SlideShare uma empresa Scribd logo
1 de 95
Communication and Network
Concepts
CHAPTER 14
WHAT’S A NETWORK?WHAT’S A NETWORK?
Tanebaum [1] defines a network as ‘an
interconnected collection of autonomous computers’.
AUTONOMOUS: Central to this definition is that
all computers are autonomous i.e. no computer
on a network can start, stop or control another.
INTERCONNECTED : Two or more computers
are interconnected if they can exchange
information.
NEED FOR NETWORKINGNEED FOR NETWORKING
Resource Sharing: The aim is to make all resource
available to anyone or everyone connected.
Reliability: The idea is –if one crashes other can
carry on.e.g. if one file is deleted from a system it’s
safely stored on an another on the network.
Cost Factor: PCs’ve better performance ratio than
micro computers. So better to have 1 pc/user with
data stored on 1 shared file server machine.
Communication Medium: the changes at one end
can suddenly be sent to the other & vice-versa. It
brings faster and better co-operation.
APPLICATION OF NETWORKSAPPLICATION OF NETWORKS
1.PERIPHERALS 2.INFORMATION
3.SHARING PROCESSING
EVOLUTION OF NETWORKINGEVOLUTION OF NETWORKING
networking started way back in 1969 and has
evolved since .
The important stages are listed below:-
1.ARPANET
2.THE INTERNET
3.THE INTERSPACE
ARPANETARPANET
Advanced Research Projects Agency NETwork.
Way back in 1969 it began sponsored by US Dept. of
defense with the goal of linking computers at
universities and US defense. Soon the systems
began exchanging data & info.
It had handful of components but expanded a lot.
Another event was creation of another highly (better
than ARPANET)capable network by National science
Foundation namely-Nsfnet.
But nsfnet allowed didn’t allow any private business
so private companies built their own networks later
joined with arpanet & nsfnet to form internet.
THE INTERNETTHE INTERNET
The internet is a worlwide network of computer
networks.
It’s a super network. The common use is that
users can communicate with any other user on a
different network.
To accomplish these exchanges certain rules
(called protocols) must be followed. The internet
uses a set of protocols called as TCP/IP
(transmission control protocol/internet protocol) .
HOW DOES INTERNET WORKHOW DOES INTERNET WORK
All the computers are not directly connected to
internet. Rather they connect to a small network
which connect to the internet BACKBONE through
GATEWAYS.
Gateway:-Device connecting dissimilar networks.
Backbone:-Central interconnecting structures in
which other networks are plugged. (imagine the
trunk of any tree from which branches emerge
or a human backbone).
FUNCTIONINGFUNCTIONING
At the source computer, the message/file is
divided into very small parts called packets.
Packet has a serial number.
All packets are sent to the destination computer.
The destination computer receives these
packets (not surely serially). If a packet is
garbled or lost,it is demanded again.
The message is arranged serially to get back the
message/file.
INTERNET FUNCTIONINGINTERNET FUNCTIONING
The reason that internet works at all is that every
linked computer uses the same set of rules for
communication. DON,T YOU KNOW THAT A
SET OF RULES IS CALLED PROTOCOL.
TCP/IP is responsible for division and
reassembling of packets.
Ip is responsible for guiding the packets to the
proper destination.
The future of the internet is interspace.
THE INTERSPACETHE INTERSPACE
Interspace is a client/server software program
that allows multiple users to communicate online
with real-time audio, video and text-chat in a
dynamic 3D environments.
As the internet is a protocol eenvironment for
interconnectinf=g networks to transmit data
similarly interspace is an application envirom-
nment for interconnecting spaces to manipulate
information.
SWITCHING TECHNIQUESSWITCHING TECHNIQUES
switching techniques are used to transmit data
across networks.
There are various techniques :-
Ways to send a message across a network
CIRCUIT SWITCHINGCIRCUIT SWITCHING
The complete physical connection is established
before any data can be exchanged.
Since circuits are switched it gets it’s name.
Telephone is a good example of this technique.
Earlier switching was done manually. There was
an operator who would reside in switching office
and plug a jumper connecting input & output
sockets. Now switching is done automatically.
PACKET SWITCHINGPACKET SWITCHING
The method is same as message switching.
The difference lies in the way of storing and
transmitting data.
Block size of data has an upper limit (that
requires transfer of chunks of data under the
limit called as packets).
The storage is in the main memory instead of on
the hard disk.
MESSAGE SWITCHINGMESSAGE SWITCHING
No physical copper path is established in advance
between the sender and the receiver as in circuit
switching.
Instead, the sent data is first stored in the first
switching office and then forwarded later, one hop at
a time.
Each block is received entirely, inspected for errors,
and then retransmitted. This procedure continues
until message reaches its destination. Owing to its
working principle, it is also known as store and
forward.
DATA COMMUNICATIONDATA COMMUNICATION
TERMINOLIGIESTERMINOLIGIES
TERMSTERMS
Data channel : a medium used to carry information or
data from one point to another.
Baud : unit of measurement for the inforamtion
carryingh capacity of a communication channel. (syn:
bps-bits per second)
Other units are : Bps, kbps, Kbps, mbps (in capitals b
means byte and otherwise bit)
Bandwidth : technically, it is the difference between
the highest & the lowest frequencies of a
transmission channel or the width of allocated band
of frequencies to a channel.
People generally use it to mean the amount of
information/data travelling through a single channel at
a time. High bandwidth channels are called
broadband and low bandwidth channels narrowband
channels.
MOREMORE
In digital systems it is expressed in terms of bps
like if a modem works @ 57,600 bps and
another @28,800 bps ,then the first modem has
twice as bandwidth as the second one.
In analog systems it’s expressed in terms of the
highest & the lowest signal component.
Frequency is measured in terms of
cycles/second i.e. hertz. 1 kHZ = thousand
cycles/second, 1mHZ=103
1 gHZ =103
mHZ 1 tHZ
= 103
gHZ.
Data transfer rates: amount of data transferred
by a communication channel per second or a
computing or storage device.
Measured in bps, Bps, or baud.
TRANSMISSION MEDIATRANSMISSION MEDIA
TRANSMISSION MEDIATRANSMISSION MEDIA
Transmission media or communication
channels of network is nothing but the
cable/media which provides the link.
There are numerous media which can be
divided into :-
1. Guided media (includes
wires/cables)
2. Unguided media (includes any form
of wave media)
TWISTED PAIR CABLETWISTED PAIR CABLE
It is the most common form of wiring in data
communication applications.
General Form : two identical wires wrapped
together in a double helix.
The bleeding of a signal from one wire to
another and which can corrupt signal and
cause network errors. This form of signal
interference is called crosstalk. To reduce
crosstalk wires are twisted in pair in
twisted pair cables.
PROS-N-CONSPROS-N-CONS
Advantages: simple, flexible physically,
easy to install and maintain, easily
connected, very inexpensive.
Disadvantages: incapable in long range
transmission without repeaters due to high
attenuation (reduction, decrease), low
bandwidth, supports merely data rates of
1Mbps &10 Mbps (with conditioning).
TYPESTYPES
Types of twisted pair cable:
Unshielded twisted pair: UTP cabling is
used for variety of electronic
communications. Available in 5 categories
Type description
CAT1VGcommunication only; no data
transmission
CAT2DGT up to 4Mbps
CAT3DGT up to 10 Mbps
CAT4DGT up to 16MbpsThe UTP
cables can have maximum segment length
of 100 meters.
CAT5DGT up to 1000Mbps
SHIELDED TWISTED PAIRSHIELDED TWISTED PAIR
SHIELDED TWISTED PAIR(STP):
THIS TYPE OF CABLE COMES WITH
SHIELDIING OF THE INDIVIDUAL PAIRS OF
WIRES, WHICH FURTHER PROTECTS IT
FROM EXTERNAL INTERFERRENCE. ONLY
ADVANTAHGE OVER THE UTP IS GREATER
PROTECTION FROM CROSSTALK &
INTERFERRENCE. HOWEVER, IT’S HEAVIER
& COSTLIER & REQUIRES PROPER
GROUNDING AT BOTH ENDS. THE MAX
SEGMENT LENGTH IS SAME AS UTP.
COAXIAL CABLECOAXIAL CABLE
It consists of a solid wire core surrounded by one or more foil or wire
shields, each separated by some kind of plastic insulator. The inner core
carries the signal, and the shield provides the ground, has high electrical
properties & is suitable for high speed communication used for TV signals.
Its data transmission characteristics are considerably higher & so it’s used
as the basis for a shared cable network, with part of the bandwidth being
used for data traffic.
Advantages: greater speed, can be used as a basis for a shared cable
network.
Can be used for broadband transmission.
Bandwidth up to 400 MBPS.
Disadvantages: expensive, not compatible with twisted pair cables
Types of coaxial cables:
Thicknet: This is thicker than thinnet. Its segments can be up to 500 meters.
Thinnet: this form of coaxial cable is thinner and it can have max. length of
185 meters.
OPTICAL FIBREOPTICAL FIBRE
Advantages: immune to electrical & magnetic
interference.
Highly suitable for harsh industrial environment.
Secure transmission & high transmission
capacity.
Can be Used for broadband transmission.
Disadvantage: inst6allation problem. Are fragile
& may need special care to provide the
robustness required for office environment.
