SlideShare a Scribd company logo
1 of 36
COMMUNICATION AND
NETWORK CONCEPTS
CLASS 12 COMPUTER SCIENCE
4G – 4th Generation
MAC- Media
Access Control
IP- Internet
Protocol
Wi-Fi-
Wireless Fidelity
CDMA-Code Division
Multiple Access
GSM- Global System for
Mobile Communication
LTE- Long Term
Evolution
VOIP- Voice Over
Internet Protocol
TDMA-Time Division
Multiple Access
Server Client
TCP- Transmission
Control Protocol
https:// -
HyperText Transfer
Protocol (Secure)Network
ISP- Internet
Service Provider
Optic Fiber
WHAT IS A NETWORK ?
• The collection of interconnected computers computer network. is
called a network.
• Two computers are said to be Network if they are capable of
sharing and exchanging information.
NEED OF NETWORK.
• Resource Sharing - Resource Sharing means to make all programs, data and
peripherals available to anyone on the network
irrespective of the physical location of the resources and the user
• Reliability- Means to keep the copy of a file on two or more different
machines, so if one of them is unavailable (due to some hardware crash
or any other) them its other copy can be used
• Cost Factor- Means it greatly reduces the cost since the resources can be
shared
• Communication Medium-Means one can send messages and whatever the changes
at one end are done can be immediately noticed at another.
SWITCHING TECHNIQUES.
• Circuit Switching: In the Circuit Switching technique, first, the complete end-
to-end transmission path between the source and the destination computers is
established and then the message is transmitted through the path. The main
advantage of this technique is guaranteed delivery of the message. Mostly used
for voice communication.
• Message Switching: In the Message switching technique, no physical path is
established between sender and receiver in advance. This technique follows the
store and forward mechanism.
• Packet Switching: In this switching technique fixed size of packet can be
transmitted across the network.
DATA COMMUNICATION TERMINOLOGIES.
• Data channel :- The information / data carry from one end to another in the network by channel.
• Baud & bits per second (bps) :- Is used to measurement for the information carry of a communication
channel.
• Measurement Units :- bit
• 1 Byte= 8 bits
• 1 KBPS ( Kilo Byte Per Second)= 1024 Bytes
• 1 Kbps (kilobits Per Second) = 1024 bits
• 1 Mbps ( Mega bits Per Second) =1024 Kbps
• Bandwidth :- It is amount of information transmitted or receives per unit time.
TRANSMISSION MEDIA
• Twisted Pair Cable :- It consists of two identical 1 mm thick copper wires
insulated and twisted together. The twisted pair cables
are twisted in order to reduce crosstalk and
electromagnetic induction.
• Advantages:
• It is easy to install and maintain.
• It is very inexpensive
• Disadvantages:
• It is incapable to carry a signal over long distances without the use of repeaters.
• Due to low bandwidth, these are unsuitable for broadband applications.
CO-AXIAL CABLES.
• It consists of a solid wire core surrounded by one or more foil or braided wire
shields, each separated from the other by some kind of plastic insulator. It is
mostly used in the cable wires.
• Advantages:
• Data transmission rate is better than twisted pair cables.
• It provides a cheap means of transporting multi-channel television signals around
metropolitan areas.
• Disadvantages:
• Expensive than twisted pair cables.
• Difficult to manage and reconfigure.
OPTICAL FIBER.
• An optical fiber consists of thin glass fibers that can carry information in the
form of visible light.
• Advantages:
• Transmit data over long distance with high security.
• Data transmission speed is high
• Provide better noise immunity
• Bandwidth is up to 10 Gbps.
• Disadvantages:
• Expensive as compared to other guided media.
• Need special care while installation.
INFRARED.
• The infrared light transmits data through the air and can
propagate throughout a room, but will not penetrate walls. It is a
secure medium of signal transmission. The infrared transmission
has become common in TV remotes, automotive garage doors,
wireless speakers etc.
RADIO WAVES.
• wavelength between 0.5 cm and 30,000m. The transmission making use of radio
frequencies is termed as radio-wave transmission.
• Advantages:
• Radio wave transmission offers mobility.
• It is cheaper than laying cables and fibers.
• It offers ease of communication over difficult terrain.
• Disadvantages:
• Radio wave communication is insecure communication.
• Radio wave propagation is susceptible to weather effects like rains, thunder storms etc.
MICROWAVES
• The Microwave transmission is a line of sight transmission. Microwave signals travel at a higher
frequency than radio waves and are popularly used for transmitting data over long distances.
• Advantages:
• It is cheaper than laying cable or fiber.
• It has the ability to communicate over oceans.
• Disadvantages
• It is an insecure communication.
• Signals from antenna may split up and transmitted in different way to different antenna which leads to
• reduce to signal strength.
• Microwave propagation is susceptible to weather effects like rains, thunder storms etc.
• Bandwidth allocation is extremely limited in case of microwaves.
SATELLITE LINK
• The satellite transmission is also a kind of line of sight transmission that is
used to transmit signals throughout the world.
• Advantages:
• Area covered is quite large.
• No line of sight restrictions such as natural mountains, tall building, towers etc.
• Earth station which receives the signals can be fixed position or relatively mobile.
• Disadvantages:-
• Very expensive as compared to other transmission mediums.
• Installation is extremely complex.
• Signals sent to the stations can be tampered by external interference.
NETWORKING DEVICES.
• Mordem (MOdulator DEModulator) is an electronic device that enables
a computer to transmit data over telephone lines. There are two types
of modems, namely, internal modem and external modem
• RJ45 connector: - The RJ-45(Registered Jack) connectors are the
plug-in devices used in the networking and telecommunications
applications. They are used primarily for connecting LANs, particularly
Ethernet.
