SlideShare a Scribd company logo
1 of 141
WEL COME
PRAVEEN M JIGAJINNIPRAVEEN M JIGAJINNI
PGT (Computer Science)PGT (Computer Science)
MTech[IT],MPhil (Comp.Sci), MCA, MSc[IT], PGDCA, ADCA,MTech[IT],MPhil (Comp.Sci), MCA, MSc[IT], PGDCA, ADCA,
Dc. Sc. & Engg.Dc. Sc. & Engg.
email: praveenkumarjigajinni@yahoo.co.inemail: praveenkumarjigajinni@yahoo.co.in
COMMUNICATION
&
NETWORK CONCEPTS
CHAPTER 14
WHAT’S A NETWORK?
Tanenbaum defines a network as ‘an interconnected
collection of autonomous computers’.
 AUTONOMOUS: Central to this definition is that
all computers are autonomous i.e. no computer
on a network can start, stop or control another.
INTERCONNECTED : Two or more computers
are interconnected if they can exchange
information.
NEED FOR NETWORKING
 Resource Sharing: The aim is to make all
resource available to anyone or everyone
connected.
 Reliability: The idea is –if one crashes other can
carry on.e.g. if one file is deleted from a system it’s
safely stored on an another on the network.
 Cost Factor: PCs’ better performance ratio than
micro computers. So better to have 1 pc/user with
data stored on 1 shared file server machine.
 Communication Medium: the changes at one end
can suddenly be sent to the other & vice-versa. It
brings faster and better co-operation.
APPLICATION OF
NETWORKS
SHARINGSHARING
ACCESS TO REMOTE DATABASEACCESS TO REMOTE DATABASE
COMMUNICATION FACILITIESCOMMUNICATION FACILITIES
EVOLUTION OF
NETWORKING
ARPANET,INTERNET,INTERSPACEARPANET,INTERNET,INTERSPACE
SWITCHING TECHNIQUESSWITCHING TECHNIQUES
EVOLUTION OF
NETWORKING
 Networking started way back in 1969 and
has evolved since .
The important stages are listed below:-
ARPANET
THE INTERNET
THE INTERSPACE
ARPANET
 Advanced Research Projects Agency NETwork.
 Way back in 1969 it began sponsored by US Dept. of
defense with the goal of linking computers at universities
and US defense. Soon the systems began exchanging
data & info.
 It had handful of components but expanded a lot. Another
event was creation of another highly (better than
ARPANET)capable network by National science
Foundation namely-NSFNET.
 But NSFNET allowed didn’t allow any private business so
private companies built their own networks later joined
with ARPANET & NSFNET to form internet.
THE INTERNET
The internet is a worldwide network of computer
networks.
It’s a super network. The common use is that
users can communicate with any other user on a
different network.
To accomplish these exchanges certain rules
(called protocols) must be followed. The internet
uses a set of protocols called as TCP/IP
(transmission control protocol/internet protocol) .
HOW DOES INTERNET
WORK
 All the computers are not directly connected to
internet. Rather they connect to a small network
which connect to the internet BACKBONE through
GATEWAYS.
Gateway:-Device connecting dissimilar networks.
Backbone:-Central interconnecting structures in
which other networks are plugged. (imagine the
trunk of any tree from which branches emerge
or a human backbone).
FUNCTIONING
At the source computer, the message/file is
divided into very small parts called packets.
Packet has a serial number.
All packets are sent to the destination computer.
The destination computer receives these
packets (not surely serially). If a packet is
garbled or lost,it is demanded again.
The message is arranged serially to get back the
message/file.
You know how it functions but
what makes it possible?
INTERNET FUNCTIONING
The reason that internet works at all is that every
linked computer uses the same set of rules for
communication. DON,T YOU KNOW THAT A
SET OF RULES IS CALLED PROTOCOL.
TCP/IP is responsible for division and
reassembling of packets.
Ip is responsible for guiding the packets to the
proper destination.
The future of the internet is interspace.
THE INTERSPACE
Interspace is a client/server software program
that allows multiple users to communicate online
with real-time audio, video and text-chat in a
dynamic 3D environments.
As the internet is a protocol environment for
interconnecting networks to transmit data
similarly interspace is an application
environment for interconnecting spaces to
manipulate information.
SWITCHING TECHNIQUES
 switching techniques are used to transmit data
across networks.
There are various techniques :-
Circuit switching
Message switching
Packet switching
Ways to send a message across a network
CIRCUIT SWITCHING
The complete physical connection is established
before any data can be exchanged.
Since circuits are switched it gets it’s name.
Telephone is a good example of this technique.
Earlier switching was done manually. There was
an operator who would reside in switching office
and plug a jumper connecting input & output
sockets. Now switching is done automatically.
PACKET SWITCHING
The method is same as message switching.
The difference lies in the way of storing and
transmitting data.
Block size of data has an upper limit (that
requires transfer of chunks of data under the
limit called as packets).
The storage is in the main memory instead of on
the hard disk.
MESSAGE SWITCHING
 No physical copper path is established in advanceNo physical copper path is established in advance
between the sender and the receiver as in circuitbetween the sender and the receiver as in circuit
switching.switching.
 Instead, the sent data is first stored in the firstInstead, the sent data is first stored in the first
switching office and then forwarded later, one hop atswitching office and then forwarded later, one hop at
a time.a time.
 Each block is received entirely, inspected for errors,Each block is received entirely, inspected for errors,
and then retransmitted. This procedure continuesand then retransmitted. This procedure continues
until message reaches its destination. Owing to itsuntil message reaches its destination. Owing to its
working principle, it is also known as store andworking principle, it is also known as store and
forward.forward.
DATA COMMUNICATION
TERMINOLOGIES
Concept of Channel
Baud,Bandwidth, Data Transfer Rate
TERMS
Data channel : a medium used to carry
information or data from one point to
another.
Baud : unit of measurement for the
information carrying capacity of a
communication channel. (syn: bps-bits per
second)
Other units are : Bps, kbps, Kbps, mbps (in
capitals b means byte and otherwise bit)
TERMS
Bandwidth : Technically, it is the
difference between the highest & the
lowest frequencies of a transmission
channel or the width of allocated band of
frequencies to a channel.
People generally use it to mean the
amount of information/data travelling
through a single channel at a time. High
bandwidth channels are called broadband
and low bandwidth channels narrowband
channels.
MORE…
In digital systems it is expressed in terms of bps
like if a modem works @ 57,600 bps and another