Connecting two fibers together or a light source
Types of Fiber Optic Cables
Fiber Optic cables can be either
• Single Node that supports segment length of
upto 2 Kms and bandwidth of upto 100 Mbps
• Multinode with segment length of upto
100Kms and bandwidth of 2Gbps.
COMPARISONCOMPARISON
Type Type Sub
type
Maximu
m
Segment
Length
Bandwidth
Supported
Installation Cost Interference
Twisted Pair
Cable
UTP
STP
100 Mtrs
100 Mtrs
200 Mbps
500 Mbps
Easy
Moderate
Cheapest
Moderate
High
Moderate
Coaxial Cable Thinnet
Thicknet
185 Mtrs
500 Mtrs
10 Mbps
10 Mbps
Easy
Hard
Cheap
Moderate
Moderate
Low
Fiber Optic
Cable
Multinode
Singlenode
2 Kms
100 Kms
100 Mbps
2 Gbps
Very
Hard
Expensive None
None
Micro WaveMicro Wave
Micro wave signals are used to transmit a data
without cables. The microwave signals are
similar to radio and television signals and are
used for long distance communications.
It consist of,
1. Transmitter
2. Receiver
3. Atmosphere
Advantages of Microwave
i) It is cheaper than digging trenches for laying
cables and maintaining repeaters and
cables. If cables get broken by variety of
causes.
ii) It offers from land acquisition
<HTML><HTML>
HYPER TEXT MARKUP LANGUAGE
HTML: WHAT IT IS?
 Document-layout & hyperlink-specification language i.e., a
language used to design the layout of a document & specify the
hyperlinks.
 Html tells the browser how to display the contents of a hypertext
document i.e., a document including text, images & other
supported media. It also tells how to make the page interactive
by using special hyperlinks.
HTML: WHAT IT IS NOT?
 First of all it is not a programming language but just a descriptive
language.
 It’s neither a word processing tool nor a desktop publishing
solution. It’s just a page-layout & hyperlink specification-
language.
XMLXML
extensible Markup Language.
XML is a markup language for documents containing
structured information.
Structured information contains both content ( words,
images etc.) & indication of what role does that content
play content in a footer is different from that of header or
content in a caption is different from a title).
∞ (HTML==XML) ??
NO. In HTML tags and semantics meaning/role of tags) is
fixed unlike in XML.
XML permits to define tags and structural relationships
between them. Since there’s no predefined tag set there
can’t be any pre-established semantics. All the semantics
of an XML is either defined by the applications that
process them or by the used stylesheets.
DHTMLDHTML
Dynamic HTML refers to web content that changes
each time it is viewed. e.g. same page could result
in a different page depending upon :
Geographic location of the reader
Time of day
Previous pages viewed by the reader
Profile of the reader
DHTML refers to new HTML extensions that
will enable a web page to react to user input
without sending requests to the web server.
It can be thought of as “animated HTML”.
Ex:- a piece of text can change from one
color to another upon clicking or after some
time.
MODEMMODEM
A modem is a computer peripheral that allows you to
connect & communicate with other computers via
telephone lines.
MODULATORDEMODULATOR: modulation is the
process of sending data on a wave (i.e. to convert digital
signal into analog signal) & demodulation is reverse of
modulation (i.e. to convert analog signals into digital
signal).
These inter-conversion allows two computers to “speak”.
These come in 2 varieties:-
1. Internal modems (fixed within computer)
2. External modems connected externally as a peripheral)
MODEM@WORKMODEM@WORK
Modem converts digital signals to A/F (audio
frequency) tones the telephones line can carry &
can also do the reverse.
INSERT A DIAGRAM
Power turned on DTE & DCE run self check
ETHERNET CARDETHERNET CARD
In order to connect to the network each
computer must have a special network card,
called Ethernet Card.
It contains 48 bits unique address, called MAC
address.
Now a days it comes preinstalled in computers.
It is used in star & bus topology. It transfer data
@10 &100 mbps.
HUBHUB
A common connection point for devices on a
network.
Hubs are active (electrically amplifies the signal)
& passive (just lets the signal pass through).
Hub usually can support 8,12, or 24 RJ-45 ports.
These are often used a star or star-wired ring
topology network topology that connects network
devices in a complete circle).
Specialized software is required for port
management.
HUB@WORKHUB@WORK
Hubs forward the received packet from one port
to all other ports.
All users connected to a hub is in the same
segment, sharing the hub’s bandwidth. When
packets containing data reaches to all it is their
job to accept if needed or to just discard.
SWITCHSWITCH
A network device that filters and forwards
packets between LAN segments.
LANs that are segmented through switches are
known are called switched LANs. In the case of
ethernets they are known as switched ethernets.
SWITCH@WORKSWITCH@WORK
To insulate the transmission from the other
ports, the switch establishes a temporary
connection between the source and the
destination, and then terminates the connection
once the conversation is done.
Think of telephone conversation for a good
analogy.
REPEATERREPEATER
A network device to amplify & restore signals for
long range transmission .
It works on physical layer of OSI reference
model.
Used in long range transmission.
Repeaters are of two kinds :-
1. amplifier it amplifies all signals and noises as well)
2. Signal repeater it collects and re-transmits the
packet as if received from source)
BRIDGEBRIDGE
A BRIDGE is a network device that establishes an
intelligent connection between two local networks
with the same standard but with different types of
topologies.
Bridges know computers on both the sides, so they
only allow needed messages to go to the other side.
This improves performance on both sides.
As a packet arrives at the bridge, the bridge
examines the physical destination address of the
packet. Then it decides whether or not to let it pass.
It works on data link layer of OSI reference model.
ROUTERROUTER
It works on network layer of OSI reference model.
A router is a network device that is used to separate
different segments in a network to improve
performance and reliability. A router works like a
bridge but can handle different protocols. Ex:- it can
link ethernet to a mainframe.
It uses logical addresses unlike bridges which uses
physical address.
If the destination is unknown to a router it sends the
traffic to another router which knows the address.
ROUTER@WORKROUTER@WORK
Router uses a more complete packet address to
determine which router or workstation should
receive the packet next.
Routers can help ensure the most efficient path
to destination based on a network road map
called routing table.
In case a link between two routers fails the
sending router can determine an alternate route
to keep the traffic moving.
GATEWAYGATEWAY
A gateway is a network device that connects two dissimilar
networks. It establishes an intelligent connection between a
local network and external networks with completely
different structures.
It works on application layer of OSI reference model.
A gateway is actually a node on a network that serves as an
entrance to another network. In enterprises a computer acts
as a gateway & in homes it is the ISP which acts as a
gateway.
The gateway nodes often act as a proxy server (not actually
a server but appearing so) & a firewall a system designed
to prevent unauthorized access to or from a private
network).
The gateway is associated to both a router determines
where a packet is sent) and a switch(provides actual path).
RJ-45RJ-45
Registered Jack-45. it is an eight-wire connector,
which is commonly used to connect computers
on LAN specially Ethernets.(ethernet is a lan
architecture developed by xerox corp along with
dec and intel. It uses bus or star tropology and
supports data transfer rates of upto 10 mbps).
NETWORK DEVICESNETWORK DEVICES
NETWORK TOPOLOGIES ANDNETWORK TOPOLOGIES AND
TYPESTYPES
NETWORK PROTOCOLSNETWORK PROTOCOLS
TCP/IP FTPTCP/IP FTP
Transmission control protocol/internet protocol is a layered set
of protocols.
Tcp is responsible for making sure that the commands get
through to the other end. It keeps track of all that is sent and
sends again something if it didn’t get through.
You can think of tcp as library of routines which applications
can use when they feel the need of reliable communication
with another system. Similarly tcp calls on the services of ip.
Ip ,again, can be considered as a library of certain routines
called by tcp or by any other application that may not be using
tcp.
Layering is this strategy of building several layers of protocols.
E-mail, tcp, ip can be thought of as separate layers each
calling on the services of one below.
NETWORK SECURITY CONCEPTSNETWORK SECURITY CONCEPTS
VIRUSESVIRUSES
Computer Virus is a malicious program that requires a
host & is designed to make a system sick, just like a real
virus.
Three basic types:-
1. File infectors (attach themselves to a program file)
2. Boot sector viruses (installs themselves on)
3. Macro viruses (infect data files)
Characteristics of a virus are replicatibility, requirement of
host, external activation, replication ability is limited to
(virtual)system.
DAMAGES:-
1. Can destroy FAT
2. Can create bad sectors on disk or duplicate itself
3. Can format entire disk or a specific tracks
4. Can destroy specific executable files and alter data files,
causing loss of integrity
5. Can hang the system
