SlideShare a Scribd company logo
1 of 20
Assignment
Of
Information technology
For
Management
SUBMITTEDTO:
Mr.sunildalhotra
SUBMITTEDBY:Navneetkaur
MBA-1
What is a computer network?
The telecommunication network that permits the computers to exchange the data is known as a
computer network or a data network. Furthermore, in computer networks, the networked
computing devices simply exchange the data with one another with the help of a data link.
Connections happen to be established between the nodes either by a wireless media or by a cable
media. Internet can be termed to be the best example for a computer network.
Generally, networks are distinguished based on their geographical span. A network can be as
small as distance between your mobile phone and its Bluetooth headphone and as large as the
internet itself, covering the whole geographical world,
Personal Area Network
A Personal Area Network (PAN) is smallest network which is very personal to a user. This may
include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up
to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled
headphones, wireless printers and TV remotes.
For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8
devices connected together in a master-slave fashion.
Local Area Network
A computer network spanned inside a building and operated under single administrative system
is generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices,
schools, colleges or universities. Number of systems connected in LAN may vary from as least
as two to as much as 16 million.
LAN provides a useful way of sharing the resources between end users.The resources such as
printers, file servers, scanners, and internet are easily sharable among computers.
LANs are composed of inexpensive networking and routing equipment. It may contains local
servers serving file storage and other locally shared applications. It mostly operates on private IP
addresses and does not involve heavy routing. LAN works under its own local domain and
controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN
technology and uses Star topology, while Token-ring is rarely seen.
LAN can be wired,wireless, or in both forms at once
.
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV
network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface
(FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand
their Local Area Networks. For example, MAN can help an organization to connect all of its
offices in a city.
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local
Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet
.
Wide Area Network
As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across
provinces and even a whole country. Generally, telecommunication networks are Wide Area
Network. These networks provide connectivity to MANs and LANs. Since they are equipped
with very high speed backbone, WANs use very expensive network equipment.
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame
Relay, and Synchronous Optical Network (SONET). WAN may be managed by multiple
administration.
Internetwork
A network of networks is called an internetwork, or simply the internet. It is the largest network
in existence on this planet.The internet hugely connects all WANs and it can have connection to
LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing
protocol. Present day, Internet is widely implemented using IPv4. Because of shortage of address
spaces, it is gradually migrating from IPv4 to IPv6.
Internet enables its users to share and access enormous amount of information worldwide. It uses
WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on
Client-Server model.
Internet uses very high speed backbone of fiber optics. To inter-connect various continents,
fibers are laid under sea known to us as submarine communication cable.
Internet is widely deployed on World Wide Web services using HTML linked pages and is
accessible by client software known as Web Browsers. When a user requests a page using some
web browser located on some Web Server anywhere in the world, the Web Server responds with
the proper HTML page. The communication delay is very low.
Internet is serving many proposes and is involved in many aspects of life. Some of them are:
ī‚ˇ Web sites
ī‚ˇ E-mail
ī‚ˇ Instant Messaging
ī‚ˇ Blogging
ī‚ˇ Social Media
ī‚ˇ Marketing
ī‚ˇ Networking
ī‚ˇ Resource Sharing
ī‚ˇ Audio and Video Streaming
ī‚ˇ Ethernet
ī‚ˇ Ethernet is a widely deployed LAN technology.This technology was invented by Bob
Metcalfe and D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980.
ī‚ˇ Ethernet shares media. Network which uses shared media has high probability of data
collision. Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD)
technology to detect collisions. On the occurrence of collision in Ethernet, all its hosts
roll back, wait for some random amount of time, and then re-transmit the data.
ī‚ˇ Ethernet connector is,network interface card equipped with 48-bits MAC address. This
helps other Ethernet devices to identify and communicate with remote devices in
Ethernet.
ī‚ˇ Traditional Ethernet uses 10BASE-T specifications.The number 10 depicts 10MBPS
speed, BASE stands for baseband, and T stands for Thick Ethernet. 10BASE-T Ethernet
provides transmission speed up to 10MBPS and uses coaxial cable or Cat-5 twisted pair
cable with RJ-45 connector. Ethernet follows star topology with segment length up to 100
meters. All devices are connected to a hub/switch in a star fashion.
ī‚ˇ Fast-Ethernet
ī‚ˇ To encompass need of fast emerging software and hardware technologies, Ethernet
extends itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It
can provide speed up to 100 MBPS. This standard is named as 100BASE-T in IEEE
803.2 using Cat-5 twisted pair cable. It uses CSMA/CD technique for wired media
sharing among the Ethernet hosts and CSMA/CA (CA stands for Collision Avoidance)
technique for wireless Ethernet LAN.
ī‚ˇ Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up
to 100 MBPS on fiber. Ethernet over fiber can be extended up to 100 meters in half-
duplex mode and can reach maximum of 2000 meters in full-duplex over multimode
fibers.
ī‚ˇ Giga-Ethernet
ī‚ˇ After being introduced in 1995, Fast-Ethernet could enjoy its high speed status only for 3
years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000
mbits/seconds. IEEE802.3ab standardize Giga-Ethernet over UTP using Cat-5, Cat-5e
and Cat-6 cables. IEEE802.3ah defines Giga-Ethernet over Fiber.
ī‚ˇ Virtual LAN
ī‚ˇ LAN uses Ethernet which in turn works on shared media. Shared media in Ethernet
create one single Broadcast domain and one single Collision domain. Introduction of
switches to Ethernet has removed single collision domain issue and each device
connected to switch works in its separate collision domain. But even Switches cannot
divide a network into separate Broadcast domains.
ī‚ˇ Virtual LAN is a solution to divide a single Broadcast domain into multiple Broadcast
domains. Host in one VLAN cannot speak to a host in another. By default, all hosts are
placed into the same VLAN.
ī‚ˇ
ī‚ˇ In this diagram, different VLANs are depicted in different color codes. Hosts in one
VLAN, even if connected on the same Switch cannot see or speak to other hosts in
different VLANs. VLAN is Layer-2 technology which works closely on Ethernet. To
route packets between two different VLANs a Layer-3 device such as Router is required.
A Network Topology is the arrangement with which computer systems or network devices are