@28,800 bps ,then the first modem has twice as
bandwidth as the second one.
In analog systems it’s expressed in terms of the
highest & the lowest signal component.
Frequency is measured in terms of cycles/second
i.e. hertz. 1 kHZ = thousand cycles/second,
1mHZ=103
1 gHZ =103
mHZ 1 tHZ = 103
gHZ.
MORE…
Data transfer rates: amount of data transferred
by a communication channel per second or a
computing or storage device.
Measured in bps, Bps, or baud.
TRANSMISSION MEDIA
Twisted Pair
 Coaxial Cable
Optical Fiber
Infrared
Radio Link
Microwave & Satellite Link
TRANSMISSION MEDIA
Transmission media or communication
channels of network is nothing but the
cable/media which provides the link.
There are numerous media which can be
divided into :-
 Guided media (includes
wires/cables)
 Unguided media (includes any form
of wave media)
TWISTED PAIR CABLE
It is the most common form of wiring in data
communication applications.
General Form : two identical wires wrapped
together in a double helix.
The bleeding of a signal from one wire to
another and which can corrupt signal and
cause network errors. This form of signal
interference is called crosstalk. To reduce
crosstalk wires are twisted in pair in
twisted pair cables.
PROS-N-CONS
Advantages: simple, flexible physically,
easy to install and maintain, easily
connected, very inexpensive.
Disadvantages: incapable in long range
transmission without repeaters due to high
attenuation (reduction, decrease), low
bandwidth, supports merely data rates of
1Mbps &10 Mbps (with conditioning).
TYPES
There are Two Types of twisted pair cable:
Unshielded Twisted Pair ( U T P )
Shielded Twisted Pair ( S T P )
UNSHIELDED TWISTED PAIR ( U T P )
UTP cabling is used for variety of electronic
communications. Available in 5 categories
Type Description
CAT1 Voice Grade communication only; no data
transmission
CAT2 Data Grade Transmission up to 4 Mbps
CAT3 Data Grade Transmission up to 10 Mbps
CAT4 Data Grade Transmission up to 16 Mbps
CAT5 Data Grade Transmission up to 1000 Mbps
SHIELDED TWISTED PAIR
SHIELDED TWISTED PAIR(STP):
This type of cable comes with shielding of
the individual pairs of wires, which further
protects it from external interference. Only
advantage over the UTP is greater
protection from crosstalk & interference.
However, it’s heavier & costlier & requires
proper grounding at both ends. The max
segment length is same as UTP.
COAXIAL CABLE
It consists of a solid wire core surrounded by one or
more foil or wire shields, each separated by some
kind of plastic insulator. The inner core carries the
signal, and the shield provides the ground, has high
electrical properties & is suitable for high speed
communication used for TV signals.
Its data transmission characteristics are
considerably higher & so it’s used as the basis for a
shared cable network, with part of the bandwidth
being used for data traffic.
COAXIAL CABLE
It consists of a solid wire core surrounded by
one or more foil or wire shields, each
separated by some kind of plastic insulator.
The inner core carries the signal, and the
shield provides the ground, has high electrical
properties & is suitable for high speed
communication used for TV signals.
Its data transmission characteristics are
considerably higher & so it’s used as the basis
for a shared cable network, with part of the
bandwidth being used for data traffic.
COAXIAL CABLE
Advantages:
Greater speed, can be used as a basis for a shared
cable network.
Can be used for broadband transmission.
Bandwidth up to 400 MBPS.
Disadvantages: expensive, not compatible with
twisted pair cables
Types of coaxial cables:
Thicknet: This is thicker than thinnet. Its segments
can be up to 500 meters.
Thinnet: this form of coaxial cable is thinner and it
can have max. length of 185 meters.
OPTICAL FIBER
Advantages: immune to electrical & magnetic
interference.
Highly suitable for harsh industrial environment.
Secure transmission & high transmission capacity.
Can be Used for broadband transmission.
Disadvantage: inst6allation problem. Are fragile &
may need special care to provide the robustness
required for office environment.
Connecting two fibers together or a light source.
Types of Fiber Optic Cables
Fiber Optic cables can be either
Single Node that supports segment
length of up to 2 Kms and bandwidth of up
to 100 Mbps
Multimode with segment length of up to
100Kms and bandwidth of 2Gbps.
COMPARISON
Type Type Sub
type
Maxim
um
Segme
nt
Length
Bandwi
dth
Support
ed
Installati
on
Cost Interfer
ence
Twisted
Pair
Cable
UTP
STP
100 Mtrs
100 Mtrs
200 Mbps
500 Mbps
Easy
Moderate
Cheapest
Moderate
High
Moderate
Coaxial
Cable
Thinnet
Thicknet
185 Mtrs
500 Mtrs
10 Mbps
10 Mbps
Easy
Hard
Cheap
Moderate
Moderate
Low
Fiber
Optic
Cable
Multinode
Singlenode
2 Kms
100
Kms
100 Mbps
2 Gbps
Very
Hard
Expensive None
None
Radio Wave
 Radio wave can be used for connecting
computers in the network. Radio waves have
frequency between 10 KHz and 1 GHz. It has
following properties.
(a) Radio waves are easy to generate
(b) They can travel long distance.
(c) They can penetrate buildings easily.
(d) Radio waves are Omni-directional.
Micro Wave
 Microwave is a radio wave of high frequency.
 Above 1GHz, the radio waves travel in straight
line and requires line of sight communication.
 It is widely used for long distance
communication where the wire media is not
possible.
 It is inexpensive compare to wired media.
Satellite
 A satellite communication system
basically consists of a satellite in space
and many earth stations on the ground
which are linked with each other through
the satellite. It covers the large
geographical area.
Infrared Link
 It is short range waves and widely used
in remote controls. They are directional,
cheap and easy to build but not pass
through solid objects.
Network Topology
 Topology is the method in which
networks are physically connected
together. Topology determines the
complexity of connecting computers and
therefore the cost of network equipment
installation. If cables are used, then
cable-cost can be major cost factor for
network system.
Bus Topology
In bus topology, all computers are connected by a
single length of cable with a terminator at each
end. The bus topology is the simplest and most
widely used for local area network. It is passive
topology which means only one computer at a time
can send a message.
Bus Topology - Advantage
 Simple, Reliable and easy to used in small
sized local area networks.
 The bus requires the least amount of cable to
connect the computers together and it is
therefore less expensive than other cabling
arrangements.
 It is easy to extend a bus. Two cables can be
joined into one longer cable with a connector,
making a longer cable and allowing more
computers to join the network.
Bus Topology -
Disadvantage
 Heavy network traffic can slow down
data transfer on a bus.