• Ethernet Card: - It is a hardware device that helps in connection of
nodes within a network
• Hub: A hub is a hardware device used to connect several computers together. Hubs
can be either active or passive. Hubs usually can support 8, 12 or 24 RJ45 ports.
• Switch: A switch (switching hub) is a network device which is used to interconnect
computers or devices on a network. It filters and forwards data packets across a
network. The main difference between hub and switch is that hub replicates what it
receives on one port onto all the other ports while switch keeps a record of the
MAC addresses of the devices attached to it.
• Gateway: A gateway is a device that connects dissimilar networks.
• Repeater: A repeater is a network device that amplifies and restores signals for
long distance transmission.
TOPOLOGY
• Topology refers to the way in which the workstations attached to
the network are interconnected
BUS
• The bus topology uses a common single cable to connect all the workstations. Each
computer performs its task of sending messages without the help of the central server.
However, only one workstation can transmit a message at a particular time in the bus
topology.
• Advantages
• Easy to connect and install.
• Involves a low cost of installation time.
• Can be easily extended.
• Disadvantages:-
• The entire network shuts down if there is a failure in the central cable.
• Only a single message can travel at a particular time.
• Difficult to troubleshoot an error
THE STAR TOPOLOGY
• A STAR topology is based on a central node which acts as a hub. A STAR topology is common in homes
networks where all the computers connect to the single central computer using it as a hub.
• Advantages:
• Easy to troubleshoot
• A single node failure does not affect the entire network.
• Fault detection and removal of faulty parts is easier.
• In case a workstation fails, the network is not affected.
• Disadvantages:-
• Difficult to expand.
• Longer cable is required.
• The cost of the hub and the longer cables makes it expensive over others.
• In case hub fails, the entire network fails.
THE TREE TOPOLOGY
• The tree topology combines the characteristics of the linear bus and the star topologies. It
consists of groups of star configured workstations connected to a bus backbone cable.
• Advantages:
• Eliminates network congestion.
• The network can be easily extended.
• Faulty nodes can easily be isolated from the rest of the network.
• Disadvantages:
• Uses large cable length.
• Requires a large amount of hardware components and hence is expensive.
• Installation and reconfiguration is very difficult.
MESH
• A mesh topology is a point-to-point
connection where nodes are
interconnected.
• Advantages
• The interconnectivity of nodes makes them
extremely resistant to failures.
• Disadvantages
• They require an immense amount of
configuration once they are deployed.
• The topological layout is more complex than
many other topologies and this is reflected by
how long it takes to set up. You’ll need to
accommodate a whole host of new wiring which
can add up to be quite expensive.
TYPES OF NETWORKS
• Types of Networks:
• LAN (Local Area Network): A Local Area Network (LAN) is a network that is confined to a
relatively small area. It is generally limited to a geographic area such as writing lab, school or
building. It is generally privately owned networks over a distance not more than 5 Km.
• MAN (Metropolitan Area Network): MAN is the networks cover a group of nearby corporate
offices or a city and might be either private or public.
• WAN (Wide Area Network): These are the networks spread over large distances, say across
countries or even continents through cabling or satellite uplinks are called WAN.
• PAN (Personal Area Network): A Personal Area Network is computer network organized
around an individual person. It generally covers a range of less than 10 meters. Personal Area
Networks can be constructed with cables or wirelessly.
NETWORK PROTOCOL
• A protocol means the rules that are applicable for a network.
• It defines the standardized format for data packets, techniques for detecting and
correcting errors and so on.
• A protocol is a formal description of message formats and the rules that two or more
machines must follow to exchange those messages.
• E.g. using library books.
• Types of protocols are:
• FTP
• HTTPS
• TCP/IP
• SLIP/PPP
HTTPS
• (HTTP) is a communications protocol for the transfer of
information on the intranet and the World Wide Web. HTTP is a
request/response standard between a client and a server. A client
is the end-user; the server is the web site.
• https://google.com
• https://binscomputer.com
FTP
• FTP (File Transfer Protocol) is the simplest and most secure way
to exchange files over the Internet.
• The objectives of FTP are:
• To promote sharing of files (computer programs and/or data).
• To encourage indirect or implicit use of remote computers.
• To shield a user from variations in file storage systems among different
hosts.
• To transfer data reliably, and efficiently.
TCP/IP
• It is responsible for verifying the correct delevar of data from client to server.
Data can be lost in the intermediate network. TCP adds support to detect errors or
lost data and to trigger retransmission until the data is correctly and completely
received.
• IP - is responsible for moving packet of data from node to node. IP forwards each
packet based on a four byte destination address (the IP number). The Internet
authorities assign ranges of numbers to different organizations. The organizations
assign groups of their numbers to departments. IP operates on gateway machines
that move data from department to organization to region and then around the
world.
• Eg. 192.168.0.1
TELNET
• It is an older internet utility that lets us log on to remote
computer system. It also facilitates for terminal emulation
purpose. Terminal emulation means using a pc like a mainframe
computer through networking.
• Wireless Communication is simply data communication without the use of
landlines. Mobile computing means that the computing device is not
continuously connected to the base or central network.
• GSM(Global System for Mobile communication): it is leading digital