connected to each other. Topologies may define both physical and logical aspect of the network.
Both logical and physical topologies could be same or different in a same network.
Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers
connected back to back using a single piece of cable. Often, the receiving end of one host is
connected to sending end of the other and vice-versa.
If the hosts are connected point-to-point logically, then may have multiple intermediate devices.
But the end hosts are unaware of underlying network and see each other as if they are connected
directly.
Bus Topology
In case of Bus topology, all devices share single communication line or cable.Bus topology may
have problem while multiple hosts sending data at the same time. Therefore, Bus topology either
uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of
the simple forms of networking where a failure of a device does not affect the other devices. But
failure of the shared communication line can make all other devices stop functioning.
Both ends of the shared channel have line terminator. The data is sent in only one direction and
as soon as it reaches the extreme end, the terminator removes the data from the line.
Star Topology
All hosts in Star topology are connected to a central device, known as hub device, using a point-
to-point connection. That is, there exists a point to point connection between hosts and hub. The
hub device can be any of the following:
ī‚ˇ Layer-1 device such as hub or repeater
ī‚ˇ Layer-2 device such as switch or bridge
ī‚ˇ Layer-3 device such as router or gateway
As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all
other hosts fails. Every communication between hosts, takes place through only the hub.Star
topology is not expensive as to connect one more host, only one cable is required and
configuration is simple
.
Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating a circular
network structure. When one host tries to communicate or send message to a host which is not
adjacent to it, the data travels through all intermediate hosts. To connect one more host in the
existing structure, the administrator may need only one more extra cable.
Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a
point of failure. There are methods which employ one more backup ring.
Mesh Topology
In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-
point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to-
point links. Mesh technology comes into two types:
ī‚ˇ Full Mesh: All hosts have a point-to-point connection to every other host in the network.
Thus for every new host n(n-1)/2 connections are required. It provides the most reliable
network structure among all network topologies.
ī‚ˇ Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts
connect to each other in some arbitrarily fashion. This topology exists where we need to
provide reliability to some hosts out of all.
Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently.This topology imitates as extended Star topology and inherits properties of bus
topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer where
computers are attached. The middle layer is known as distribution layer, which works as
mediator between upper layer and lower layer. The highest layer is known as core layer, and is
central point of the network, i.e. root of the tree from which all nodes fork.
All neighboring hosts have point-to-point connection between them.Similar to the Bus topology,
if the root goes down, then the entire network suffers even.though it is not the single point of
failure. Every connection serves as point of failure, failing of which divides the network into
unreachable segment.
Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts.Means, if the end hosts in daisy chain are
connected then it represents Ring topology.
Each link in daisy chain topology represents single point of failure. Every link failure splits the
network into two segments.Every intermediate host works as relay for its immediate hosts.
Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid topology.
Hybrid topology inherits merits and demerits of all the incorporating topologies.
The above picture represents an arbitrarily hybrid topology. The combining topologies may
contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by
means of Dual-Ring topology and networks connected to them are mostly Star topology
networks. Internet is the best example of largest Hybrid topology
What are the number systems?
When we type some letters or words, the computer translates them in numbers as computers
can understand only numbers. A computer can understand positional number system where there
are only a few symbols called digits and these symbols represent different values depending on
the position they occupy in the number.
A value of each digit in a number can be determined using
ī‚ˇ The digit
ī‚ˇ The position of the digit in the number
ī‚ˇ The base of the number system (where base is defined as the total number of digits
available in the number system).
Decimal Number System
The number system that we use in our day-to-day life is the decimal number system. Decimal
number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the
successive positions to the left of the decimal point represent units, tens, hundreds, thousands
and so on.
Each position represents a specific power of the base (10). For example, the decimal number
1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position,
and 1 in the thousands position, and its value can be written as
(1x1000)+ (2x100)+ (3x10)+ (4xl)
(1x103)+ (2x102)+ (3x101)+ (4xl00)
1000 + 200 + 30 + 4
1234
As a computer programmer or an IT professional, you should understand the following number
systems which are frequently used in computers.
S.N. Number System and Description
1
Binary Number System
Base 2. Digits used : 0, 1
2
Octal Number System
Base 8. Digits used : 0 to 7
3
Hexa Decimal Number System
Base 16. Digits used : 0 to 9, Letters used : A- F
Binary Number System
Characteristics of binary number system are as follows:
ī‚ˇ Uses two digits, 0 and 1.
ī‚ˇ Also called base 2 number system
ī‚ˇ Each position in a binary number represents a 0 power of the base (2). Example 20
ī‚ˇ Last position in a binary number represents a x power of the base (2). Example 2x where
x represents the last position - 1.
Example
Binary Number : 101012
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1 101012 ((1 x 24
) + (0 x 23
) + (1 x 22
) + (0 x 21
) + (1 x 20
))10
Step 2 101012 (16 + 0 + 4 + 0 + 1)10
Step 3 101012 2110
Note : 101012 is normally written as 10101.
Octal Number System
Characteristics of octal number system are as follows:
ī‚ˇ Uses eight digits, 0,1,2,3,4,5,6,7.
ī‚ˇ Also called base 8 number system
ī‚ˇ Each position in an octal number represents a 0 power of the base (8). Example 80
ī‚ˇ Last position in an octal number represents a x power of the base (8). Example 8x where x
represents the last position - 1.
Example
Octal Number : 125708
Calculating Decimal Equivalent:
Step Octal Number Decimal Number
Step 1 125708 ((1 x 84
) + (2 x 83
) + (5 x 82
) + (7 x 81
) + (0 x 80
))10
Step 2 125708 (4096 + 1024 + 320 + 56 + 0)10
Step 3 125708 549610
Note : 125708 is normally written as 12570.
Hexadecimal Number System
Characteristics of hexadecimal number system are as follows:
ī‚ˇ Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F.
ī‚ˇ Letters represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F =
15.
ī‚ˇ Also called base 16 number system
ī‚ˇ Each position in a hexadecimal number represents a 0 power of the base (16). Example