TROJAN HORSESTROJAN HORSES
A trojan horse is a code hidden in a program
such as a game or a spreadsheet that looks safe
to run but has hidden side effects.
Trojan horses spread through e-mail, exchange
of disks & information exchange. Worms also
spread trojans.
It causes damages what a virus can but only
difference is its masking effect which hides its
operation.
WORMSWORMS
A worm is a program designed to replicate.
Characteristics of a worm:
 Can replicate
 No host or is self contained
 Activated by creating a process (need for a multi-tasking system)
 If a network worm, will replicate across communication links
How they Spread?
Worms are generally found in multitasking & network systems.
Worms, they spread autonomously, without needing any other
program, user’s action or intervention etc.
Damage ?
Disrupt or create system management problems.
Some scan for passwords and other loopholes then send it to
the attacker.
Some times they install trojans or viruses that damage our
system.
SPAMSPAM
Spam refers to electronic junk mail or junk
newsgroup postings. Some people define spam more
generally as any unsolicited e-mail.
Merriam-webster dictionary defines spam as unsolicited
usually commercial e-mail sent to a large number of
addresses.
AVOIDING SPAM
Creating a filter that finds and does something to e-mail
that you suspect is spam.
Another escape is not to register yourself with a true id to
sign up for things on the net. These places often share
that e-mail id with other companies that fills you with
spam in exchange of benefits.
VIRUS PREVENTIONVIRUS PREVENTION
It is not an easy task. Needs extra carefulness & adherence to
these guidelines:-
Never use a foreign disk without scanning for viruses.
Scan files downloaded from internet. Always.
Never boot computer from a floppy which may contain virus.
Write protect your disks.
Use licensed software.
Password protect your pc to prevent unattended
modifications.
Make regular backups.
Install & use antivirus software.
Keep antivirus software up to date.
WEB SERVERSWEB SERVERS
HTTPHTTP
Hyper Text Transfer Protocol is an application-level but light & fast
protocol.
It’s a generic, stateless, object oriented protocol.
Another feature is typing of data representation, allowing systems to be built
independently of the data being transferred. It has been in use by WWW
since 1990.
HTTP allows an open-ended set of methods to be used to indicate
the purpose of a request.
It builds on the discipline of URI (Uniform Resource Identifier), as a location
or name, for locating resource on which method is to be applied.
Messages are passed to the HTTP in a format same as internet email or
MIME (multipurpose internet mail extensions). HTTP is also used as a
generic protocol for communication between gateways/proxies etc. to other
protocols.
It consists of two fairly distinct items: 1. set of requests from browsers to
servers 2. set of responses going the other way.
Though HTTP was designed to work with web but it’s been made more
general to accommodate future possibilities of OO applications.
HTTP has different built-in methods to allow users to open a web page, to
disconnect an existing connection, to read the header of a webpage, to
append to an existing resource or to store a webpage etc.
URL & DOMAIN NAMESURL & DOMAIN NAMES
HTTP uses internet address in a special format called a Uniform
Resource Locator or URL.
Typically URLs look like this:
type://address/path
Type:- type of server address (also the protocol they use):- address
of the server path:- location of file on the server.
In the address last group of characters (.com, .gov etc.) is domain
indicator.
The naming scheme by which servers are identified is known as
domain name system.
Another method of addressing (identifying server) is by assigning
distinct numbers known as IP addressing method. Such addresses
are called as IP addresses.
Lastly, a url specifies a distinct address for each resource on the
net. A character based internet address is a domain name.
PROTOCOL ADDRESSESPROTOCOL ADDRESSES
WEBSITEWEBSITE
WEB-BROWSERS & SERVERSWEB-BROWSERS & SERVERS
A web browser is a WWW client that navigates
through the World Wide Web and displays web-
pages.
A web server is a WWW server that responds to
the requests made by the web browsers.
WEB SITES,WEB SITES, ADDRESSESADDRESSES & PAGES& PAGES
A location on a net server is called web sites.
The unique address of each (URL) is called
address.
A web page is document or simply a page in a
web site.
WEB HOSTINGWEB HOSTING
Web hosting is a means of hosting web-server
application on a computer system through which
electronic content on the internet is readily available to
any web browser client.
Web Hosting Can Be Grouped Under:
1.free hosting:- site hosting for free. You too can put
up own websites for raw fun.
2. virtual or shared hosting : virtual hosting is where
one’s site is hosted on the web server of the hosting
company along with other web-sites giving 24-hour
access& can be updated through a password log-in.
 3.dedicated hosting: a dedicated server is rented
usually for big websites by companies. Dedicated for
large, high traffic, or for those with special needs e.g.
e-commerce, security.
WEB SCRIPTINGWEB SCRIPTING
A script is a list of commands embedded in a web-page.
Scripts are interpreted and executed by a certain program or
script-engine.
Most common scripting languages are VBScript, ASP(Active
Server Pages), JavaScript, PHP(Hypertext Preprocessor),
PERL, JSP etc.
Types of scripts:
 Client-side script : It enables interaction within the web-
page, is downloaded and executed by the browser (is
browser-dependent i.e. browser must be enabled to run
the script).Applications : To get data from user’s screen or
browser, online games, customized web-pages.
 Server-side script: It supports execution at server end.
Results are sent to the client, is browser independent of
browsers. APPLICATIONS : password protection, dynamic
addition of content to web-pages.
WEB SCRIPTING Contd…WEB SCRIPTING Contd…
4. co-location hosting: the company actually owns the
server & is responsible for all server administration
and the web hosting company provides physical
requirements of rack, high speed connection, a
regular power supply, and a limited amount of
technical support such as data back up or hardware
upgrades.
OPEN SOURCE TERMINOLOGIESOPEN SOURCE TERMINOLOGIES
OPEN SOURCE SOFTWAREOPEN SOURCE SOFTWARE
Open Source Software commonly means software whose licenses
do not impose much conditions. Users are free to use, modify &
distribute software hassle-free but not certainly free of charge.
It has been officially defined by the open source definition at
http://www.opensource.org/docs/definition_plain.html. It states that :-
Open source doesn’t just mean access to source code. The
distribution terms of open-source software must comply with the
following criteria :-
1. Free Redistribution
2. Source Code
3. Derived Works
4. Integrity of The Author’s Source Code
5. No Discrimination Against Persons Or Groups
6. No Discrimination Against Fields Of Endeavor
7. Distribution Of License
8. License Must Not Be Specific To A Product
9. The License Must Not Restrict Other Software
10.License Must Be Technology Neutral
FREEWAREFREEWARE
The term freeware has no clear definition, but
generally refers to free of cost & redistributable
software, but no modification & no source code.
It is distributed in binary form.
Freeware is often used in marketing situations in
order to sell products and gain market
advantages.
One example is Microsoft Internet Explorer.
SHAREWARESHAREWARE
Shareware is a software, which is made
available with the right to redistribute copies, but
it is stipulated that if one intends to use the
software, often after a certain period of time,
then a license fee must be paid.
Source code & modifiability absent.
The objective is to increase no. of prospective
users.
Generally a built-in timed mechanism limits the
functionality after a certain period of time.
PROPRIETARY SOFTWAREPROPRIETARY SOFTWARE
Neither open nor free, its use is regulated and
further distribution and modification is either
forbidden or requires special permission by the
supplier or vendor.
Normally the source code is not given to the
user.
FLOSSFLOSS
FLOSS refers to Free Livre And Open Source
Software or to Free Libre And Open Source
Software.
The term is used for software that is both free
software and open software.
Here the words libre(a Spanish word) or livre(a
Portuguese word) mean freedom.
GNUGNU
GNU is a recursive acronym for GNU’s NOT UNIX.
This project was initiated by richard m. stallman with
an objective to create a system compatible with UNIX
but not same as UNIX.
It has not only made an OS but the project has grown
since its inception and now it creates software of
almost all kinds.
The same person founded the Free Software
Foundation.
FSFFSF
FSF is Free Software Foundation. It is a non
profit organization created to support free
software movement in 1985 by Richard M
Stallman.
FSF has funded many software developers to
write free software.
Now a days, it also works on legal and structural
issues for the free software community.
OSIOSI
OSI is Open Source Initiative founded byBruce
perens & erics raymond (in feb 1998) .
Itr specififes the criteria for open source software
& properly defines terms and specifications for
open source software.
EVOLUTION OF NETWORKINGEVOLUTION OF NETWORKING
COAXIAL CABLECOAXIAL CABLE
Class12 communication concepts
Class12 communication concepts