cellular system. In covered areas, cell phone users can buy one phone
that will work any where the standard is supported. It uses narrowband
TDMA, which allows eight simultaneous calls on the same radio
frequency.
• CDMA(Code Division Multiple Access): it is a digital cellular technology
that uses spread spectrum techniques. CDMA does not assign a specific
frequency to each user. Instead every channel uses the full available
spectrum.
• General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and
3G cellular communication system's global system for mobile communications (GSM). GPRS
usage is typically charged based on volume of data transferred, contrasting with circuit
switched data, which is usually billed per minute of 1G and 2G charged based on volume of
data transferred, contrasting with circuit switched data, which is usually billed per minute of
connection time.
• WLL(Wireless in Local Loop) : WLL is a system that connects subscribers to the public
switched telephone network using radio signals as a substitute for other connecting media.
• Email(Electronic Mail): Email is sending and receiving messages by computer.
• Chat: Online textual talk in real time , is called Chatting. Internet Relay Chat (IRC) is a
protocol for live interactive Internet text.
• Video Conferencing: a two way videophone conversation among multiple participants is called
video conferencing. The protocol used is Real-time Transport Protocol (RTP).
• SMS(Short Message Service): SMS is the transmission of short text messages to and from a
mobile pone, fax machine and or IP address.
• 3G and EDGE: 3G is a specification for the third generation of mobile
communication of mobile communication technology. 3G promises increased
bandwidth, up to 384 Kbps when a device is stationary.
• EDGE(Enhanced Data rates for Global Evolution ) is a radio based high speed mobile
data standard.
• SMTP: Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic
mail (e-mail) transmission across Internet Protocol (IP) networks.
• POP3: the Post Office Protocol (POP) is an application-layer Internet standard
protocol used by local e-mail clients to retrieve e-mail from a remote server over a
TCP/IP connection.
• Voice over IP (voice over Internet Protocol, VoIP) is a methodology and group of
technologies for the delivery of voice communications and multimedia sessions over
Internet Protocol (IP) networks, such as the Internet. Other terms commonly
associated with VoIP are IP telephony, Internet telephony, voice over broadband
(VoBB), broadband telephony, IP communications, and broadband phone service.
NETWORK SECURITY CONCEPTS
• Worms: Worms are also self- replicating programs that do not create multiple copies of itself on one
computer but propagate through the computer network. Worms log on to computer systems using the
username and passwords and exploit the system.
• Viruses are programs which replicate and attach to other programs in order to corrupt the executable
codes. Virus enters the computer system through an external source and become destructive.
• Trojan horse: - Though it is a useful program, however, a cracker can use it to intrude the computer
system in order to exploit the resources. Such a program can also enter into the computer through an
email or free programs downloaded through the Internet.
• Spams: Unwanted e-mail (usually of a commercial nature sent out in bulk)
• Cookies: Cookies are the text messages sent by a web server to the web browser primarily for identifying
the user.
• Firewall: A firewall is used to control the traffic between
computer networks. It intercepts the packets between the
computer networks and allows only authorized packets to pass.
• Cyber Law: Cyber law refers to all the legal and regulatory aspects
of Internet and the World Wide Web. Cyber Crimes: Cyber crime
involves the usage of the computer system and the computer
network for criminal activity.
• Hacking: Hacking is an unauthorized access to computer in order
to exploit the resources.
WEB SERVICES
• WWW: The World Wide Web or W3 or simply the Web is a collection of linked documents or pages,
stored on millions of computers and distributed across the Internet.
• HTML (Hyper Text Markup Language):- HTML is a computer language that describes the structure and
behavior of a web page. This language is used to create web pages.
• XML (eXtensible Markup Language):- Extensible Markup Language (XML) is a meta language that helps to
describe the markup language.
• HTTP (Hyper Text Transfer Protocol):- A protocol to transfer hypertext requests and information
between servers and browsers.
• Domain Names: A domain name is a unique name that identifies a particular website and represents the
name of the server where the web pages reside.
• URL:- The Uniform Resource Locator is a means to locate resources such as web pages on the Internet.
URL is also a method to address the web pages on the Internet. There are two types of URL, namely,
absolute URL and relative URL.
• Website: A collection of related web pages stored on a web server is known as a website.
• Web browser: A software application that enables to browse, search and
collect information from the Web is known as Web browser.
• Web Servers: The web pages on the Internet are stored on the computers that
are connected to the Internet. These computers are known as web servers.
• Web Hosting: - Web Hosting or website hosting is the service to host, store
and maintain the websites on the World Wide Web. Web
• Scripting: - The process of creating and embedding scripts in a web page is
known as Web Scripting.
• Types of Scripts:-
• Client Side Scripts: - Client side scripts supports interaction within a webpage. E.g. VB
Script, Java Script, PHP (PHP S Hypertext Preprocessor).
• Server Side Scripts: - Server side scripting supports execution at server end. E.g. ASP,
JSP, PHP
WHERE THE FOLLOWING DEVICES BE PLACED ?
• HUB / SWITCH:- In all the wings
• REPEATER: It is used if the distances higher than 70 m. It
regenerates data and voice signals.
• ROUTER: When one LAN will be connected to the other LAN.
• Server: Building having highest no. of PC or having a mean distance
to all buildings.
Thank You!!