160
ī‚ˇ Last position in a hexadecimal number represents a x power of the base (16). Example
16x where x represents the last position - 1.
Example
Hexadecimal Number : 19FDE16
Calculating Decimal Equivalent:
Step Binary Number Decimal Number
Step 1 19FDE16 ((1 x 164
) + (9 x 163
) + (F x 162
) + (D x 161
) + (E x 160
))10
Step 2 19FDE16 ((1 x 164
) + (9 x 163
) + (15 x 162
) + (13 x 161
) + (14 x 160
))10
Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10
Step 4 19FDE16 10646210
Note : 19FDE16 is normally written as 19FDE.
What is the diffence between system software and application
software?
Application software is computer software designed to help the user to perform specific tasks.
System software is computer software designed to operate the computer hardware and to
provide a platform for running application software. System Software Create his own
environment to run itself and run other application
As you already know, all computers require software in order to operate and perform basic tasks.
For instance, software is needed to translate your commands into a form the computer can
understand, to open and close other software programs, to manage your stored files, and to locate
and set up new hardware as it is added to a computer. The type of software used to perform these
tasks is system software—the focus of this chapter. System software runs in the background at
all times, launching other software when needed and making it possible for you to use your
computer.
Computers run two types of software: system software and application software.
➤ System software consists of the operating system and utility programs that control a
computer system and allow you to use your computer. These programs enable the computer to
boot, to launch application programs, and to facilitate important jobs, such as transferring files
from one storage medium to another, configuring your computer to work with the hardware
connected to it, managing files on your hard drive, and protecting your computer system from
unauthorized use.
➤ Application software includes all the programs that allow you to perform specific tasks on
your computer, such as writing a letter, preparing an invoice, viewing a Web page, listening to a
music file, checking the inventory of a particular product, playing a game, preparing financial
statements, designing a home, and so forth.
In practice, the difference between system and application software is not always
straightforward. Some programs, such as those used to burn DVDs, were originally viewed as
utility programs. Today, these programs typically contain a variety of additional features, such as
the ability to organize and play music and other media files, transfer videos and digital photos to
a computer, edit videos and photos, create DVD movies, copy CDs and DVDs, and create slide
shows. Consequently, these programs now fit the definition of application programs more
closely. On the other hand, system software today typically contains several application software
components. For example, the Microsoft Windows operating system includes a variety of
application programs including a Web browser, a calculator, a calendar program, a painting
program, a media player, a movie making program, an instant messaging program, and a text
editing program. A program’s classification as system or application software usually depends
on the principal function of the program, and the distinction between the two categories is not
always clear cut.
7 layers of TCP/IP protocol
The Open System Interconnection (OSI) model defines a networking framework to
implement protocols in seven layers. Use this handy guide to compare the different layers
of the OSI model and understand how they interact with each other.
The Open System Interconnection (OSI) model defines a networking framework to implement
protocols in seven layers. In the OSI model, control is passed from one layer to the next, starting
at the application layer in one station, and proceeding to the bottom layer, over the channel to the
next station and back up the hierarchy.
The OSI Model is Not Tangible
There is really nothing to the OSI model. In fact, it's not even tangible. The OSI model doesn't
perform any functions in the networking process. It is a conceptual framework so we can better
understand complex interactions that are happening.
The OSI Model Layers
The OSI model takes the task of internetworking and divides that up into what is referred to as a
vertical stack that consists of the following 7 layers:
Physical (Layer 1)
OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through
the network at the electrical and mechanical level. It provides the hardware means of sending and
receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet,
RS232, and ATM are protocols with physical layer components.
Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45.
Data Link (Layer 2)
At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission
protocol knowledge and management and handles errors in the physical layer, flow control and
frame synchronization. The data link layer is divided into two sub layers: The Media Access
Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls
how a computer on the network gains access to the data and permission to transmit it. The LLC
layer controls frame synchronization, flow control and error checking.
Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2,
HDLC, Frame Relay.
Network (Layer 3)
Layer 3 provides switching and routing technologies, creating logical paths, known as virtual
circuits, for transmitting data from node to node. Routing and forwarding are functions of this
layer, as well as addressing, internetworking, error handling, congestion control and packet
sequencing.
Layer 3 Network examples include AppleTalk DDP, IP, IPX.
Transport (Layer 4)
OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is
responsible for end-to-end error recovery and flow control. It ensures complete data transfer.
Layer 4 Transport examples include SPX, TCP, UDP.
Session (Layer 5)
This layer establishes, manages and terminates connections between applications. The session
layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the
applications at each end. It deals with session and connection coordination.
Layer 5 Session examples include NFS, NetBios names, RPC, SQL.
Presentation (Layer 6)
This layer provides independence from differences in data representation (e.g., encryption) by
translating from application to network format, and vice versa. The presentation layer works to
transform data into the form that the application layer can accept. This layer formats and
encrypts data to be sent across a network, providing freedom from compatibility problems. It is
sometimes called the syntax layer.
Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG,
MPEG, MIDI.
Application (Layer 7)
OSI Model, Layer 7, supports application and end-user processes. Communication partners are
identified, quality of service is identified, user authentication and privacy are considered, and any
constraints on data syntax are identified. Everything at this layer is application-specific. This
layer provides application services for file transfers, e-mail, and other network software services.
Telnet and FTP are applications that exist entirely in the application level. Tiered application
architectures are part of this layer. Layer 7 Application examples include WWW browsers,
NFS, SNMP, Telnet, HTTP, FTP
Thankyouâ€Ļ..