Mais conteúdo relacionado

Mais procurados

Software Fault, Error, and Failure
Software Fault, Error, and FailureSoftware Fault, Error, and Failure
Software Fault, Error, and Failurenethisip13
 
Data Visualization1.pptx
Data Visualization1.pptxData Visualization1.pptx
Data Visualization1.pptxqwtadhsaber
 
K-means Clustering
K-means ClusteringK-means Clustering
K-means ClusteringAnna Fensel
 
Machine Learning - Ensemble Methods
Machine Learning - Ensemble MethodsMachine Learning - Ensemble Methods
Machine Learning - Ensemble MethodsAndrew Ferlitsch
 
2.3 bayesian classification
2.3 bayesian classification2.3 bayesian classification
2.3 bayesian classificationKrish_ver2
 
Stacking ensemble
Stacking ensembleStacking ensemble
Stacking ensemblekalung0313
 
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | EdurekaMachine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | EdurekaEdureka!
 
What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?Bernard Marr
 
Linear models for classification
Linear models for classificationLinear models for classification
Linear models for classificationSung Yub Kim
 
PCOS Detect using Machine Learning Algorithms
PCOS Detect using Machine Learning AlgorithmsPCOS Detect using Machine Learning Algorithms
PCOS Detect using Machine Learning AlgorithmsIRJET Journal
 
Python interview questions and answers
Python interview questions and answersPython interview questions and answers
Python interview questions and answersRojaPriya
 
BTech Pattern Recognition Notes
BTech Pattern Recognition NotesBTech Pattern Recognition Notes
BTech Pattern Recognition NotesAshutosh Agrahari
 
Address in the target code in Compiler Construction
Address in the target code in Compiler ConstructionAddress in the target code in Compiler Construction
Address in the target code in Compiler ConstructionMuhammad Haroon
 
Machine Learning : Latent variable models for discrete data (Topic model ...)
Machine Learning : Latent variable models for discrete data (Topic model ...)Machine Learning : Latent variable models for discrete data (Topic model ...)
Machine Learning : Latent variable models for discrete data (Topic model ...)Yukara Ikemiya
 

Mais procurados (20)

Applications of queue
Applications of queueApplications of queue
Applications of queue
 
Software Fault, Error, and Failure
Software Fault, Error, and FailureSoftware Fault, Error, and Failure
Software Fault, Error, and Failure
 
Stm unit1
Stm unit1Stm unit1
Stm unit1
 
Expert system
Expert systemExpert system
Expert system
 
DBMS Unit - 5 - Query processing and optimization
DBMS Unit - 5 - Query processing and optimizationDBMS Unit - 5 - Query processing and optimization
DBMS Unit - 5 - Query processing and optimization
 
Data Visualization1.pptx
Data Visualization1.pptxData Visualization1.pptx
Data Visualization1.pptx
 
Python basic syntax
Python basic syntaxPython basic syntax
Python basic syntax
 
K-means Clustering
K-means ClusteringK-means Clustering
K-means Clustering
 
Machine Learning - Ensemble Methods
Machine Learning - Ensemble MethodsMachine Learning - Ensemble Methods
Machine Learning - Ensemble Methods
 
2.3 bayesian classification
2.3 bayesian classification2.3 bayesian classification
2.3 bayesian classification
 
Stacking ensemble
Stacking ensembleStacking ensemble
Stacking ensemble
 
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | EdurekaMachine Learning in 10 Minutes | What is Machine Learning? | Edureka
Machine Learning in 10 Minutes | What is Machine Learning? | Edureka
 
What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?What Are The Latest Trends in Data Science?
What Are The Latest Trends in Data Science?
 
