationships b/w them.
Semantics of an XML document â Defined by applications
or by stylesheets.
41. 10.DHTML(Dynamic HTML) :
Refers to Web content that changes each time it is viewed.
Same URL can result in a different page depending on the
following parameters :
Geographic location of the reader
Time of day
Previous pages viewed by the reader
Profile of the reader
11.Web Scripting :
Process of creating and embedding scripts in a web page.
Scripts are purposely written list of commands that are
embedded in a web page.
Two types of scripts :
Client-Side Scripts â Supports interaction within a webpage.
Server-Side Scripts â Supports execution at the server end.
42. Problems under Network Security:
Physical Security Holes â Hackers guess the password and
gain access to the network systems.
Software Security Holes â âPrivilegedâ software are
compromised into doing undesired things.
Inconsistent Usage Holes â Assembling a combination of
hardware and software.
Protection Methods :
Authorization : Confirms the service requestors credentials.
Performs by asking the user legal login ID.
Authentication/password protection : Ensures that each entity
involved in using a web service. It accepts the credentials from the
entity.
Encrypted Smart Cards: It is a hand held smart card that can
generate a token that a system can recognize.
Biometric System: Most secure level of authorization.
Involves finger prints.
43. Firewall : A system designed to prevent unauthorized
access to or from a private network. Implemented in both
hardware and software.
Types of Firewall Techniques:
ï Packet Filter.
ï Application Gateway.
ï Proxy Sever.
ï Circuit Level Gateway.
Cookies :
Messages given to a web browser by server.
Identify users and prepare customized web pages.
Do not act maliciously on systems.
They are just text files and can be deleted.
Cookies have 6 Parameters â Name , Value, Expiration, Date,
Path of the cookie is valid, Domain of the cookie, Need for a secure
connection.
44. Cyber Crime :
It is defined as unlawful act where in the computer is either a
tool or a target or both.
Classification Of Cyber Crimes:
ï Tampering With Computer Source Documents
ï Hacking
ï Publishing of Information, which is obscene in electronic form
ï Child Pornography
ï Accessing Protected System
ï Breach of Confidentiality and Privacy.
Intellectual Property :
ï Product of the intellect that has commercial value, including
copyrighted property.
ï Encourages fair-trading Socio-economic development
45. COMPUTER VIRUS â Malicious program that requires a host and is
designed to make a system sick.
3 types of viruses :
ï§ File infectors â attach themselves to a program file.
ï§ Boot sector viruses â install themselves on the beginning tracks
of a hard drive.
ï§ Macro viruses â infect data files.
Spread :
ï§ Move by attaching themselves to files/boot records.
ï§ Found in various downloads and e-mails.
46. Damages :
ï§ Can destroy FAT and lead to corruption of an entire file system.
ï§ Can create bad sectors on the disk Parts of programs and files
destroyed.
ï§ Can decrease space on hard disks by duplicating files.
ï§ Can cause a loss of integrity by altering data in files.
ï§ Can cause the system to hang.
Trojan Horses :
ï§ Code hidden in a program that looks safe to run but has
hidden side effects.
Worms :
ï§ A program designed to replicate Eats disk space.
ï§ Self-contained, no host.
ï§ Activated by creating process. Network worm can spread
across communication links.
47. Spam :
ï§ Refers to electronic junk mail or junk newsgroup postings.
ï§ Ways to avoid spam :
Create a filter that seperates the mails you suspect as spam.
Register with true personal information to sign up for accounts on the
internet.
Virus Prevention :
Never use a âforeignâ disk or CD without virus-scan.
Always scan downloaded files.
Never boot your PC from a floppy unless you ensure it is virus free.
ïŒ Use licensed software.
ïŒ Password protect your PC.
ïŒ Install and use antivirus software.
ïŒ Make regular backups.
48. We discussedâŠ
The need for networking.
Evolution of Networking â ARPANET NSFnet Internet Interspace
Switching Techniques â Circuit, Packet and Message
Some data communication terminologies
Transmission Media â Guided and Unguided
Types of Networks â LAN, MAN, WAN, and PAN
Various Network Topologies
Major Network Devices
LAN Design â LAN hardware, Checklists for network components, Proper usage of
transmission media
Communication Protocols
Wireless/Mobile Computing â Different technologies
Internetworking Terms and Concepts
Network Security Concepts â Problems, Solutions, Cyber Crime, Intellectual Property
Viruses â Types, Prevention