More Related Content

What's hot

Communication and network concepts
Communication and network conceptsCommunication and network concepts
Communication and network conceptsMohnish Sahu
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking ConceptsSehajbir Singh
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission mediaManish8976
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniquesGupta6Bindu
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XIIFernando Torres
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)sonangrai
 
Transmission Media, Guided and unguided transmission media
Transmission Media, Guided and unguided transmission mediaTransmission Media, Guided and unguided transmission media
Transmission Media, Guided and unguided transmission mediaadnanqayum
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Networking Cables
Networking CablesNetworking Cables
Networking CablesNetwax Lab
 
Lecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdfLecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdfOliverCSilvano
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer NetworkingHj Habib
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Mediumsabari Giri
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc networkAshish Prajapat
 

What's hot (20)

Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer topology
Computer topologyComputer topology
Computer topology
 
Communication and network concepts
Communication and network conceptsCommunication and network concepts
Communication and network concepts
 
Basic Networking Concepts
Basic Networking ConceptsBasic Networking Concepts
Basic Networking Concepts
 
Ppt for tranmission media
Ppt for tranmission mediaPpt for tranmission media
Ppt for tranmission media
 
Switching techniques
Switching techniquesSwitching techniques
Switching techniques
 
WiMAX
WiMAXWiMAX
WiMAX
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 
Vpn(virtual private network)
Vpn(virtual private network)Vpn(virtual private network)
Vpn(virtual private network)
 
Transmission Media, Guided and unguided transmission media
Transmission Media, Guided and unguided transmission mediaTransmission Media, Guided and unguided transmission media
Transmission Media, Guided and unguided transmission media
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Transmission media
Transmission mediaTransmission media
Transmission media
 
Networking Cables
Networking CablesNetworking Cables
Networking Cables
 
Lecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdfLecture 2 - Networking Devices.pdf
Lecture 2 - Networking Devices.pdf
 
Basic concepts of computer Networking
Basic concepts of computer NetworkingBasic concepts of computer Networking
Basic concepts of computer Networking
 
Transmission Medium
Transmission MediumTransmission Medium
Transmission Medium
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Introduction to mobile ad hoc network
Introduction to mobile ad hoc networkIntroduction to mobile ad hoc network
Introduction to mobile ad hoc network
 
COMPUTER NETWORK
COMPUTER NETWORKCOMPUTER NETWORK
COMPUTER NETWORK
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 

Similar to Communication and Network Concepts

Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its conceptsHimanshu Sajwan
 
Computer networks
Computer networksComputer networks
Computer networkssamina khan
 
Network Components
Network ComponentsNetwork Components
Network ComponentsIfrad Mahbub
 
ifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdfifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdfkashafishfaq21
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptDrPreethiD1
 
Presentation on different modes of data communication
Presentation on different modes of data communicationPresentation on different modes of data communication
Presentation on different modes of data communicationTafadzwa Gonera
 
Data comm 2 latest
Data comm 2 latestData comm 2 latest
Data comm 2 latestRohit Nair
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communicationsKhan Yousafzai
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005SOLOMONCHINAEMEUCHEA
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to NetworkingMohammed Adam
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfSujanTimalsina5
 

Similar to Communication and Network Concepts (20)

Computer network
Computer networkComputer network
Computer network
 
Network and its concepts
Network and its conceptsNetwork and its concepts
Network and its concepts
 
Computer networks
Computer networksComputer networks
Computer networks
 
Network Components
Network ComponentsNetwork Components
Network Components
 
ifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdfifrad01605545networkcomponents-181123160910.pdf
ifrad01605545networkcomponents-181123160910.pdf
 
Network in brief
Network in briefNetwork in brief
Network in brief
 
presentation on type of toplogy and network
presentation on type of toplogy and networkpresentation on type of toplogy and network
presentation on type of toplogy and network
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
presentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.pptpresentation_intro_to_networking_1457926557_181219.ppt
presentation_intro_to_networking_1457926557_181219.ppt
 
Presentation on different modes of data communication
Presentation on different modes of data communicationPresentation on different modes of data communication
Presentation on different modes of data communication
 
Data comm 2 latest
Data comm 2 latestData comm 2 latest
Data comm 2 latest
 
Ch 15 .networks and communications
Ch 15 .networks and communicationsCh 15 .networks and communications
Ch 15 .networks and communications
 
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
HHCJ AMUMARA:COMPUTER STUDIES LECTURE NOTE FOR SS2:005
 
Introduction to Networking
Introduction to NetworkingIntroduction to Networking
Introduction to Networking
 
Data communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdfData communications_Network_Model (1).pdf
Data communications_Network_Model (1).pdf
 
Networking introduction
Networking introductionNetworking introduction
Networking introduction
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Network use and configuration
Network use and configurationNetwork use and configuration
Network use and configuration
 
Unit2
Unit2Unit2
Unit2
 

More from Dev Chauhan

GTU induction program report
GTU induction program report GTU induction program report
GTU induction program report Dev Chauhan
 
2 States Book Review
2 States Book Review2 States Book Review
2 States Book ReviewDev Chauhan
 
STACK, LINKED LIST ,AND QUEUE
STACK, LINKED LIST ,AND QUEUESTACK, LINKED LIST ,AND QUEUE
STACK, LINKED LIST ,AND QUEUEDev Chauhan
 