Linear models for classification
Linear models for classificationLinear models for classification
Linear models for classification
 
PCOS Detect using Machine Learning Algorithms
PCOS Detect using Machine Learning AlgorithmsPCOS Detect using Machine Learning Algorithms
PCOS Detect using Machine Learning Algorithms
 
Python interview questions and answers
Python interview questions and answersPython interview questions and answers
Python interview questions and answers
 
Lecture 01 Data Mining
Lecture 01 Data MiningLecture 01 Data Mining
Lecture 01 Data Mining
 
BTech Pattern Recognition Notes
BTech Pattern Recognition NotesBTech Pattern Recognition Notes
BTech Pattern Recognition Notes
 
Address in the target code in Compiler Construction
Address in the target code in Compiler ConstructionAddress in the target code in Compiler Construction
Address in the target code in Compiler Construction
 
Machine Learning : Latent variable models for discrete data (Topic model ...)
Machine Learning : Latent variable models for discrete data (Topic model ...)Machine Learning : Latent variable models for discrete data (Topic model ...)
Machine Learning : Latent variable models for discrete data (Topic model ...)
 

Destaque

Ob communication
Ob communicationOb communication
Ob communicationgomathi m
 
Student handbook xii
Student handbook xiiStudent handbook xii
Student handbook xiigeetu84
 
Leadership in communication ppt
Leadership in communication pptLeadership in communication ppt
Leadership in communication pptJyoti Bisht
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationGuru Ji
 

Destaque (6)

Ob communication
Ob communicationOb communication
Ob communication
 
Student handbook xii
Student handbook xiiStudent handbook xii
Student handbook xii
 
Chapter8 my sql revision tour
Chapter8 my sql revision tourChapter8 my sql revision tour
Chapter8 my sql revision tour
 
Effective Communication for Leaders
Effective Communication for LeadersEffective Communication for Leaders
Effective Communication for Leaders
 
Leadership in communication ppt
Leadership in communication pptLeadership in communication ppt
Leadership in communication ppt
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL Presentation
 

Semelhante a Class12 communication concepts

Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMprapti borthakur
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti dokePranoti Doke
 
Unit 3 cnd physical layer_switching_pranoti doke
Unit 3  cnd physical layer_switching_pranoti dokeUnit 3  cnd physical layer_switching_pranoti doke
Unit 3 cnd physical layer_switching_pranoti dokePranoti Doke
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptxKamran Waghani
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 

Semelhante a Class12 communication concepts (20)

14 Communication Concepts
14 Communication Concepts14 Communication Concepts
14 Communication Concepts
 
Network ppt
Network pptNetwork ppt
Network ppt
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti doke
 
Unit 3 cnd physical layer_switching_pranoti doke
Unit 3  cnd physical layer_switching_pranoti dokeUnit 3  cnd physical layer_switching_pranoti doke
Unit 3 cnd physical layer_switching_pranoti doke
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
Network Devices
Network DevicesNetwork Devices
Network Devices
 
6.Computer Networks (1).pptx
6.Computer Networks (1).pptx6.Computer Networks (1).pptx
6.Computer Networks (1).pptx
 
3.pptx
3.pptx3.pptx
3.pptx
 
Networking
NetworkingNetworking
Networking
 
Ppt college
Ppt collegePpt college
Ppt college
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
COMPUTER NETWORKS
COMPUTER NETWORKSCOMPUTER NETWORKS
COMPUTER NETWORKS
 
Networks
NetworksNetworks
Networks
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 

Último

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104misteraugie
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 

Último (20)