 It is difficult to troubleshoot a bus. A
cable break or malfunctioning computer
any where between tow computers can
cause them not to be able to
communicate with each other.
Ring Topology
This layout is similar to the liner bus, except that
the nodes are connected in a circle using cable
segments. In this layout, each node is physically
connected to only two other nodes. Each node
passes information along to the next, until it
arrives at its intended destination. Since each
computer re-transmits what it receives, a ring is an
active network and is not subject to the signal loss
problems which a bus topology experiences.
There is no termination because there is no end to
the ring.
Ring Topology
Advantage:
(a) Faster than bus topology.
Disadvantages
(a) Failure of one computer on the ring affects the
whole network.
(b) Difficult to add new computer in a network
Star Topology
A star topology is a topology for a Local Area
Network (LAN) in which all nodes are individually
connected to a central connection point, like a hub
or a switch. A star takes more cable than e.g. a
bus, but the benefit is that if a cable fails, only one
node will be brought down.
NETWORK DEVICES
MODEM
RJ45 CONNECTOR
ETHERNET CARD
HUB
SWITCH
ROUTER
GATEWAY
Network Devices - Modem
A modem (modulator-demodulator) is a device
that modulates signals to encode digital
information and demodulates signals to decode
the transmitted information.
Network Devices - RJ 45 Connector
RJ Stands for Registered Jack. RJ Connectors is a
family of push and click connectors for twisted pair
wiring in telephone and network wiring. It is an 8-
wire telephone type connector used with twisted
pair cabling for connecting computers.
Network Devices
Ethernet Card (NIC Card)
Short for Network Interface Card, a NIC is also
commonly referred to as an Ethernet card and
network adapter and is an expansion card that
enables a computer to connect to a network such
as a home network or the Internet using
an Ethernet cable with a RJ-45 connector. The
picture is an example of aSMC EZ Card
10/100 PCI network card, a network card
commonly found in most desktop computers today
that do not already have an onboard network on
their motherboard.
Network Devices - Ethernet
Card (NIC Card)
Network Devices - Repeater
In telecommunications, a repeater is
an electronic device that receives
a signal and retransmits it at a higher level or
higher power, or onto the other side of an
obstruction, so that the signal can cover longer
distances.
It is used to regenerate the signal which is on its
way through a communication channel. A repeater
regenerates the received signal and retransmits it
to its destination.
Network Devices - RepeaterNetwork Devices - Repeater
Network Devices - Hub
A common connection point for devices in
a network. Hubs are commonly used to
connect segments of a LAN. A hub contains
multiple ports. When a packet arrives at one
port, it is copied to the other ports so that all
segments of the LAN can see all packets.
Network Devices HUB
Network Devices - Bridge
A Bridge goes one step up on a hub in that it looks at the
destination of the packet before sending. If the destination
address is not on the other side of the bridge it will not
transmit the data.
A bridge only has one incoming and one outgoing port.
To build on the email analogy above, the bridge is
allowed to decide if the message should continue on. It
reads the address bob@smith.com and decides if there is a
bob@smith.com on the other side. If there isn't, the
message will not be transmitted.
Bridges are typically used to separate parts of a network
that do not need to communicate regularly, but still need to
be connected.
Network Devices - Switch
A switch steps up on a bridge in that it has multiple
ports. When a packet comes through a switch it is
read to determine which computer to send the data
to.
This leads to increased efficiency in that packets are
not going to computers that do not require them.
Now the email analogy has multiple people able to
send email to multiple users. The switch can decide
where to send the mail based on the address.
Most large networks use switches rather than hubs
to connect computers within the same subnet.
Network Devices Switch
Network Devices - Router
A router is similar in a switch in that it forwards
packets based on address. But, instead of the
MAC address that a switch uses, a router can
use the IP address. This allows the network to go
across different protocols.
The most common home use for routers is to
share a broadband internet connection. The
router has a public IP address and that address
is shared with the network. When data comes
through the router it is forwarded to the correct
computer.
Network Devices - Router
This comparison to email gets a little off base.
This would be similar to the router being able
to receive a packet as email and sending it to
the user as a fax.
Network Devices
Network Devices - Gateway
A gateway is a network device that connects
dissimilar networks. It establishes an intelligent
connection between a local network and
external networks with completely different
structures.
A gateway can recover e-mail messages in one
format and convert them into another format.
A gateway is a device which is used to connect
different types of network such as Windows
NT and UNIX network.
HTML
HTML: WHAT IT IS?
Document-layout & hyperlink-specification
language i.e., a language used to design the
layout of a document & specify the
hyperlinks..
Html tells the browser how to display the
contents of a hypertext document i.e., a
document including text, images & other
supported media. It also tells how to make the
page interactive by using special hyperlinks.
HTML
HTML: WHAT IT IS NOT?
First of all it is not a programming language
but just a descriptive language.
It’s neither a word processing tool nor a
desktop publishing solution. It’s just a page-
layout & hyperlink specification-language.
XML
 XML is a markup language for documents containing
structured information.
 Structured information contains both content ( words,
images etc.) & indication of what role does that content
play content in a footer is different from that of header or
content in a caption is different from a title).
(HTML==XML) ??
 NO. In HTML tags and semantics meaning/role of tags)
is fixed unlike in XML.
 XML permits to define tags and structural relationships
between them. Since there’s no predefined tag set there
can’t be any pre-established semantics. All the
semantics of an XML is either defined by the
applications that process them or by the used
stylesheets.
DHTML
 Dynamic HTML refers to web content that changes each
time it is viewed. e.g. same page could result in a
different page depending upon :
Geographic location of the reader
Time of day
Previous pages viewed by the reader
Profile of the reader