NETWORKING AND COMMUNICATION TECHNOLOGIES
NETWORKING AND COMMUNICATION TECHNOLOGIESNETWORKING AND COMMUNICATION TECHNOLOGIES
NETWORKING AND COMMUNICATION TECHNOLOGIESDev Chauhan
 
DATABASE MANAGMENT SYSTEM (DBMS) AND SQL
DATABASE MANAGMENT SYSTEM (DBMS) AND SQLDATABASE MANAGMENT SYSTEM (DBMS) AND SQL
DATABASE MANAGMENT SYSTEM (DBMS) AND SQLDev Chauhan
 
DATA STRUCTURE CLASS 12 COMPUTER SCIENCE
DATA STRUCTURE CLASS 12 COMPUTER SCIENCEDATA STRUCTURE CLASS 12 COMPUTER SCIENCE
DATA STRUCTURE CLASS 12 COMPUTER SCIENCEDev Chauhan
 
BASIC CONCEPTS OF C++ CLASS 12
BASIC CONCEPTS OF C++ CLASS 12BASIC CONCEPTS OF C++ CLASS 12
BASIC CONCEPTS OF C++ CLASS 12Dev Chauhan
 
OBJECT ORIENTED PROGRAMING IN C++
OBJECT ORIENTED PROGRAMING IN C++ OBJECT ORIENTED PROGRAMING IN C++
OBJECT ORIENTED PROGRAMING IN C++ Dev Chauhan
 
What is bullying
What is bullyingWhat is bullying
What is bullyingDev Chauhan
 
Properties Of Water
Properties Of WaterProperties Of Water
Properties Of WaterDev Chauhan
 
बहुव्रीहि समास
बहुव्रीहि समासबहुव्रीहि समास
बहुव्रीहि समासDev Chauhan
 
अव्ययीभाव समास
अव्ययीभाव समासअव्ययीभाव समास
अव्ययीभाव समासDev Chauhan
 
तत्पुरुष (विभक्ति, उपपद ऽ नञ्)
तत्पुरुष (विभक्ति, उपपद ऽ नञ्)तत्पुरुष (विभक्ति, उपपद ऽ नञ्)
तत्पुरुष (विभक्ति, उपपद ऽ नञ्)Dev Chauhan
 
कर्मधारय, द्विगु समास
कर्मधारय, द्विगु समासकर्मधारय, द्विगु समास
कर्मधारय, द्विगु समासDev Chauhan
 
द्वन्द्व समास
द्वन्द्व समासद्वन्द्व समास
द्वन्द्व समासDev Chauhan
 
Class 10 Farewell Presentation Topic:- Nostalgia
Class 10 Farewell Presentation Topic:- NostalgiaClass 10 Farewell Presentation Topic:- Nostalgia
Class 10 Farewell Presentation Topic:- NostalgiaDev Chauhan
 

More from Dev Chauhan (17)

GTU induction program report
GTU induction program report GTU induction program report
GTU induction program report
 
2 States Book Review
2 States Book Review2 States Book Review
2 States Book Review
 
STACK, LINKED LIST ,AND QUEUE
STACK, LINKED LIST ,AND QUEUESTACK, LINKED LIST ,AND QUEUE
STACK, LINKED LIST ,AND QUEUE
 
NETWORKING AND COMMUNICATION TECHNOLOGIES
NETWORKING AND COMMUNICATION TECHNOLOGIESNETWORKING AND COMMUNICATION TECHNOLOGIES
NETWORKING AND COMMUNICATION TECHNOLOGIES
 
DATABASE MANAGMENT SYSTEM (DBMS) AND SQL
DATABASE MANAGMENT SYSTEM (DBMS) AND SQLDATABASE MANAGMENT SYSTEM (DBMS) AND SQL
DATABASE MANAGMENT SYSTEM (DBMS) AND SQL
 
DATA STRUCTURE CLASS 12 COMPUTER SCIENCE
DATA STRUCTURE CLASS 12 COMPUTER SCIENCEDATA STRUCTURE CLASS 12 COMPUTER SCIENCE
DATA STRUCTURE CLASS 12 COMPUTER SCIENCE
 
BASIC CONCEPTS OF C++ CLASS 12
BASIC CONCEPTS OF C++ CLASS 12BASIC CONCEPTS OF C++ CLASS 12
BASIC CONCEPTS OF C++ CLASS 12
 
BOOLEAN ALGEBRA
BOOLEAN ALGEBRABOOLEAN ALGEBRA
BOOLEAN ALGEBRA
 
OBJECT ORIENTED PROGRAMING IN C++
OBJECT ORIENTED PROGRAMING IN C++ OBJECT ORIENTED PROGRAMING IN C++
OBJECT ORIENTED PROGRAMING IN C++
 
What is bullying
What is bullyingWhat is bullying
What is bullying
 
Properties Of Water
Properties Of WaterProperties Of Water
Properties Of Water
 
बहुव्रीहि समास
बहुव्रीहि समासबहुव्रीहि समास
बहुव्रीहि समास
 
अव्ययीभाव समास
अव्ययीभाव समासअव्ययीभाव समास
अव्ययीभाव समास
 
तत्पुरुष (विभक्ति, उपपद ऽ नञ्)
तत्पुरुष (विभक्ति, उपपद ऽ नञ्)तत्पुरुष (विभक्ति, उपपद ऽ नञ्)
तत्पुरुष (विभक्ति, उपपद ऽ नञ्)
 