1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 

Class12 communication concepts

  • 2. WHAT’S A NETWORK?WHAT’S A NETWORK? Tanebaum [1] defines a network as ‘an interconnected collection of autonomous computers’. AUTONOMOUS: Central to this definition is that all computers are autonomous i.e. no computer on a network can start, stop or control another. INTERCONNECTED : Two or more computers are interconnected if they can exchange information.
  • 3. NEED FOR NETWORKINGNEED FOR NETWORKING Resource Sharing: The aim is to make all resource available to anyone or everyone connected. Reliability: The idea is –if one crashes other can carry on.e.g. if one file is deleted from a system it’s safely stored on an another on the network. Cost Factor: PCs’ve better performance ratio than micro computers. So better to have 1 pc/user with data stored on 1 shared file server machine. Communication Medium: the changes at one end can suddenly be sent to the other & vice-versa. It brings faster and better co-operation.
  • 4. APPLICATION OF NETWORKSAPPLICATION OF NETWORKS 1.PERIPHERALS 2.INFORMATION 3.SHARING PROCESSING
  • 5. EVOLUTION OF NETWORKINGEVOLUTION OF NETWORKING networking started way back in 1969 and has evolved since . The important stages are listed below:- 1.ARPANET 2.THE INTERNET 3.THE INTERSPACE
  • 6. ARPANETARPANET Advanced Research Projects Agency NETwork. Way back in 1969 it began sponsored by US Dept. of defense with the goal of linking computers at universities and US defense. Soon the systems began exchanging data & info. It had handful of components but expanded a lot. Another event was creation of another highly (better than ARPANET)capable network by National science Foundation namely-Nsfnet. But nsfnet allowed didn’t allow any private business so private companies built their own networks later joined with arpanet & nsfnet to form internet.
  • 7. THE INTERNETTHE INTERNET The internet is a worlwide network of computer networks. It’s a super network. The common use is that users can communicate with any other user on a different network. To accomplish these exchanges certain rules (called protocols) must be followed. The internet uses a set of protocols called as TCP/IP (transmission control protocol/internet protocol) .
  • 8. HOW DOES INTERNET WORKHOW DOES INTERNET WORK All the computers are not directly connected to internet. Rather they connect to a small network which connect to the internet BACKBONE through GATEWAYS. Gateway:-Device connecting dissimilar networks. Backbone:-Central interconnecting structures in which other networks are plugged. (imagine the trunk of any tree from which branches emerge or a human backbone).
  • 9. FUNCTIONINGFUNCTIONING At the source computer, the message/file is divided into very small parts called packets. Packet has a serial number. All packets are sent to the destination computer. The destination computer receives these packets (not surely serially). If a packet is garbled or lost,it is demanded again. The message is arranged serially to get back the message/file.
  • 10. INTERNET FUNCTIONINGINTERNET FUNCTIONING The reason that internet works at all is that every linked computer uses the same set of rules for communication. DON,T YOU KNOW THAT A SET OF RULES IS CALLED PROTOCOL. TCP/IP is responsible for division and reassembling of packets. Ip is responsible for guiding the packets to the proper destination. The future of the internet is interspace.
  • 11. THE INTERSPACETHE INTERSPACE Interspace is a client/server software program that allows multiple users to communicate online with real-time audio, video and text-chat in a dynamic 3D environments. As the internet is a protocol eenvironment for interconnectinf=g networks to transmit data similarly interspace is an application envirom- nment for interconnecting spaces to manipulate information.
  • 12. SWITCHING TECHNIQUESSWITCHING TECHNIQUES switching techniques are used to transmit data across networks. There are various techniques :- Ways to send a message across a network
  • 13. CIRCUIT SWITCHINGCIRCUIT SWITCHING The complete physical connection is established before any data can be exchanged. Since circuits are switched it gets it’s name. Telephone is a good example of this technique. Earlier switching was done manually. There was an operator who would reside in switching office and plug a jumper connecting input & output sockets. Now switching is done automatically.
  • 14. PACKET SWITCHINGPACKET SWITCHING The method is same as message switching. The difference lies in the way of storing and transmitting data. Block size of data has an upper limit (that requires transfer of chunks of data under the limit called as packets). The storage is in the main memory instead of on the hard disk.
  • 15. MESSAGE SWITCHINGMESSAGE SWITCHING No physical copper path is established in advance between the sender and the receiver as in circuit switching. Instead, the sent data is first stored in the first switching office and then forwarded later, one hop at a time. Each block is received entirely, inspected for errors, and then retransmitted. This procedure continues until message reaches its destination. Owing to its working principle, it is also known as store and forward.
  • 17. TERMSTERMS Data channel : a medium used to carry information or data from one point to another. Baud : unit of measurement for the inforamtion carryingh capacity of a communication channel. (syn: bps-bits per second) Other units are : Bps, kbps, Kbps, mbps (in capitals b means byte and otherwise bit) Bandwidth : technically, it is the difference between the highest & the lowest frequencies of a transmission channel or the width of allocated band of frequencies to a channel. People generally use it to mean the amount of information/data travelling through a single channel at a time. High bandwidth channels are called broadband and low bandwidth channels narrowband channels.
  • 18. MOREMORE In digital systems it is expressed in terms of bps like if a modem works @ 57,600 bps and another @28,800 bps ,then the first modem has twice as bandwidth as the second one. In analog systems it’s expressed in terms of the highest & the lowest signal component. Frequency is measured in terms of cycles/second i.e. hertz. 1 kHZ = thousand cycles/second, 1mHZ=103 1 gHZ =103 mHZ 1 tHZ = 103 gHZ. Data transfer rates: amount of data transferred by a communication channel per second or a computing or storage device. Measured in bps, Bps, or baud.
  • 20. TRANSMISSION MEDIATRANSMISSION MEDIA Transmission media or communication channels of network is nothing but the cable/media which provides the link. There are numerous media which can be divided into :- 1. Guided media (includes wires/cables) 2. Unguided media (includes any form of wave media)
  • 21. TWISTED PAIR CABLETWISTED PAIR CABLE It is the most common form of wiring in data communication applications. General Form : two identical wires wrapped together in a double helix. The bleeding of a signal from one wire to another and which can corrupt signal and cause network errors. This form of signal interference is called crosstalk. To reduce crosstalk wires are twisted in pair in twisted pair cables.
  • 22. PROS-N-CONSPROS-N-CONS Advantages: simple, flexible physically, easy to install and maintain, easily connected, very inexpensive. Disadvantages: incapable in long range transmission without repeaters due to high attenuation (reduction, decrease), low bandwidth, supports merely data rates of 1Mbps &10 Mbps (with conditioning).
  • 23. TYPESTYPES Types of twisted pair cable: Unshielded twisted pair: UTP cabling is used for variety of electronic communications. Available in 5 categories Type description CAT1VGcommunication only; no data transmission CAT2DGT up to 4Mbps CAT3DGT up to 10 Mbps CAT4DGT up to 16MbpsThe UTP cables can have maximum segment length of 100 meters. CAT5DGT up to 1000Mbps
  • 24. SHIELDED TWISTED PAIRSHIELDED TWISTED PAIR SHIELDED TWISTED PAIR(STP): THIS TYPE OF CABLE COMES WITH SHIELDIING OF THE INDIVIDUAL PAIRS OF WIRES, WHICH FURTHER PROTECTS IT FROM EXTERNAL INTERFERRENCE. ONLY ADVANTAHGE OVER THE UTP IS GREATER PROTECTION FROM CROSSTALK & INTERFERRENCE. HOWEVER, IT’S HEAVIER & COSTLIER & REQUIRES PROPER GROUNDING AT BOTH ENDS. THE MAX SEGMENT LENGTH IS SAME AS UTP.
  • 25. COAXIAL CABLECOAXIAL CABLE It consists of a solid wire core surrounded by one or more foil or wire shields, each separated by some kind of plastic insulator. The inner core carries the signal, and the shield provides the ground, has high electrical properties & is suitable for high speed communication used for TV signals. Its data transmission characteristics are considerably higher & so it’s used as the basis for a shared cable network, with part of the bandwidth being used for data traffic. Advantages: greater speed, can be used as a basis for a shared cable network. Can be used for broadband transmission. Bandwidth up to 400 MBPS. Disadvantages: expensive, not compatible with twisted pair cables Types of coaxial cables: Thicknet: This is thicker than thinnet. Its segments can be up to 500 meters. Thinnet: this form of coaxial cable is thinner and it can have max. length of 185 meters.
  • 26. OPTICAL FIBREOPTICAL FIBRE Advantages: immune to electrical & magnetic interference. Highly suitable for harsh industrial environment. Secure transmission & high transmission capacity. Can be Used for broadband transmission. Disadvantage: inst6allation problem. Are fragile & may need special care to provide the robustness required for office environment. Connecting two fibers together or a light source