 DHTML refers to new HTML extensions that will enable a
web page to react to user input without sending requests
to the web server.
 It can be thought of as “animated HTML”. Ex:- a piece of
text can change from one color to another upon clicking
or after some time.
NETWORK PROTOCOLS
TCP/IP, FTP, PPP
LEVEL-REMOTE LOGIN(TELNET),INTERNET,
WIRELESS/MOBILE COMMUNICATION
GSM, CDMA, WLL, 3G, SMS,VOICE MAIL,
APPLICATION,E-MAIL,CHAT,VIDEO
CONFERENCING
TCP/IP
Transmission control protocol/internet protocol is
a layered set of protocols.
TCP is responsible for making sure that the
commands get through to the other end. It keeps
track of all that is sent and sends again
something if it didn’t get through.
FTP
It stands for File Transfer Protocol.
Responsible for Downloading and Uploading
services on internet.
TELNET
Telnet protocol allows the user to logon into remote
machine in which user has his account.
SLIP (SERIAL LINE INTERNET
PROTOCOL)
SLIP is a TCP/IP protocol used for communication
between two machines that are previously
configured for communication with each other. For
example, your Internet server provider may provide
you with a SLIP connection so that the provider's
server can respond to your requests, pass them on
to the Internet, and forward your requested Internet
responses back to you. Your dial-up connection to
the server is typically on a slower serial line rather
than on the parallel or multiplex lines such as a line
of the network you are hooking up to.
PPP (POINT TO POINT
PROTOCOL)
PPP means Point to Point Protocol. It is a much
more developed protocol than SLIP (which is
why it is replacing it), insofar as it transfers
additional data, better suited to data
transmission over the Internet (the addition of
data in a frame is mainly due to the increase in
bandwidth).
WIRELESS PROTOCOLS - GSM
• Short for Global System  for Mobile 
communications, one of the leading
digital cellular systems. GSM uses
narrowband TDMA, which allows eight
simultaneous calls on the same radio frequency.
• GSM was first introduced in 1991.
WIRELESS PROTOCOLS - CDMA
CDMA stands for Code Division Multiple Access. It is a
wireless communication technology that allows
multiple people to use a single radio channel at the
same time with little interference and very high
security. Conventional communication systems
transmit and receive on one constant frequency;
CDMA "spreads" a radio signal over a large frequency
range, using a unique code to identify each
transmitter/receiver pair. This allows many users to
communicate on the same channel while making each
transmission largely immune to natural interference,
eavesdropping, and jamming.
WEB SERVERS
HTML , DHTML
XML
HTTP
URL & DOMAIN NAMES
PROTOCOL ADDRESSES
WEBSITE
WEB BROWSER
WEB SERVERS
WEB HOSTING
WEB SCRIPTING CLIENT SIDE & SERVER
SIDE
HTTP
 Hyper Text Transfer Protocol is an application-
level but light & fast protocol.
 It’s a generic, stateless, object oriented protocol.
 Another feature is typing of data representation,
allowing systems to be built independently of the
data being transferred. It has been in use by WWW
since 1990.
 HTTP allows an open-ended set of methods to be
used to indicate the purpose of a request.
 It builds on the discipline of URI (Uniform Resource 
Identifier),  as a location or name, for locating
resource on which method is to be applied.
HTTP
 Messages are passed to the HTTP in a format same as
internet email or MIME (Multipurpose Internet Mail
Extensions). HTTP is also used as a generic protocol for
communication between gateways/proxies etc. to other
protocols.
 It consists of two fairly distinct items: 
1. set of requests from browsers to servers
2. set of responses going the other way.
 Though HTTP was designed to work with web but it’s
been made more general to accommodate future
possibilities of OO applications.
 HTTP has different built-in methods to allow users to open
a web page, to disconnect an existing connection, to read
the header of a webpage, to append to an existing
resource or to store a webpage etc.
URL & DOMAIN NAMES
HTTP uses internet address in a special format
called a Uniform Resource Locator or URL.
Typically URLs look like this:
type://address/path
Type:- type of server address (also the protocol
they use):- address of the server path:- location
of file on the server.
In the address last group of characters (.com,
.gov etc.) is domain indicator.
URL & DOMAIN NAMES
The naming scheme by which servers are
identified is known as domain name system.
Another method of addressing (identifying
server) is by assigning distinct numbers known
as IP addressing method. Such addresses are
called as IP addresses.
Lastly, a url specifies a distinct address for each 
resource on the net. A character based internet 
address is a domain name. 
WEB-BROWSERS & SERVERS
A web browser is a WWW client that navigates
through the World Wide Web and displays web-
pages.
A web server is a WWW server that responds to
the requests made by the web browsers.
WEB SITES, ADDRESSES &
PAGES
A location on a net server is called web sites.
The unique address of each (URL) is called
address.
A web page is document or simply a page in a
web site.
WEB HOSTING
 Web hosting is a means of hosting web-server
application on a computer system through which
electronic content on the internet is readily available to
any web browser client.
WEB HOSTING
 Web Hosting Can Be Grouped Under:
1. Free Hosting: site hosting for free. You too can put up
own websites for raw fun.
2. Virtual or Shared Hosting: virtual hosting is where
one’s site is hosted on the web server of the hosting
company along with other web-sites giving 24-hour
access& can be updated through a password log-in.
3. Dedicated Hosting: a dedicated server is rented
usually for big websites by companies. Dedicated for
large, high traffic, or for those with special needs e.g. e-
commerce, security.
WEB HOSTING
co-location hosting: For those who do not fit the
dedicated server mold. Hosting companies offer a
similar but less restrictive hosting known as co-location
hosting. In this type hosting the company actually
owns the server on which site is hosted. That is the
company owning the site rather than web hosting
company, is responsible for all server administration
and the web hosting company provides physical
requirements of rack, high speed connection, a regular
power supply, and a limited amount of technical
support such as data back up or hardware upgrades.
WEB SCRIPTING
 A script is a list of commands embedded in a
web-page. Scripts are interpreted and executed
by a certain program or script-engine.
 Most common scripting languages are VBScript,
ASP(Active Server Pages), JavaScript,
PHP(Hypertext Preprocessor), PERL, JSP etc.
WEB SCRIPTING
Types of scripts:
Client-side script : It enables interaction within