कर्मधारय, द्विगु समास
कर्मधारय, द्विगु समासकर्मधारय, द्विगु समास
कर्मधारय, द्विगु समास
 
द्वन्द्व समास
द्वन्द्व समासद्वन्द्व समास
द्वन्द्व समास
 
Class 10 Farewell Presentation Topic:- Nostalgia
Class 10 Farewell Presentation Topic:- NostalgiaClass 10 Farewell Presentation Topic:- Nostalgia
Class 10 Farewell Presentation Topic:- Nostalgia
 

Recently uploaded

Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsanshu789521
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 

Recently uploaded (20)

TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Presiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha electionsPresiding Officer Training module 2024 lok sabha elections
Presiding Officer Training module 2024 lok sabha elections
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 

Communication and Network Concepts

  • 2. 4G – 4th Generation MAC- Media Access Control IP- Internet Protocol Wi-Fi- Wireless Fidelity CDMA-Code Division Multiple Access GSM- Global System for Mobile Communication LTE- Long Term Evolution VOIP- Voice Over Internet Protocol TDMA-Time Division Multiple Access Server Client TCP- Transmission Control Protocol https:// - HyperText Transfer Protocol (Secure)Network ISP- Internet Service Provider Optic Fiber
  • 3. WHAT IS A NETWORK ? • The collection of interconnected computers computer network. is called a network. • Two computers are said to be Network if they are capable of sharing and exchanging information.
  • 4. NEED OF NETWORK. • Resource Sharing - Resource Sharing means to make all programs, data and peripherals available to anyone on the network irrespective of the physical location of the resources and the user • Reliability- Means to keep the copy of a file on two or more different machines, so if one of them is unavailable (due to some hardware crash or any other) them its other copy can be used • Cost Factor- Means it greatly reduces the cost since the resources can be shared • Communication Medium-Means one can send messages and whatever the changes at one end are done can be immediately noticed at another.
  • 5. SWITCHING TECHNIQUES. • Circuit Switching: In the Circuit Switching technique, first, the complete end- to-end transmission path between the source and the destination computers is established and then the message is transmitted through the path. The main advantage of this technique is guaranteed delivery of the message. Mostly used for voice communication. • Message Switching: In the Message switching technique, no physical path is established between sender and receiver in advance. This technique follows the store and forward mechanism. • Packet Switching: In this switching technique fixed size of packet can be transmitted across the network.
  • 6.
  • 7. DATA COMMUNICATION TERMINOLOGIES. • Data channel :- The information / data carry from one end to another in the network by channel. • Baud & bits per second (bps) :- Is used to measurement for the information carry of a communication channel. • Measurement Units :- bit • 1 Byte= 8 bits • 1 KBPS ( Kilo Byte Per Second)= 1024 Bytes • 1 Kbps (kilobits Per Second) = 1024 bits • 1 Mbps ( Mega bits Per Second) =1024 Kbps • Bandwidth :- It is amount of information transmitted or receives per unit time.
  • 8. TRANSMISSION MEDIA • Twisted Pair Cable :- It consists of two identical 1 mm thick copper wires insulated and twisted together. The twisted pair cables are twisted in order to reduce crosstalk and electromagnetic induction. • Advantages: • It is easy to install and maintain. • It is very inexpensive • Disadvantages: • It is incapable to carry a signal over long distances without the use of repeaters. • Due to low bandwidth, these are unsuitable for broadband applications.
  • 9. CO-AXIAL CABLES. • It consists of a solid wire core surrounded by one or more foil or braided wire shields, each separated from the other by some kind of plastic insulator. It is mostly used in the cable wires. • Advantages: • Data transmission rate is better than twisted pair cables. • It provides a cheap means of transporting multi-channel television signals around metropolitan areas. • Disadvantages: • Expensive than twisted pair cables. • Difficult to manage and reconfigure.
  • 10. OPTICAL FIBER. • An optical fiber consists of thin glass fibers that can carry information in the form of visible light. • Advantages: • Transmit data over long distance with high security. • Data transmission speed is high • Provide better noise immunity • Bandwidth is up to 10 Gbps. • Disadvantages: • Expensive as compared to other guided media. • Need special care while installation.
  • 11. INFRARED. • The infrared light transmits data through the air and can propagate throughout a room, but will not penetrate walls. It is a secure medium of signal transmission. The infrared transmission has become common in TV remotes, automotive garage doors, wireless speakers etc.
  • 12. RADIO WAVES. • wavelength between 0.5 cm and 30,000m. The transmission making use of radio frequencies is termed as radio-wave transmission. • Advantages: • Radio wave transmission offers mobility. • It is cheaper than laying cables and fibers. • It offers ease of communication over difficult terrain. • Disadvantages: • Radio wave communication is insecure communication. • Radio wave propagation is susceptible to weather effects like rains, thunder storms etc.
  • 13. MICROWAVES • The Microwave transmission is a line of sight transmission. Microwave signals travel at a higher frequency than radio waves and are popularly used for transmitting data over long distances. • Advantages: • It is cheaper than laying cable or fiber. • It has the ability to communicate over oceans. • Disadvantages • It is an insecure communication. • Signals from antenna may split up and transmitted in different way to different antenna which leads to • reduce to signal strength. • Microwave propagation is susceptible to weather effects like rains, thunder storms etc. • Bandwidth allocation is extremely limited in case of microwaves.
  • 14. SATELLITE LINK • The satellite transmission is also a kind of line of sight transmission that is used to transmit signals throughout the world. • Advantages: • Area covered is quite large. • No line of sight restrictions such as natural mountains, tall building, towers etc. • Earth station which receives the signals can be fixed position or relatively mobile. • Disadvantages:- • Very expensive as compared to other transmission mediums. • Installation is extremely complex. • Signals sent to the stations can be tampered by external interference.