  • 27. Types of Fiber Optic Cables Fiber Optic cables can be either • Single Node that supports segment length of upto 2 Kms and bandwidth of upto 100 Mbps • Multinode with segment length of upto 100Kms and bandwidth of 2Gbps.
  • 28. COMPARISONCOMPARISON Type Type Sub type Maximu m Segment Length Bandwidth Supported Installation Cost Interference Twisted Pair Cable UTP STP 100 Mtrs 100 Mtrs 200 Mbps 500 Mbps Easy Moderate Cheapest Moderate High Moderate Coaxial Cable Thinnet Thicknet 185 Mtrs 500 Mtrs 10 Mbps 10 Mbps Easy Hard Cheap Moderate Moderate Low Fiber Optic Cable Multinode Singlenode 2 Kms 100 Kms 100 Mbps 2 Gbps Very Hard Expensive None None
  • 29. Micro WaveMicro Wave Micro wave signals are used to transmit a data without cables. The microwave signals are similar to radio and television signals and are used for long distance communications. It consist of, 1. Transmitter 2. Receiver 3. Atmosphere
  • 30. Advantages of Microwave i) It is cheaper than digging trenches for laying cables and maintaining repeaters and cables. If cables get broken by variety of causes. ii) It offers from land acquisition
  • 31. <HTML><HTML> HYPER TEXT MARKUP LANGUAGE HTML: WHAT IT IS?  Document-layout & hyperlink-specification language i.e., a language used to design the layout of a document & specify the hyperlinks.  Html tells the browser how to display the contents of a hypertext document i.e., a document including text, images & other supported media. It also tells how to make the page interactive by using special hyperlinks. HTML: WHAT IT IS NOT?  First of all it is not a programming language but just a descriptive language.  It’s neither a word processing tool nor a desktop publishing solution. It’s just a page-layout & hyperlink specification- language.
  • 32. XMLXML extensible Markup Language. XML is a markup language for documents containing structured information. Structured information contains both content ( words, images etc.) & indication of what role does that content play content in a footer is different from that of header or content in a caption is different from a title). ∞ (HTML==XML) ?? NO. In HTML tags and semantics meaning/role of tags) is fixed unlike in XML. XML permits to define tags and structural relationships between them. Since there’s no predefined tag set there can’t be any pre-established semantics. All the semantics of an XML is either defined by the applications that process them or by the used stylesheets.
  • 33. DHTMLDHTML Dynamic HTML refers to web content that changes each time it is viewed. e.g. same page could result in a different page depending upon : Geographic location of the reader Time of day Previous pages viewed by the reader Profile of the reader DHTML refers to new HTML extensions that will enable a web page to react to user input without sending requests to the web server. It can be thought of as “animated HTML”. Ex:- a piece of text can change from one color to another upon clicking or after some time.
  • 34.
  • 35.
  • 36.
  • 37. MODEMMODEM A modem is a computer peripheral that allows you to connect & communicate with other computers via telephone lines. MODULATORDEMODULATOR: modulation is the process of sending data on a wave (i.e. to convert digital signal into analog signal) & demodulation is reverse of modulation (i.e. to convert analog signals into digital signal). These inter-conversion allows two computers to “speak”. These come in 2 varieties:- 1. Internal modems (fixed within computer) 2. External modems connected externally as a peripheral)
  • 38. MODEM@WORKMODEM@WORK Modem converts digital signals to A/F (audio frequency) tones the telephones line can carry & can also do the reverse. INSERT A DIAGRAM Power turned on DTE & DCE run self check
  • 39. ETHERNET CARDETHERNET CARD In order to connect to the network each computer must have a special network card, called Ethernet Card. It contains 48 bits unique address, called MAC address. Now a days it comes preinstalled in computers. It is used in star & bus topology. It transfer data @10 &100 mbps.
  • 40. HUBHUB A common connection point for devices on a network. Hubs are active (electrically amplifies the signal) & passive (just lets the signal pass through). Hub usually can support 8,12, or 24 RJ-45 ports. These are often used a star or star-wired ring topology network topology that connects network devices in a complete circle). Specialized software is required for port management.
  • 41. HUB@WORKHUB@WORK Hubs forward the received packet from one port to all other ports. All users connected to a hub is in the same segment, sharing the hub’s bandwidth. When packets containing data reaches to all it is their job to accept if needed or to just discard.
  • 42. SWITCHSWITCH A network device that filters and forwards packets between LAN segments. LANs that are segmented through switches are known are called switched LANs. In the case of ethernets they are known as switched ethernets.
  • 43. SWITCH@WORKSWITCH@WORK To insulate the transmission from the other ports, the switch establishes a temporary connection between the source and the destination, and then terminates the connection once the conversation is done. Think of telephone conversation for a good analogy.
  • 44. REPEATERREPEATER A network device to amplify & restore signals for long range transmission . It works on physical layer of OSI reference model. Used in long range transmission. Repeaters are of two kinds :- 1. amplifier it amplifies all signals and noises as well) 2. Signal repeater it collects and re-transmits the packet as if received from source)
  • 45. BRIDGEBRIDGE A BRIDGE is a network device that establishes an intelligent connection between two local networks with the same standard but with different types of topologies. Bridges know computers on both the sides, so they only allow needed messages to go to the other side. This improves performance on both sides. As a packet arrives at the bridge, the bridge examines the physical destination address of the packet. Then it decides whether or not to let it pass. It works on data link layer of OSI reference model.
  • 46. ROUTERROUTER It works on network layer of OSI reference model. A router is a network device that is used to separate different segments in a network to improve performance and reliability. A router works like a bridge but can handle different protocols. Ex:- it can link ethernet to a mainframe. It uses logical addresses unlike bridges which uses physical address. If the destination is unknown to a router it sends the traffic to another router which knows the address.
  • 47. ROUTER@WORKROUTER@WORK Router uses a more complete packet address to determine which router or workstation should receive the packet next. Routers can help ensure the most efficient path to destination based on a network road map called routing table. In case a link between two routers fails the sending router can determine an alternate route to keep the traffic moving.
  • 48. GATEWAYGATEWAY A gateway is a network device that connects two dissimilar networks. It establishes an intelligent connection between a local network and external networks with completely different structures. It works on application layer of OSI reference model. A gateway is actually a node on a network that serves as an entrance to another network. In enterprises a computer acts as a gateway & in homes it is the ISP which acts as a gateway. The gateway nodes often act as a proxy server (not actually a server but appearing so) & a firewall a system designed to prevent unauthorized access to or from a private network). The gateway is associated to both a router determines where a packet is sent) and a switch(provides actual path).
  • 49.
  • 50.
  • 51. RJ-45RJ-45 Registered Jack-45. it is an eight-wire connector, which is commonly used to connect computers on LAN specially Ethernets.(ethernet is a lan architecture developed by xerox corp along with dec and intel. It uses bus or star tropology and supports data transfer rates of upto 10 mbps).
  • 52.
  • 54. NETWORK TOPOLOGIES ANDNETWORK TOPOLOGIES AND TYPESTYPES
  • 56. TCP/IP FTPTCP/IP FTP Transmission control protocol/internet protocol is a layered set of protocols. Tcp is responsible for making sure that the commands get through to the other end. It keeps track of all that is sent and sends again something if it didn’t get through. You can think of tcp as library of routines which applications can use when they feel the need of reliable communication with another system. Similarly tcp calls on the services of ip. Ip ,again, can be considered as a library of certain routines called by tcp or by any other application that may not be using tcp. Layering is this strategy of building several layers of protocols. E-mail, tcp, ip can be thought of as separate layers each calling on the services of one below.
  • 57.
  • 58.
  • 59.
  • 60.
  • 61. NETWORK SECURITY CONCEPTSNETWORK SECURITY CONCEPTS
  • 62. VIRUSESVIRUSES Computer Virus is a malicious program that requires a host & is designed to make a system sick, just like a real virus. Three basic types:- 1. File infectors (attach themselves to a program file) 2. Boot sector viruses (installs themselves on) 3. Macro viruses (infect data files) Characteristics of a virus are replicatibility, requirement of host, external activation, replication ability is limited to (virtual)system. DAMAGES:- 1. Can destroy FAT 2. Can create bad sectors on disk or duplicate itself 3. Can format entire disk or a specific tracks 4. Can destroy specific executable files and alter data files, causing loss of integrity 5. Can hang the system