the web-page, is downloaded and executed by
the browser (is browser-dependent i.e. browser
must be enabled to run the script).Applications :
To get data from user’s screen or browser, online
games, customized web-pages.
Server-side script: It supports execution at
server end. Results are sent to the client, is
browser independent of browsers.
APPLICATIONS : password protection, dynamic
addition of content to web-pages.
OPEN SOURCE TERMINOLOGIES
OPEN SOURCE SOFTWARE
FREEWARE
SHAREWARE
PROPRIETARY SOFTWARE
FLOSS
GNU
FSF
OSI
OPEN SOURCE SOFTWARE
 Open Source Software commonly means software
whose licenses do not impose much conditions. Users
are free to use, modify & distribute software hassle-free
but not certainly free of charge.
 It has been officially defined by the open source
definition at
http://www.opensource.org/docs/definition_plain.html.
and It states that :-
OPEN SOURCE SOFTWARE
 Open  source  doesn’t  just  mean  access  to  source  code. 
The  distribution  terms  of  open-source  software  must 
comply with the following criteria :-
 Free Redistribution
 Source Code
 Derived Works
 Integrity of The Author’s Source Code
 No Discrimination Against Persons Or Groups
 No Discrimination Against Fields Of Endeavor
 Distribution Of License
 License Must Not Be Specific To A Product
 The License Must Not Restrict Other Software
 License Must Be Technology Neutral
FREEWARE
The term freeware has no clear definition, but
generally refers to free of cost & redistributable
software, but no modification & no source code.
It is distributed in binary form.
Freeware is often used in marketing situations in
order to sell products and gain market
advantages.
One example is Microsoft Internet Explorer. 
SHAREWARE
Shareware is a software, which is made
available with the right to redistribute copies, but
it is stipulated that if one intends to use the
software, often after a certain period of time,
then a license fee must be paid.
Source code & modifiability absent.
The objective is to increase no. of prospective
users.
Generally a built-in timed mechanism limits the
functionality after a certain period of time.
PROPRIETARY
SOFTWARE
Neither open nor free, its use is regulated and
further distribution and modification is either
forbidden or requires special permission by the
supplier or vendor.
Normally the source code is not given to the
user.
FLOSS
FLOSS refers to Free Livre And Open Source
Software  or Free Libre And Open Source
Software.
The term is used for software that is both free 
software and open software.
Here the words libre(a Spanish word) or livre(a
Portuguese word) mean freedom.
GNU
GNU is a recursive acronym for GNU’s NOT UNIX.
This project was initiated by richard m. stallman
with an objective to create a system compatible
with UNIX but not same as UNIX.
It has not only made an OS but the project has
grown since its inception and now it creates
software of almost all kinds.
The same person founded the Free Software 
Foundation.
FSF
FSF is Free  Software  Foundation.  It is a non
profit organization created to support free
software movement in 1985 by Richard  M 
Stallman.
FSF has funded many software developers to
write free software.
Now a days, it also works on legal and structural
issues for the free software community.
OSI
OSI is Open Source Initiative founded by Bruce
perens & erics raymond (in Feb 1998) .
It specifies the criteria for open source software
& properly defines terms and specifications for
open source software.
W3C
W3C is acronym for World Wide Web
Consortium. W3C is responsible for producing
the software standards for the world wide web.
The W3C was created in Oct 1994, to lead the
world wide web to its full potential by developing
common protocols that promote its evolution and
ensure its interoperability.
W3C
The consortium is international: Jointly
hosted by MIT Lab for Computer Science in the
United States and in Europe by INRIA who
provides both local support and performing
core development.
The W3C was initially established in
collaboration with CERN where the Web is
organized and with support from DARPA and
the European Commission.
NETWORK SECURITY
CONCEPTS
THREATS AND PREVENTION FROMTHREATS AND PREVENTION FROM
VIRUSES,WORMS,TROJAN HORSE, SPAMSVIRUSES,WORMS,TROJAN HORSE, SPAMS
USE OF COOKIES, PROTECTION USINGUSE OF COOKIES, PROTECTION USING
FIREWALLFIREWALL
INDIA IT ACT, CYBER LAWS, CYBER CRIMESINDIA IT ACT, CYBER LAWS, CYBER CRIMES
IPR ISSUES, HACKINGIPR ISSUES, HACKING
VIRUSES
Computer Virus is a malicious program that
requires a host & is designed to make a system
sick, just like a real virus.
Three basic types:-
File infectors (attach themselves to a program
file)
Boot sector viruses (installs themselves on)
Macro viruses (infect data files).
VIRUSES
Characteristics of a virus are replicatibility,
requirement of host, external activation,
replication ability is limited to (virtual)system.
DAMAGES:-
Can destroy FAT
Can create bad sectors on disk or duplicate
itself
Can format entire disk or a specific tracks
Can destroy specific executable files and alter
data files, causing loss of integrity
Can hang the system.
TROJAN HORSES
 A Trojan horse is a code hidden in a program
such as a game or a spreadsheet that looks
safe to run but has hidden side effects.
 Trojan horses spread through e-mail, exchange
of disks & information exchange. Worms also
spread Trojans.
 It causes damages what a virus can but only
difference is its masking effect which hides its
operation.
WORMS
A worm is a program designed to replicate.
Characteristics of a WORMS:
Can replicate.
No host or is self contained.
Activated by creating a process (need for a
multi-tasking system).
If a network worm, will replicate across
communication links.
WORMS
How they Spread?
Worms are generally found in multitasking &
network systems. Worms, they spread
autonomously, without needing any other
program, user’s action or intervention etc.
Damage ?
Disrupt or create system management problems.
Some scan for passwords and other loopholes
then send it to the attacker.
Some times they install Trojans or viruses that
damage our system.
SPAM
 Spam refers to electronic junk mail or junk newsgroup
postings. Some people define spam more generally as
any unsolicited e-mail.
 Merriam-webster dictionary defines spam as unsolicited
usually commercial e-mail sent to a large number of
addresses.
 AVOIDING SPAM
 Creating a filter that finds and does something to e-mail
that you suspect is spam.
 Another escape is not to register yourself with a true id to
sign up for things on the net. These places often share
that e-mail id with other companies that fills you with
spam in exchange of benefits.
VIRUS PREVENTION
 It is not an easy task. Needs extra carefulness &
adherence to these guidelines:-
 Never use a foreign disk without scanning for viruses.