More Related Content

What's hot

Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamentalSatish Sehrawat
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networkingRozitarmizi Mohammad
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
8 network devices
8 network devices8 network devices
8 network devicesJaleto Sunkemo
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and routerAkmal Cikmat
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)Diwakar Singh
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKINGKiran Buriro
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And SoftwareSteven Cahill
 
Data communication notes
Data communication notesData communication notes
Data communication notesMd. Faruk Hossain
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Prof. Maulik Trivedi
 
Concept of networking
Concept of networkingConcept of networking
Concept of networkingsumit dimri
 
Lan basic
Lan basicLan basic
Lan basicOnline
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06kchanaka3
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copyJaleto Sunkemo
 
What is networking
What is networkingWhat is networking
What is networkingbabyparul
 

What's hot (20)

Networking basic fundamental
Networking basic fundamentalNetworking basic fundamental
Networking basic fundamental
 
1 introduction-to-computer-networking
1 introduction-to-computer-networking1 introduction-to-computer-networking
1 introduction-to-computer-networking
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
8 network devices
8 network devices8 network devices
8 network devices
 
difference between hub, bridge, switch and router
difference between hub, bridge, switch and routerdifference between hub, bridge, switch and router
difference between hub, bridge, switch and router
 
Local area network (1)
Local area network (1)Local area network (1)
Local area network (1)
 
Protocol & Type of Networks
Protocol & Type of NetworksProtocol & Type of Networks
Protocol & Type of Networks
 
COMPUTER NETWORKING
COMPUTER NETWORKINGCOMPUTER NETWORKING
COMPUTER NETWORKING
 
Network Hardware And Software
Network Hardware And SoftwareNetwork Hardware And Software
Network Hardware And Software
 
Data communication notes
Data communication notesData communication notes
Data communication notes
 
Advance Networking Course Details PPT
Advance Networking Course Details PPTAdvance Networking Course Details PPT
Advance Networking Course Details PPT
 
Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester Computer Networks | Unit-1 | GTU | 4th Semester
Computer Networks | Unit-1 | GTU | 4th Semester
 
Networks
NetworksNetworks
Networks
 
Concept of networking
Concept of networkingConcept of networking
Concept of networking
 
Ccna
CcnaCcna
Ccna
 
Lan basic
Lan basicLan basic
Lan basic
 
E business 2014 l06
E business 2014 l06E business 2014 l06
E business 2014 l06
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 
Determine best fit topology copy
Determine best fit topology   copyDetermine best fit topology   copy
Determine best fit topology copy
 
What is networking
What is networkingWhat is networking
What is networking
 

Viewers also liked

Plastic money
Plastic moneyPlastic money
Plastic moneyNavneet kaur
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftCTIN
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level OneCTIN
 
information technology
information technologyinformation technology
information technologyNavneet kaur
 
marketing management
marketing managementmarketing management
marketing managementNavneet kaur
 
Plastic money
Plastic moneyPlastic money
Plastic moneyNavneet kaur
 
HR Policies at WalMart
HR Policies at WalMartHR Policies at WalMart
HR Policies at WalMartKashyap Shah
 
Presentation on hr practices in tata motors
Presentation on hr practices in tata motorsPresentation on hr practices in tata motors
Presentation on hr practices in tata motorsVicky Ramakrishnan
 
Hr practices of google
Hr practices of googleHr practices of google
Hr practices of googlekuljinder kaur
 
Human Resource Management (in TATA Motors)
Human Resource Management (in TATA Motors)Human Resource Management (in TATA Motors)
Human Resource Management (in TATA Motors)Urmilesh Tiwari
 
Human resource management
Human resource managementHuman resource management
Human resource managementNavneet kaur
 
Google's HR Policies & Practices
Google's HR Policies & PracticesGoogle's HR Policies & Practices
Google's HR Policies & PracticesRahul Senapati
 

Viewers also liked (18)

Plastic money
Plastic moneyPlastic money
Plastic money
 
Obsessive compulsive disorder
Obsessive compulsive disorderObsessive compulsive disorder
Obsessive compulsive disorder
 
Evidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version DraftEvidence Seizure Ctin Version Draft
Evidence Seizure Ctin Version Draft
 
Designation Letter- Annur-signature
Designation Letter- Annur-signatureDesignation Letter- Annur-signature
Designation Letter- Annur-signature
 
oficina plano de manejo
oficina plano de manejooficina plano de manejo
oficina plano de manejo
 
4Âē eso .ppt 1
4Âē eso .ppt 14Âē eso .ppt 1
4Âē eso .ppt 1
 
Evidence Seizure Level One
Evidence Seizure Level OneEvidence Seizure Level One
Evidence Seizure Level One
 
2 pk 05b
2 pk 05b2 pk 05b
2 pk 05b
 
information technology
information technologyinformation technology
information technology
 
marketing management
marketing managementmarketing management
marketing management
 
Plastic money
Plastic moneyPlastic money
Plastic money
 
HR Policies at WalMart
HR Policies at WalMartHR Policies at WalMart
HR Policies at WalMart
 
Presentation on hr practices in tata motors
Presentation on hr practices in tata motorsPresentation on hr practices in tata motors
Presentation on hr practices in tata motors
 
Hr practices of google
Hr practices of googleHr practices of google
Hr practices of google
 
Human Resource Management (in TATA Motors)
Human Resource Management (in TATA Motors)Human Resource Management (in TATA Motors)
Human Resource Management (in TATA Motors)
 
Google - HR Policies
Google - HR PoliciesGoogle - HR Policies
Google - HR Policies
 