  • 63. TROJAN HORSESTROJAN HORSES A trojan horse is a code hidden in a program such as a game or a spreadsheet that looks safe to run but has hidden side effects. Trojan horses spread through e-mail, exchange of disks & information exchange. Worms also spread trojans. It causes damages what a virus can but only difference is its masking effect which hides its operation.
  • 64. WORMSWORMS A worm is a program designed to replicate. Characteristics of a worm:  Can replicate  No host or is self contained  Activated by creating a process (need for a multi-tasking system)  If a network worm, will replicate across communication links How they Spread? Worms are generally found in multitasking & network systems. Worms, they spread autonomously, without needing any other program, user’s action or intervention etc. Damage ? Disrupt or create system management problems. Some scan for passwords and other loopholes then send it to the attacker. Some times they install trojans or viruses that damage our system.
  • 65. SPAMSPAM Spam refers to electronic junk mail or junk newsgroup postings. Some people define spam more generally as any unsolicited e-mail. Merriam-webster dictionary defines spam as unsolicited usually commercial e-mail sent to a large number of addresses. AVOIDING SPAM Creating a filter that finds and does something to e-mail that you suspect is spam. Another escape is not to register yourself with a true id to sign up for things on the net. These places often share that e-mail id with other companies that fills you with spam in exchange of benefits.
  • 66. VIRUS PREVENTIONVIRUS PREVENTION It is not an easy task. Needs extra carefulness & adherence to these guidelines:- Never use a foreign disk without scanning for viruses. Scan files downloaded from internet. Always. Never boot computer from a floppy which may contain virus. Write protect your disks. Use licensed software. Password protect your pc to prevent unattended modifications. Make regular backups. Install & use antivirus software. Keep antivirus software up to date.
  • 67.
  • 69. HTTPHTTP Hyper Text Transfer Protocol is an application-level but light & fast protocol. It’s a generic, stateless, object oriented protocol. Another feature is typing of data representation, allowing systems to be built independently of the data being transferred. It has been in use by WWW since 1990. HTTP allows an open-ended set of methods to be used to indicate the purpose of a request. It builds on the discipline of URI (Uniform Resource Identifier), as a location or name, for locating resource on which method is to be applied. Messages are passed to the HTTP in a format same as internet email or MIME (multipurpose internet mail extensions). HTTP is also used as a generic protocol for communication between gateways/proxies etc. to other protocols. It consists of two fairly distinct items: 1. set of requests from browsers to servers 2. set of responses going the other way. Though HTTP was designed to work with web but it’s been made more general to accommodate future possibilities of OO applications. HTTP has different built-in methods to allow users to open a web page, to disconnect an existing connection, to read the header of a webpage, to append to an existing resource or to store a webpage etc.
  • 70. URL & DOMAIN NAMESURL & DOMAIN NAMES HTTP uses internet address in a special format called a Uniform Resource Locator or URL. Typically URLs look like this: type://address/path Type:- type of server address (also the protocol they use):- address of the server path:- location of file on the server. In the address last group of characters (.com, .gov etc.) is domain indicator. The naming scheme by which servers are identified is known as domain name system. Another method of addressing (identifying server) is by assigning distinct numbers known as IP addressing method. Such addresses are called as IP addresses. Lastly, a url specifies a distinct address for each resource on the net. A character based internet address is a domain name.
  • 73. WEB-BROWSERS & SERVERSWEB-BROWSERS & SERVERS A web browser is a WWW client that navigates through the World Wide Web and displays web- pages. A web server is a WWW server that responds to the requests made by the web browsers.
  • 74. WEB SITES,WEB SITES, ADDRESSESADDRESSES & PAGES& PAGES A location on a net server is called web sites. The unique address of each (URL) is called address. A web page is document or simply a page in a web site.
  • 75. WEB HOSTINGWEB HOSTING Web hosting is a means of hosting web-server application on a computer system through which electronic content on the internet is readily available to any web browser client. Web Hosting Can Be Grouped Under: 1.free hosting:- site hosting for free. You too can put up own websites for raw fun. 2. virtual or shared hosting : virtual hosting is where one’s site is hosted on the web server of the hosting company along with other web-sites giving 24-hour access& can be updated through a password log-in.  3.dedicated hosting: a dedicated server is rented usually for big websites by companies. Dedicated for large, high traffic, or for those with special needs e.g. e-commerce, security.
  • 76. WEB SCRIPTINGWEB SCRIPTING A script is a list of commands embedded in a web-page. Scripts are interpreted and executed by a certain program or script-engine. Most common scripting languages are VBScript, ASP(Active Server Pages), JavaScript, PHP(Hypertext Preprocessor), PERL, JSP etc. Types of scripts:  Client-side script : It enables interaction within the web- page, is downloaded and executed by the browser (is browser-dependent i.e. browser must be enabled to run the script).Applications : To get data from user’s screen or browser, online games, customized web-pages.  Server-side script: It supports execution at server end. Results are sent to the client, is browser independent of browsers. APPLICATIONS : password protection, dynamic addition of content to web-pages.
  • 77. WEB SCRIPTING Contd…WEB SCRIPTING Contd… 4. co-location hosting: the company actually owns the server & is responsible for all server administration and the web hosting company provides physical requirements of rack, high speed connection, a regular power supply, and a limited amount of technical support such as data back up or hardware upgrades.
  • 78.
  • 79.
  • 80. OPEN SOURCE TERMINOLOGIESOPEN SOURCE TERMINOLOGIES
  • 81. OPEN SOURCE SOFTWAREOPEN SOURCE SOFTWARE Open Source Software commonly means software whose licenses do not impose much conditions. Users are free to use, modify & distribute software hassle-free but not certainly free of charge. It has been officially defined by the open source definition at http://www.opensource.org/docs/definition_plain.html. It states that :- Open source doesn’t just mean access to source code. The distribution terms of open-source software must comply with the following criteria :- 1. Free Redistribution 2. Source Code 3. Derived Works 4. Integrity of The Author’s Source Code 5. No Discrimination Against Persons Or Groups 6. No Discrimination Against Fields Of Endeavor 7. Distribution Of License 8. License Must Not Be Specific To A Product 9. The License Must Not Restrict Other Software 10.License Must Be Technology Neutral
  • 82. FREEWAREFREEWARE The term freeware has no clear definition, but generally refers to free of cost & redistributable software, but no modification & no source code. It is distributed in binary form. Freeware is often used in marketing situations in order to sell products and gain market advantages. One example is Microsoft Internet Explorer.
  • 83. SHAREWARESHAREWARE Shareware is a software, which is made available with the right to redistribute copies, but it is stipulated that if one intends to use the software, often after a certain period of time, then a license fee must be paid. Source code & modifiability absent. The objective is to increase no. of prospective users. Generally a built-in timed mechanism limits the functionality after a certain period of time.
  • 84. PROPRIETARY SOFTWAREPROPRIETARY SOFTWARE Neither open nor free, its use is regulated and further distribution and modification is either forbidden or requires special permission by the supplier or vendor. Normally the source code is not given to the user.
  • 85. FLOSSFLOSS FLOSS refers to Free Livre And Open Source Software or to Free Libre And Open Source Software. The term is used for software that is both free software and open software. Here the words libre(a Spanish word) or livre(a Portuguese word) mean freedom.
  • 86. GNUGNU GNU is a recursive acronym for GNU’s NOT UNIX. This project was initiated by richard m. stallman with an objective to create a system compatible with UNIX but not same as UNIX. It has not only made an OS but the project has grown since its inception and now it creates software of almost all kinds. The same person founded the Free Software Foundation.
  • 87. FSFFSF FSF is Free Software Foundation. It is a non profit organization created to support free software movement in 1985 by Richard M Stallman. FSF has funded many software developers to write free software. Now a days, it also works on legal and structural issues for the free software community.
  • 88. OSIOSI OSI is Open Source Initiative founded byBruce perens & erics raymond (in feb 1998) . Itr specififes the criteria for open source software & properly defines terms and specifications for open source software.
  • 89.
  • 90.
  • 91.