 Scan files downloaded from internet. Always.
 Never boot computer from a floppy which may contain
virus.
 Write protect your disks.
 Use licensed software.
VIRUS PREVENTION
 Password protect your pc to prevent unattended
modifications.
 Make regular backups.
 Install & use antivirus software.
 Keep antivirus software up to date.
CYBER LAW
 Cyber law is a generic term which refers to all the legal
and regulatory aspects of the internet and the World
Wide Web.
 Cyber law is important because it touches almost all
aspects of the transactions and activities on and
concerning the internet.
 India’s IT Act
 In India the cyber laws are contained in the Information
Technology Act, 2000 (IT Act 2000) which was notified
on 17 October 2000.
CYBER CRIMES
 The Cambridge dictionary defines Cyber Crime as
Crimes committed with the use of computers or relating
to computers, especially through internet.
Classifications of Cyber Crimes
1. Tampering with Computer Source Documents.
2. Hacking
3. Publishing of Information, which is obscene in the
electronic form.
4. Child Pornography
5. Accessing Protected Systems.
6. Breach of Confidentiality and Privacy.
IPR ISSUES
 The Term Intellectual Property (IP) may be defined as a
product of the intellect that has commercial value
including copyrighted property such as literacy or artistic
works and ideational property.
 Intellectual property rights are leagal rights which results
from intellectual activity in industrial, scientific, literary
and artistic fields.
CLOUD COMPUTING
 Cloud computing is a recently evolved computing
terminology or metaphor based on utility and
consumption of computing resources. Cloud computing
involves deploying groups of remote servers and
software networks that allow centralized data storage
and online access to computer services or resources.
Clouds can be classified as public, private or hybrid.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Agility improves with users' ability to re-provision
technological infrastructure resources.
 Application programming interface (API) accessibility
to software that enables machines to interact with cloud
software in the same way that a traditional user interface
(e.g., a computer desktop) facilitates interaction between
humans and computers.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Agility improves with users' ability to re-provision
technological infrastructure resources.
 Application programming interface (API) accessibility
to software that enables machines to interact with cloud
software in the same way that a traditional user interface
(e.g., a computer desktop) facilitates interaction between
humans and computers.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Cost reductions claimed by cloud providers. A public-
cloud delivery model converts capital expenditure
to operational expenditure.[35]
This purportedly
lowers barriers to entry, as infrastructure is typically
provided by a third party and does not need to be
purchased for one-time or infrequent intensive
computing tasks. Pricing on a utility computing basis is
fine-grained, with usage-based options and fewer IT
skills are required for implementation (in-house).
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Device and location independence[38]
enable users to
access systems using a web browser regardless of their
location or what device they use (e.g., PC, mobile
phone). As infrastructure is off-site (typically provided by
a third-party) and accessed via the Internet, users can
connect from anywhere.
 Maintenance of cloud computing applications is easier,
because they do not need to be installed on each user's
computer and can be accessed from different places.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Multitenancy enables sharing of resources and costs
across a large pool of users thus allowing for:
 centralization of infrastructure in locations with lower
costs (such as real estate, electricity, etc.)
 peak-load capacity increases (users need not engineer
for highest possible load-levels)
 utilisation and efficiency improvements for systems
that are often only 10–20% utilised.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Performance is monitored, and consistent and loosely
coupled architectures are constructed using web
services as the system interface.
 Productivity may be increased when multiple users can
work on the same data simultaneously, rather than
waiting for it to be saved and emailed. Time may be
saved as information does not need to be re-entered
when fields are matched, nor do users need to install
application software upgrades to their computer.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Reliability improves with the use of multiple redundant
sites, which makes well-designed cloud computing
suitable for business continuity and disaster recovery.
 Scalability and elasticity via dynamic ("on-
demand") provisioning of resources on a fine-grained,
self-service basis in near real-time]
(Note, the VM startup
time varies by VM type, location, OS and cloud providers
[45]
), without users having to engineer for peak loads.
CHARACTERSTICS OF CLOUD
COMPUTING
 Cloud computing exhibits the following key
characteristics:
 Security can improve due to centralization of data,
increased security-focused resources, etc., but concerns
can persist about loss of control over certain sensitive
data, and the lack of security for stored kernels. Security
is often as good as or better than other traditional
systems, in part because providers are able to devote
resources to solving security issues that many
customers cannot afford to tackle.
The National Institute of Standards
and Technology "NIST"
• The National Institute of Standards and
Technology (NIST), known between 1901 and 1988 as
the National Bureau of Standards (NBS), is
a measurement standards laboratory, also known as a
National Metrological Institute (NMI), which is a non-
regulatory agency of the United States Department of
Commerce. The institute's official mission is to:[1]
• Promote U.S. innovation and industrial competitiveness
by advancing measurement science, standards,
and technologyin ways that enhance economic security
and improve our quality of life.
The National Institute of Standards
and Technology "NIST"
The National Institute of Standards and Technology's
definition of cloud computing identifies "five
essential characteristics":
 On-demand self-service. A consumer can unilaterally
provision computing capabilities, such as server time
and network storage, as needed automatically without
requiring human interaction with each service provider.
 Broad network access. Capabilities are available over
the network and accessed through standard
mechanisms that promote use by heterogeneous thin or
thick client platforms (e.g., mobile phones, tablets,
laptops, and workstations).