  • 15. NETWORKING DEVICES. • Mordem (MOdulator DEModulator) is an electronic device that enables a computer to transmit data over telephone lines. There are two types of modems, namely, internal modem and external modem • RJ45 connector: - The RJ-45(Registered Jack) connectors are the plug-in devices used in the networking and telecommunications applications. They are used primarily for connecting LANs, particularly Ethernet. • Ethernet Card: - It is a hardware device that helps in connection of nodes within a network
  • 16. • Hub: A hub is a hardware device used to connect several computers together. Hubs can be either active or passive. Hubs usually can support 8, 12 or 24 RJ45 ports. • Switch: A switch (switching hub) is a network device which is used to interconnect computers or devices on a network. It filters and forwards data packets across a network. The main difference between hub and switch is that hub replicates what it receives on one port onto all the other ports while switch keeps a record of the MAC addresses of the devices attached to it. • Gateway: A gateway is a device that connects dissimilar networks. • Repeater: A repeater is a network device that amplifies and restores signals for long distance transmission.
  • 17. TOPOLOGY • Topology refers to the way in which the workstations attached to the network are interconnected
  • 18. BUS • The bus topology uses a common single cable to connect all the workstations. Each computer performs its task of sending messages without the help of the central server. However, only one workstation can transmit a message at a particular time in the bus topology. • Advantages • Easy to connect and install. • Involves a low cost of installation time. • Can be easily extended. • Disadvantages:- • The entire network shuts down if there is a failure in the central cable. • Only a single message can travel at a particular time. • Difficult to troubleshoot an error
  • 19. THE STAR TOPOLOGY • A STAR topology is based on a central node which acts as a hub. A STAR topology is common in homes networks where all the computers connect to the single central computer using it as a hub. • Advantages: • Easy to troubleshoot • A single node failure does not affect the entire network. • Fault detection and removal of faulty parts is easier. • In case a workstation fails, the network is not affected. • Disadvantages:- • Difficult to expand. • Longer cable is required. • The cost of the hub and the longer cables makes it expensive over others. • In case hub fails, the entire network fails.
  • 20. THE TREE TOPOLOGY • The tree topology combines the characteristics of the linear bus and the star topologies. It consists of groups of star configured workstations connected to a bus backbone cable. • Advantages: • Eliminates network congestion. • The network can be easily extended. • Faulty nodes can easily be isolated from the rest of the network. • Disadvantages: • Uses large cable length. • Requires a large amount of hardware components and hence is expensive. • Installation and reconfiguration is very difficult.
  • 21. MESH • A mesh topology is a point-to-point connection where nodes are interconnected. • Advantages • The interconnectivity of nodes makes them extremely resistant to failures. • Disadvantages • They require an immense amount of configuration once they are deployed. • The topological layout is more complex than many other topologies and this is reflected by how long it takes to set up. You’ll need to accommodate a whole host of new wiring which can add up to be quite expensive.
  • 22. TYPES OF NETWORKS • Types of Networks: • LAN (Local Area Network): A Local Area Network (LAN) is a network that is confined to a relatively small area. It is generally limited to a geographic area such as writing lab, school or building. It is generally privately owned networks over a distance not more than 5 Km. • MAN (Metropolitan Area Network): MAN is the networks cover a group of nearby corporate offices or a city and might be either private or public. • WAN (Wide Area Network): These are the networks spread over large distances, say across countries or even continents through cabling or satellite uplinks are called WAN. • PAN (Personal Area Network): A Personal Area Network is computer network organized around an individual person. It generally covers a range of less than 10 meters. Personal Area Networks can be constructed with cables or wirelessly.
  • 23. NETWORK PROTOCOL • A protocol means the rules that are applicable for a network. • It defines the standardized format for data packets, techniques for detecting and correcting errors and so on. • A protocol is a formal description of message formats and the rules that two or more machines must follow to exchange those messages. • E.g. using library books. • Types of protocols are: • FTP • HTTPS • TCP/IP • SLIP/PPP
  • 24. HTTPS • (HTTP) is a communications protocol for the transfer of information on the intranet and the World Wide Web. HTTP is a request/response standard between a client and a server. A client is the end-user; the server is the web site. • https://google.com • https://binscomputer.com
  • 25. FTP • FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Internet. • The objectives of FTP are: • To promote sharing of files (computer programs and/or data). • To encourage indirect or implicit use of remote computers. • To shield a user from variations in file storage systems among different hosts. • To transfer data reliably, and efficiently.
  • 26. TCP/IP • It is responsible for verifying the correct delevar of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or lost data and to trigger retransmission until the data is correctly and completely received. • IP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world. • Eg. 192.168.0.1
  • 27. TELNET • It is an older internet utility that lets us log on to remote computer system. It also facilitates for terminal emulation purpose. Terminal emulation means using a pc like a mainframe computer through networking.