Human resource management
Human resource managementHuman resource management
Human resource management
 
Google's HR Policies & Practices
Google's HR Policies & PracticesGoogle's HR Policies & Practices
Google's HR Policies & Practices
 

Similar to information technology

Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1VISHNU N
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiSilicon Univ
 
The place for free online training courses -networking
The place for free online training courses -networkingThe place for free online training courses -networking
The place for free online training courses -networkingDavil Israely
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005 ramloganricki
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Soumen Santra
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12LakshyaT
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxssuser86699a
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareokelloerick
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devicesNumaan Tole
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.pptSarthak665910
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers3Anetwork com
 
itpresentation-160222172239.pdf
itpresentation-160222172239.pdfitpresentation-160222172239.pdf
itpresentation-160222172239.pdfIbrahimRashidBayoh
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentationKrishi Agrawal
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 
Infiniband and Ethernet
Infiniband and EthernetInfiniband and Ethernet
Infiniband and EthernetFarkhanda Kiran
 

Similar to information technology (20)

Network ppt
Network pptNetwork ppt
Network ppt
 
Lan
LanLan
Lan
 
CCNA ppt Day 1
CCNA ppt Day 1CCNA ppt Day 1
CCNA ppt Day 1
 
How to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in DelhiHow to get Hardware and Networking jobs in Delhi
How to get Hardware and Networking jobs in Delhi
 
The place for free online training courses -networking
The place for free online training courses -networkingThe place for free online training courses -networking
The place for free online training courses -networking
 
Network plus study guide N10-005
Network plus study guide N10-005 Network plus study guide N10-005
Network plus study guide N10-005
 
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
Basic networking hardware: Switch : Router : Hub : Bridge : Gateway : Bus : C...
 
Computer networking class 12
Computer networking class 12Computer networking class 12
Computer networking class 12
 
Computer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptxComputer-Networks--Networking_Hardware.pptx
Computer-Networks--Networking_Hardware.pptx
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Network connectivity devices
Network connectivity devicesNetwork connectivity devices
Network connectivity devices
 
Computer_Network_Basic.ppt
Computer_Network_Basic.pptComputer_Network_Basic.ppt
Computer_Network_Basic.ppt
 
Hubs vs switches vs routers
Hubs vs switches vs routersHubs vs switches vs routers
Hubs vs switches vs routers
 
itpresentation-160222172239.pdf
itpresentation-160222172239.pdfitpresentation-160222172239.pdf
itpresentation-160222172239.pdf
 
computer networks presentation
computer networks presentationcomputer networks presentation
computer networks presentation
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
5 Lan
5 Lan5 Lan
5 Lan
 
Computer Networks
Computer NetworksComputer Networks
Computer Networks
 
Infiniband and Ethernet
Infiniband and EthernetInfiniband and Ethernet
Infiniband and Ethernet
 

Recently uploaded

Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)Dr. Mazin Mohamed alkathiri
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 

Recently uploaded (20)

Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

information technology

  • 3. MBA-1 What is a computer network? The telecommunication network that permits the computers to exchange the data is known as a computer network or a data network. Furthermore, in computer networks, the networked computing devices simply exchange the data with one another with the help of a data link. Connections happen to be established between the nodes either by a wireless media or by a cable media. Internet can be termed to be the best example for a computer network. Generally, networks are distinguished based on their geographical span. A network can be as small as distance between your mobile phone and its Bluetooth headphone and as large as the internet itself, covering the whole geographical world, Personal Area Network A Personal Area Network (PAN) is smallest network which is very personal to a user. This may include Bluetooth enabled devices or infra-red enabled devices. PAN has connectivity range up to 10 meters. PAN may include wireless computer keyboard and mouse, Bluetooth enabled headphones, wireless printers and TV remotes.
  • 4. For example, Piconet is Bluetooth-enabled Personal Area Network which may contain up to 8 devices connected together in a master-slave fashion. Local Area Network A computer network spanned inside a building and operated under single administrative system is generally termed as Local Area Network (LAN). Usually,LAN covers an organization’ offices, schools, colleges or universities. Number of systems connected in LAN may vary from as least as two to as much as 16 million. LAN provides a useful way of sharing the resources between end users.The resources such as printers, file servers, scanners, and internet are easily sharable among computers. LANs are composed of inexpensive networking and routing equipment. It may contains local servers serving file storage and other locally shared applications. It mostly operates on private IP addresses and does not involve heavy routing. LAN works under its own local domain and controlled centrally. LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed LAN technology and uses Star topology, while Token-ring is rarely seen. LAN can be wired,wireless, or in both forms at once
  • 5. . Metropolitan Area Network The Metropolitan Area Network (MAN) generally expands throughout a city such as cable TV network. It can be in the form of Ethernet,Token-ring, ATM, or Fiber Distributed Data Interface (FDDI). Metro Ethernet is a service which is provided by ISPs. This service enables its users to expand their Local Area Networks. For example, MAN can help an organization to connect all of its offices in a city. Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between Local Area Network and Wide Area Network. MAN provides uplink for LANs to WANs or internet .
  • 6. Wide Area Network As the name suggests,the Wide Area Network (WAN) covers a wide area which may span across provinces and even a whole country. Generally, telecommunication networks are Wide Area Network. These networks provide connectivity to MANs and LANs. Since they are equipped with very high speed backbone, WANs use very expensive network equipment. WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM), Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed by multiple administration. Internetwork A network of networks is called an internetwork, or simply the internet. It is the largest network in existence on this planet.The internet hugely connects all WANs and it can have connection to LANs and Home networks. Internet uses TCP/IP protocol suite and uses IP as its addressing protocol. Present day, Internet is widely implemented using IPv4. Because of shortage of address spaces, it is gradually migrating from IPv4 to IPv6. Internet enables its users to share and access enormous amount of information worldwide. It uses WWW, FTP, email services, audio and video streaming etc. At huge level, internet works on Client-Server model. Internet uses very high speed backbone of fiber optics. To inter-connect various continents, fibers are laid under sea known to us as submarine communication cable. Internet is widely deployed on World Wide Web services using HTML linked pages and is accessible by client software known as Web Browsers. When a user requests a page using some
  • 7. web browser located on some Web Server anywhere in the world, the Web Server responds with the proper HTML page. The communication delay is very low. Internet is serving many proposes and is involved in many aspects of life. Some of them are: ī‚ˇ Web sites ī‚ˇ E-mail ī‚ˇ Instant Messaging ī‚ˇ Blogging ī‚ˇ Social Media ī‚ˇ Marketing ī‚ˇ Networking ī‚ˇ Resource Sharing ī‚ˇ Audio and Video Streaming ī‚ˇ Ethernet ī‚ˇ Ethernet is a widely deployed LAN technology.This technology was invented by Bob Metcalfe and D.R. Boggs in the year 1970. It was standardized in IEEE 802.3 in 1980. ī‚ˇ Ethernet shares media. Network which uses shared media has high probability of data collision. Ethernet uses Carrier Sense Multi Access/Collision Detection (CSMA/CD) technology to detect collisions. On the occurrence of collision in Ethernet, all its hosts roll back, wait for some random amount of time, and then re-transmit the data. ī‚ˇ Ethernet connector is,network interface card equipped with 48-bits MAC address. This helps other Ethernet devices to identify and communicate with remote devices in Ethernet. ī‚ˇ Traditional Ethernet uses 10BASE-T specifications.The number 10 depicts 10MBPS speed, BASE stands for baseband, and T stands for Thick Ethernet. 10BASE-T Ethernet provides transmission speed up to 10MBPS and uses coaxial cable or Cat-5 twisted pair cable with RJ-45 connector. Ethernet follows star topology with segment length up to 100 meters. All devices are connected to a hub/switch in a star fashion. ī‚ˇ Fast-Ethernet ī‚ˇ To encompass need of fast emerging software and hardware technologies, Ethernet extends itself as Fast-Ethernet. It can run on UTP, Optical Fiber, and wirelessly too. It can provide speed up to 100 MBPS. This standard is named as 100BASE-T in IEEE 803.2 using Cat-5 twisted pair cable. It uses CSMA/CD technique for wired media sharing among the Ethernet hosts and CSMA/CA (CA stands for Collision Avoidance) technique for wireless Ethernet LAN. ī‚ˇ Fast Ethernet on fiber is defined under 100BASE-FX standard which provides speed up to 100 MBPS on fiber. Ethernet over fiber can be extended up to 100 meters in half- duplex mode and can reach maximum of 2000 meters in full-duplex over multimode fibers. ī‚ˇ Giga-Ethernet ī‚ˇ After being introduced in 1995, Fast-Ethernet could enjoy its high speed status only for 3 years till Giga-Ethernet introduced. Giga-Ethernet provides speed up to 1000 mbits/seconds. IEEE802.3ab standardize Giga-Ethernet over UTP using Cat-5, Cat-5e and Cat-6 cables. IEEE802.3ah defines Giga-Ethernet over Fiber.
  • 8. ī‚ˇ Virtual LAN ī‚ˇ LAN uses Ethernet which in turn works on shared media. Shared media in Ethernet create one single Broadcast domain and one single Collision domain. Introduction of switches to Ethernet has removed single collision domain issue and each device connected to switch works in its separate collision domain. But even Switches cannot divide a network into separate Broadcast domains. ī‚ˇ Virtual LAN is a solution to divide a single Broadcast domain into multiple Broadcast domains. Host in one VLAN cannot speak to a host in another. By default, all hosts are placed into the same VLAN. ī‚ˇ ī‚ˇ In this diagram, different VLANs are depicted in different color codes. Hosts in one VLAN, even if connected on the same Switch cannot see or speak to other hosts in different VLANs. VLAN is Layer-2 technology which works closely on Ethernet. To route packets between two different VLANs a Layer-3 device such as Router is required. A Network Topology is the arrangement with which computer systems or network devices are connected to each other. Topologies may define both physical and logical aspect of the network. Both logical and physical topologies could be same or different in a same network. Point-to-Point Point-to-point networks contains exactly two hosts such as computer, switches or routers, servers connected back to back using a single piece of cable. Often, the receiving end of one host is connected to sending end of the other and vice-versa. If the hosts are connected point-to-point logically, then may have multiple intermediate devices. But the end hosts are unaware of underlying network and see each other as if they are connected directly. Bus Topology In case of Bus topology, all devices share single communication line or cable.Bus topology may have problem while multiple hosts sending data at the same time. Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as Bus Master to solve the issue. It is one of the simple forms of networking where a failure of a device does not affect the other devices. But failure of the shared communication line can make all other devices stop functioning.