The National Institute of Standards
and Technology "NIST"
• The National Institute of Standards and Technology's
definition of cloud computing identifies "five
essential characteristics":
 Resource pooling. The provider's computing resources
are pooled to serve multiple consumers using a multi-
tenant model, with different physical and virtual
resources dynamically assigned and reassigned
according to consumer demand.
The National Institute of Standards
and Technology "NIST"
• The National Institute of Standards and Technology's
definition of cloud computing identifies "five
essential characteristics":
 Rapid elasticity. Capabilities can be elastically
provisioned and released, in some cases automatically,
to scale rapidly outward and inward commensurate with
demand. To the consumer, the capabilities available for
provisioning often appear unlimited and can be
appropriated in any quantity at any time.
The National Institute of Standards
and Technology "NIST"
• The National Institute of Standards and Technology's
definition of cloud computing identifies "five
essential characteristics":
 Measured service. Cloud systems automatically control
and optimize resource use by leveraging a metering
capability at some level of abstraction appropriate to the
type of service (e.g., storage, processing, bandwidth,
and active user accounts). Resource usage can be
monitored, controlled, and reported, providing
transparency for both the provider and consumer of the
utilized service.—National Institute of Standards and
Technology[2]
CLOUD COMPUTING
CLOUD COMPUTING TYPES
Private cloud
Private cloud is cloud infrastructure operated
solely for a single organization, whether
managed internally or by a third-party, and
hosted either internally or externally.[
Undertaking
a private cloud project requires a significant level
and degree of engagement to virtualize the
business environment, and requires the
organization to re-evaluate decisions about
existing resources.
CLOUD COMPUTING TYPES
CLOUD COMPUTING TYPES
Public cloud
A cloud is called a "public cloud" when the services
are rendered over a network that is open for public
use. Public cloud services may be free.[68]
Technically
there may be little or no difference between public
and private cloud architecture, however, security
consideration may be substantially different for
services (applications, storage, and other resources)
that are made available by a service provider for a
public audience and when communication is effected
over a non-trusted network.
CLOUD COMPUTING TYPES
Public cloud
Saasu is a large public cloud. Generally, public cloud
service providers like Amazon AWS, Microsoft and
Google own and operate the infrastructure at
their data center and access is generally via the
Internet. AWS and Microsoft also offer direct
connect services called "AWS Direct Connect" and
"Azure ExpressRoute" respectively, such connections
require customers to purchase or lease a private
connection to a peering point offered by the cloud
provider
CLOUD COMPUTING TYPES
Hybrid cloud
Hybrid cloud is a composition of two or more
clouds (private, community or public) that remain
distinct entities but are bound together, offering
the benefits of multiple deployment models.
Hybrid cloud can also mean the ability to
connect collocation, managed and/or dedicated
services with cloud resources
HIGHER ORDER THINKING
QUESTIONS
[ HOTS ]
Q.1 What is protocol? How many types of
protocols are there?
Ans. When computers communicate each other,
there needs to be a common set of rules and
instructions that each computer follows. A specific
set of communication rules is called a protocol.
Some protocol: PPP, HTTP, SLIP, FTP, TCP/IP
HIGHER ORDER THINKING
QUESTIONS
Q.2 What is the difference between Networking
and Remote Networking?
Ans. The main difference between Networking and
Remote Networking, is the network which we use
in offices or other places locally such LAN or
INTERNET and remote networking is one which we
use TERMINAL Services to communicate with the
remote users such WAN.
HIGHER ORDER THINKING
QUESTIONS
HIGHER ORDER THINKING
QUESTIONS
Q.3 What is point-to-point protocol?
Ans. A communication protocol used to connect
computer to remote networking services include
Internet Service Providers. In networking, the Point-
to-Point protocol is commonly used to establish a
direct connection between two nodes. Its primary
use has been to connect computers using a phone
line.
HIGHER ORDER THINKING
QUESTIONS
Q.4 How gateway is different from router?
Ans. A gateway operates at the upper levels of the OSI
model and translates information between two
completely different network architectures. Routers allow
different networks to communicate with each other. They
forward packets from one network to another based on
network layer information. A gateway can interpret and
translate the different protocols that are used on two distinct
networks. Unlike routers that successfully connect networks
with protocols that are similar, a gateway perform an
application layer conversion of information from one protocol
stack to another.
HIGHER ORDER THINKING
QUESTIONS
Q.5 What is the role of network administrator?
Ans. Basic tasks for which a network administrator may be
responsible:
Setting up and configuring network hardware and software.
 Installing and configuring network media and connections.
Connecting user nodes and peripherals of all kinds to the
network.
Adding users to and removing users from the network.
 Managing user account.
 Ensuring the security of the network.
Provide training to the users to utilize the network’s
resources.
HIGHER ORDER THINKING
QUESTIONS
Q.6 What is the difference between baseband and
broadband transmission?
Ans. Baseband is a bi-directional transmission while
broadband is a unidirectional transmission.
No Frequency division multiplexing possible in base band but
possible in broadband.
HIGHER ORDER THINKING
QUESTIONS
Baseband Broadband
Entire bandwidth of the
cable is consumed by a
signal
broadband transmission, signals are
sent on multiple frequencies,
allowing multiple signals to be sent
simultaneously.
Digital signals Analog signals
bi-directional
transmission
unidirectional transmission
No Frequency division
multiplexing possible
Frequency division multiplexing
possible
Uses for short distance Uses for long distance
HIGHER ORDER THINKING
QUESTIONS
Q.7 What are the difference between domain and
workgroup?
Domain Workgroup
One or more computers are servers All Computers are peers.
If you have a user account on the
domain, you can logon to any computer
on the domain.
Each computer has a set of accounts.
There can be 100+ computers Typically not more then 20-30
computers
The computers can be on different local
network
All computers must be on the same
local
netork.
?Any Questions Please
Thank You
Very Much