  • 28. • Wireless Communication is simply data communication without the use of landlines. Mobile computing means that the computing device is not continuously connected to the base or central network. • GSM(Global System for Mobile communication): it is leading digital cellular system. In covered areas, cell phone users can buy one phone that will work any where the standard is supported. It uses narrowband TDMA, which allows eight simultaneous calls on the same radio frequency. • CDMA(Code Division Multiple Access): it is a digital cellular technology that uses spread spectrum techniques. CDMA does not assign a specific frequency to each user. Instead every channel uses the full available spectrum.
  • 29. • General packet radio service (GPRS) is a packet oriented mobile data service on the 2G and 3G cellular communication system's global system for mobile communications (GSM). GPRS usage is typically charged based on volume of data transferred, contrasting with circuit switched data, which is usually billed per minute of 1G and 2G charged based on volume of data transferred, contrasting with circuit switched data, which is usually billed per minute of connection time. • WLL(Wireless in Local Loop) : WLL is a system that connects subscribers to the public switched telephone network using radio signals as a substitute for other connecting media. • Email(Electronic Mail): Email is sending and receiving messages by computer. • Chat: Online textual talk in real time , is called Chatting. Internet Relay Chat (IRC) is a protocol for live interactive Internet text. • Video Conferencing: a two way videophone conversation among multiple participants is called video conferencing. The protocol used is Real-time Transport Protocol (RTP). • SMS(Short Message Service): SMS is the transmission of short text messages to and from a mobile pone, fax machine and or IP address.
  • 30. • 3G and EDGE: 3G is a specification for the third generation of mobile communication of mobile communication technology. 3G promises increased bandwidth, up to 384 Kbps when a device is stationary. • EDGE(Enhanced Data rates for Global Evolution ) is a radio based high speed mobile data standard. • SMTP: Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail) transmission across Internet Protocol (IP) networks. • POP3: the Post Office Protocol (POP) is an application-layer Internet standard protocol used by local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. • Voice over IP (voice over Internet Protocol, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP are IP telephony, Internet telephony, voice over broadband (VoBB), broadband telephony, IP communications, and broadband phone service.
  • 31. NETWORK SECURITY CONCEPTS • Worms: Worms are also self- replicating programs that do not create multiple copies of itself on one computer but propagate through the computer network. Worms log on to computer systems using the username and passwords and exploit the system. • Viruses are programs which replicate and attach to other programs in order to corrupt the executable codes. Virus enters the computer system through an external source and become destructive. • Trojan horse: - Though it is a useful program, however, a cracker can use it to intrude the computer system in order to exploit the resources. Such a program can also enter into the computer through an email or free programs downloaded through the Internet. • Spams: Unwanted e-mail (usually of a commercial nature sent out in bulk) • Cookies: Cookies are the text messages sent by a web server to the web browser primarily for identifying the user.
  • 32. • Firewall: A firewall is used to control the traffic between computer networks. It intercepts the packets between the computer networks and allows only authorized packets to pass. • Cyber Law: Cyber law refers to all the legal and regulatory aspects of Internet and the World Wide Web. Cyber Crimes: Cyber crime involves the usage of the computer system and the computer network for criminal activity. • Hacking: Hacking is an unauthorized access to computer in order to exploit the resources.
  • 33. WEB SERVICES • WWW: The World Wide Web or W3 or simply the Web is a collection of linked documents or pages, stored on millions of computers and distributed across the Internet. • HTML (Hyper Text Markup Language):- HTML is a computer language that describes the structure and behavior of a web page. This language is used to create web pages. • XML (eXtensible Markup Language):- Extensible Markup Language (XML) is a meta language that helps to describe the markup language. • HTTP (Hyper Text Transfer Protocol):- A protocol to transfer hypertext requests and information between servers and browsers. • Domain Names: A domain name is a unique name that identifies a particular website and represents the name of the server where the web pages reside. • URL:- The Uniform Resource Locator is a means to locate resources such as web pages on the Internet. URL is also a method to address the web pages on the Internet. There are two types of URL, namely, absolute URL and relative URL. • Website: A collection of related web pages stored on a web server is known as a website.
  • 34. • Web browser: A software application that enables to browse, search and collect information from the Web is known as Web browser. • Web Servers: The web pages on the Internet are stored on the computers that are connected to the Internet. These computers are known as web servers. • Web Hosting: - Web Hosting or website hosting is the service to host, store and maintain the websites on the World Wide Web. Web • Scripting: - The process of creating and embedding scripts in a web page is known as Web Scripting. • Types of Scripts:- • Client Side Scripts: - Client side scripts supports interaction within a webpage. E.g. VB Script, Java Script, PHP (PHP S Hypertext Preprocessor). • Server Side Scripts: - Server side scripting supports execution at server end. E.g. ASP, JSP, PHP
  • 35. WHERE THE FOLLOWING DEVICES BE PLACED ? • HUB / SWITCH:- In all the wings • REPEATER: It is used if the distances higher than 70 m. It regenerates data and voice signals. • ROUTER: When one LAN will be connected to the other LAN. • Server: Building having highest no. of PC or having a mean distance to all buildings.