  • 9. Both ends of the shared channel have line terminator. The data is sent in only one direction and as soon as it reaches the extreme end, the terminator removes the data from the line. Star Topology All hosts in Star topology are connected to a central device, known as hub device, using a point- to-point connection. That is, there exists a point to point connection between hosts and hub. The hub device can be any of the following: ī‚ˇ Layer-1 device such as hub or repeater ī‚ˇ Layer-2 device such as switch or bridge ī‚ˇ Layer-3 device such as router or gateway As in Bus topology, hub acts as single point of failure. If hub fails, connectivity of all hosts to all other hosts fails. Every communication between hosts, takes place through only the hub.Star topology is not expensive as to connect one more host, only one cable is required and configuration is simple .
  • 10. Ring Topology In ring topology, each host machine connects to exactly two other machines, creating a circular network structure. When one host tries to communicate or send message to a host which is not adjacent to it, the data travels through all intermediate hosts. To connect one more host in the existing structure, the administrator may need only one more extra cable. Failure of any host results in failure of the whole ring.Thus, every connection in the ring is a point of failure. There are methods which employ one more backup ring. Mesh Topology In this type of topology, a host is connected to one or multiple hosts.This topology has hosts in point-to-point connection with every other host or may also have hosts which are in point-to- point connection to few hosts only. Hosts in Mesh topology also work as relay for other hosts which do not have direct point-to- point links. Mesh technology comes into two types: ī‚ˇ Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus for every new host n(n-1)/2 connections are required. It provides the most reliable network structure among all network topologies. ī‚ˇ Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect to each other in some arbitrarily fashion. This topology exists where we need to provide reliability to some hosts out of all.
  • 11. Tree Topology Also known as Hierarchical Topology, this is the most common form of network topology in use presently.This topology imitates as extended Star topology and inherits properties of bus topology. This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a network is bifurcated into three types of network devices. The lowermost is access-layer where computers are attached. The middle layer is known as distribution layer, which works as mediator between upper layer and lower layer. The highest layer is known as core layer, and is central point of the network, i.e. root of the tree from which all nodes fork. All neighboring hosts have point-to-point connection between them.Similar to the Bus topology, if the root goes down, then the entire network suffers even.though it is not the single point of failure. Every connection serves as point of failure, failing of which divides the network into unreachable segment.
  • 12. Daisy Chain This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are connected to two hosts only, except the end hosts.Means, if the end hosts in daisy chain are connected then it represents Ring topology. Each link in daisy chain topology represents single point of failure. Every link failure splits the network into two segments.Every intermediate host works as relay for its immediate hosts. Hybrid Topology A network structure whose design contains more than one topology is said to be hybrid topology. Hybrid topology inherits merits and demerits of all the incorporating topologies. The above picture represents an arbitrarily hybrid topology. The combining topologies may contain attributes of Star, Ring, Bus, and Daisy-chain topologies. Most WANs are connected by means of Dual-Ring topology and networks connected to them are mostly Star topology networks. Internet is the best example of largest Hybrid topology
  • 13. What are the number systems? When we type some letters or words, the computer translates them in numbers as computers can understand only numbers. A computer can understand positional number system where there are only a few symbols called digits and these symbols represent different values depending on the position they occupy in the number. A value of each digit in a number can be determined using ī‚ˇ The digit ī‚ˇ The position of the digit in the number ī‚ˇ The base of the number system (where base is defined as the total number of digits available in the number system). Decimal Number System The number system that we use in our day-to-day life is the decimal number system. Decimal number system has base 10 as it uses 10 digits from 0 to 9. In decimal number system, the successive positions to the left of the decimal point represent units, tens, hundreds, thousands and so on. Each position represents a specific power of the base (10). For example, the decimal number 1234 consists of the digit 4 in the units position, 3 in the tens position, 2 in the hundreds position, and 1 in the thousands position, and its value can be written as (1x1000)+ (2x100)+ (3x10)+ (4xl) (1x103)+ (2x102)+ (3x101)+ (4xl00)
  • 14. 1000 + 200 + 30 + 4 1234 As a computer programmer or an IT professional, you should understand the following number systems which are frequently used in computers. S.N. Number System and Description 1 Binary Number System Base 2. Digits used : 0, 1 2 Octal Number System Base 8. Digits used : 0 to 7 3 Hexa Decimal Number System Base 16. Digits used : 0 to 9, Letters used : A- F Binary Number System Characteristics of binary number system are as follows: ī‚ˇ Uses two digits, 0 and 1. ī‚ˇ Also called base 2 number system ī‚ˇ Each position in a binary number represents a 0 power of the base (2). Example 20 ī‚ˇ Last position in a binary number represents a x power of the base (2). Example 2x where x represents the last position - 1. Example Binary Number : 101012 Calculating Decimal Equivalent: Step Binary Number Decimal Number Step 1 101012 ((1 x 24 ) + (0 x 23 ) + (1 x 22 ) + (0 x 21 ) + (1 x 20 ))10 Step 2 101012 (16 + 0 + 4 + 0 + 1)10 Step 3 101012 2110 Note : 101012 is normally written as 10101.
  • 15. Octal Number System Characteristics of octal number system are as follows: ī‚ˇ Uses eight digits, 0,1,2,3,4,5,6,7. ī‚ˇ Also called base 8 number system ī‚ˇ Each position in an octal number represents a 0 power of the base (8). Example 80 ī‚ˇ Last position in an octal number represents a x power of the base (8). Example 8x where x represents the last position - 1. Example Octal Number : 125708 Calculating Decimal Equivalent: Step Octal Number Decimal Number Step 1 125708 ((1 x 84 ) + (2 x 83 ) + (5 x 82 ) + (7 x 81 ) + (0 x 80 ))10 Step 2 125708 (4096 + 1024 + 320 + 56 + 0)10 Step 3 125708 549610 Note : 125708 is normally written as 12570. Hexadecimal Number System Characteristics of hexadecimal number system are as follows: ī‚ˇ Uses 10 digits and 6 letters, 0,1,2,3,4,5,6,7,8,9,A,B,C,D,E,F. ī‚ˇ Letters represents numbers starting from 10. A = 10. B = 11, C = 12, D = 13, E = 14, F = 15. ī‚ˇ Also called base 16 number system ī‚ˇ Each position in a hexadecimal number represents a 0 power of the base (16). Example 160 ī‚ˇ Last position in a hexadecimal number represents a x power of the base (16). Example 16x where x represents the last position - 1. Example Hexadecimal Number : 19FDE16 Calculating Decimal Equivalent:
  • 16. Step Binary Number Decimal Number Step 1 19FDE16 ((1 x 164 ) + (9 x 163 ) + (F x 162 ) + (D x 161 ) + (E x 160 ))10 Step 2 19FDE16 ((1 x 164 ) + (9 x 163 ) + (15 x 162 ) + (13 x 161 ) + (14 x 160 ))10 Step 3 19FDE16 (65536+ 36864 + 3840 + 208 + 14)10 Step 4 19FDE16 10646210 Note : 19FDE16 is normally written as 19FDE. What is the diffence between system software and application software? Application software is computer software designed to help the user to perform specific tasks. System software is computer software designed to operate the computer hardware and to provide a platform for running application software. System Software Create his own environment to run itself and run other application As you already know, all computers require software in order to operate and perform basic tasks. For instance, software is needed to translate your commands into a form the computer can understand, to open and close other software programs, to manage your stored files, and to locate and set up new hardware as it is added to a computer. The type of software used to perform these tasks is system software—the focus of this chapter. System software runs in the background at all times, launching other software when needed and making it possible for you to use your computer. Computers run two types of software: system software and application software. ➤ System software consists of the operating system and utility programs that control a computer system and allow you to use your computer. These programs enable the computer to boot, to launch application programs, and to facilitate important jobs, such as transferring files from one storage medium to another, configuring your computer to work with the hardware connected to it, managing files on your hard drive, and protecting your computer system from unauthorized use. ➤ Application software includes all the programs that allow you to perform specific tasks on your computer, such as writing a letter, preparing an invoice, viewing a Web page, listening to a
  • 17. music file, checking the inventory of a particular product, playing a game, preparing financial statements, designing a home, and so forth. In practice, the difference between system and application software is not always straightforward. Some programs, such as those used to burn DVDs, were originally viewed as utility programs. Today, these programs typically contain a variety of additional features, such as the ability to organize and play music and other media files, transfer videos and digital photos to a computer, edit videos and photos, create DVD movies, copy CDs and DVDs, and create slide shows. Consequently, these programs now fit the definition of application programs more closely. On the other hand, system software today typically contains several application software components. For example, the Microsoft Windows operating system includes a variety of application programs including a Web browser, a calculator, a calendar program, a painting program, a media player, a movie making program, an instant messaging program, and a text editing program. A program’s classification as system or application software usually depends on the principal function of the program, and the distinction between the two categories is not always clear cut. 7 layers of TCP/IP protocol The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. Use this handy guide to compare the different layers of the OSI model and understand how they interact with each other. The Open System Interconnection (OSI) model defines a networking framework to implement protocols in seven layers. In the OSI model, control is passed from one layer to the next, starting at the application layer in one station, and proceeding to the bottom layer, over the channel to the next station and back up the hierarchy.
  • 18. The OSI Model is Not Tangible There is really nothing to the OSI model. In fact, it's not even tangible. The OSI model doesn't perform any functions in the networking process. It is a conceptual framework so we can better understand complex interactions that are happening. The OSI Model Layers The OSI model takes the task of internetworking and divides that up into what is referred to as a vertical stack that consists of the following 7 layers: Physical (Layer 1) OSI Model, Layer 1 conveys the bit stream - electrical impulse, light or radio signal — through the network at the electrical and mechanical level. It provides the hardware means of sending and receiving data on a carrier, including defining cables, cards and physical aspects. Fast Ethernet, RS232, and ATM are protocols with physical layer components. Layer 1 Physical examples include Ethernet, FDDI, B8ZS, V.35, V.24, RJ45. Data Link (Layer 2)
  • 19. At OSI Model, Layer 2, data packets are encoded and decoded into bits. It furnishes transmission protocol knowledge and management and handles errors in the physical layer, flow control and frame synchronization. The data link layer is divided into two sub layers: The Media Access Control (MAC) layer and the Logical Link Control (LLC) layer. The MAC sub layer controls how a computer on the network gains access to the data and permission to transmit it. The LLC layer controls frame synchronization, flow control and error checking. Layer 2 Data Link examples include PPP, FDDI, ATM, IEEE 802.5/ 802.2, IEEE 802.3/802.2, HDLC, Frame Relay. Network (Layer 3) Layer 3 provides switching and routing technologies, creating logical paths, known as virtual circuits, for transmitting data from node to node. Routing and forwarding are functions of this layer, as well as addressing, internetworking, error handling, congestion control and packet sequencing. Layer 3 Network examples include AppleTalk DDP, IP, IPX. Transport (Layer 4) OSI Model, Layer 4, provides transparent transfer of data between end systems, or hosts, and is responsible for end-to-end error recovery and flow control. It ensures complete data transfer. Layer 4 Transport examples include SPX, TCP, UDP. Session (Layer 5) This layer establishes, manages and terminates connections between applications. The session layer sets up, coordinates, and terminates conversations, exchanges, and dialogues between the applications at each end. It deals with session and connection coordination. Layer 5 Session examples include NFS, NetBios names, RPC, SQL. Presentation (Layer 6) This layer provides independence from differences in data representation (e.g., encryption) by translating from application to network format, and vice versa. The presentation layer works to transform data into the form that the application layer can accept. This layer formats and encrypts data to be sent across a network, providing freedom from compatibility problems. It is sometimes called the syntax layer. Layer 6 Presentation examples include encryption, ASCII, EBCDIC, TIFF, GIF, PICT, JPEG, MPEG, MIDI.
  • 20. Application (Layer 7) OSI Model, Layer 7, supports application and end-user processes. Communication partners are identified, quality of service is identified, user authentication and privacy are considered, and any constraints on data syntax are identified. Everything at this layer is application-specific. This layer provides application services for file transfers, e-mail, and other network software services. Telnet and FTP are applications that exist entirely in the application level. Tiered application architectures are part of this layer. Layer 7 Application examples include WWW browsers, NFS, SNMP, Telnet, HTTP, FTP Thankyouâ€Ļ..