More Related Content

What's hot

Database Relationships
Database RelationshipsDatabase Relationships
Database Relationshipswmassie
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of NetworkingVivin NL
 
Data Abstraction and Independance (1).pptx
Data Abstraction and Independance (1).pptxData Abstraction and Independance (1).pptx
Data Abstraction and Independance (1).pptxnehasahuji
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerDeepak John
 
Parallel Algorithm Models
Parallel Algorithm ModelsParallel Algorithm Models
Parallel Algorithm ModelsMartin Coronel
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-conceptsWBUTTUTORIALS
 
Intro to Distributed Database Management System
Intro to Distributed Database Management SystemIntro to Distributed Database Management System
Intro to Distributed Database Management SystemAli Raza
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notesDr.YNM
 
Presentation on transmission media
Presentation on transmission mediaPresentation on transmission media
Presentation on transmission media4444muhumed
 
network hardware
network hardwarenetwork hardware
network hardwaretumetr1
 
Data Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacityData Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacityDr Rajiv Srivastava
 
Micro channel architecture
Micro channel architectureMicro channel architecture
Micro channel architectureGichelle Amon
 

What's hot (20)

Distributed Database
Distributed DatabaseDistributed Database
Distributed Database
 
Database Relationships
Database RelationshipsDatabase Relationships
Database Relationships
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Basic Concepts of Networking
Basic Concepts of NetworkingBasic Concepts of Networking
Basic Concepts of Networking
 
Data Abstraction and Independance (1).pptx
Data Abstraction and Independance (1).pptxData Abstraction and Independance (1).pptx
Data Abstraction and Independance (1).pptx
 
Computer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link LayerComputer Networks- Introduction and Data Link Layer
Computer Networks- Introduction and Data Link Layer
 
Parallel Algorithm Models
Parallel Algorithm ModelsParallel Algorithm Models
Parallel Algorithm Models
 
Data communications-concepts
Data communications-conceptsData communications-concepts
Data communications-concepts
 
Intro to Distributed Database Management System
Intro to Distributed Database Management SystemIntro to Distributed Database Management System
Intro to Distributed Database Management System
 
11 Database Concepts
11 Database Concepts11 Database Concepts
11 Database Concepts
 
Introduction to parallel computing
Introduction to parallel computingIntroduction to parallel computing
Introduction to parallel computing
 
Networking Basics
Networking BasicsNetworking Basics
Networking Basics
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
 
Basic networking
Basic networkingBasic networking
Basic networking
 
Presentation on transmission media
Presentation on transmission mediaPresentation on transmission media
Presentation on transmission media
 
network hardware
network hardwarenetwork hardware
network hardware
 
Chapter 3 pc
Chapter 3 pcChapter 3 pc
Chapter 3 pc
 
Data Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacityData Communication & Computer network: Channel capacity
Data Communication & Computer network: Channel capacity
 
Micro channel architecture
Micro channel architectureMicro channel architecture
Micro channel architecture
 
Sorting network
Sorting networkSorting network
Sorting network
 

Viewers also liked

+2 Computer Science - Volume II Notes
+2 Computer Science - Volume II Notes+2 Computer Science - Volume II Notes
+2 Computer Science - Volume II NotesAndrew Raj
 
Ch 07 understanding marginalsisation1
Ch 07 understanding  marginalsisation1Ch 07 understanding  marginalsisation1
Ch 07 understanding marginalsisation1Praveen M Jigajinni
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationGuru Ji
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesFaindra Jabbar
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsGuru Ji
 

Viewers also liked (8)

+2 Computer Science - Volume II Notes
+2 Computer Science - Volume II Notes+2 Computer Science - Volume II Notes
+2 Computer Science - Volume II Notes
 
Ch 07 understanding marginalsisation1
Ch 07 understanding  marginalsisation1Ch 07 understanding  marginalsisation1
Ch 07 understanding marginalsisation1
 
Structures
StructuresStructures
Structures
 
12 SQL
12 SQL12 SQL
12 SQL
 
13 Boolean Algebra
13 Boolean Algebra13 Boolean Algebra
13 Boolean Algebra
 
CBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL PresentationCBSE XII Database Concepts And MySQL Presentation
CBSE XII Database Concepts And MySQL Presentation
 
Communication Technology- Information System and Technologies
Communication Technology- Information System and TechnologiesCommunication Technology- Information System and Technologies
Communication Technology- Information System and Technologies
 
CBSE XII Communication And Network Concepts
CBSE XII Communication And Network ConceptsCBSE XII Communication And Network Concepts
CBSE XII Communication And Network Concepts
 

Similar to 14 Communication Concepts

Class12 communication concepts
Class12 communication conceptsClass12 communication concepts
Class12 communication conceptsGauri Prajapati
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMprapti borthakur
 
Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti dokePranoti Doke
 
Unit 3 cnd physical layer_switching_pranoti doke
Unit 3  cnd physical layer_switching_pranoti dokeUnit 3  cnd physical layer_switching_pranoti doke
Unit 3 cnd physical layer_switching_pranoti dokePranoti Doke
 
Computer communication and networks
Computer communication and networks Computer communication and networks
Computer communication and networks Swarup Boro
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notesIndrajaMeghavathula
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Gaurav Mehndiratta
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Ishant Tiwari
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts Gunjan Mathur
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatiakulachihansraj
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
switching technique in computer networks
switching technique in computer networksswitching technique in computer networks
switching technique in computer networksbitan11
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networkingjashhad
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routingr123027
 

Similar to 14 Communication Concepts (20)

Class12 communication concepts
Class12 communication conceptsClass12 communication concepts
Class12 communication concepts
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Networkingconcepts
NetworkingconceptsNetworkingconcepts
Networkingconcepts
 
COMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEMCOMPUTER NETWORKING SYSTEM
COMPUTER NETWORKING SYSTEM
 
Unit 3 CND physical layer_switching_pranoti doke
Unit 3  CND physical layer_switching_pranoti dokeUnit 3  CND physical layer_switching_pranoti doke
Unit 3 CND physical layer_switching_pranoti doke
 
Unit 3 cnd physical layer_switching_pranoti doke
Unit 3  cnd physical layer_switching_pranoti dokeUnit 3  cnd physical layer_switching_pranoti doke
Unit 3 cnd physical layer_switching_pranoti doke
 
Computer communication and networks
Computer communication and networks Computer communication and networks
Computer communication and networks
 
Networking Technologies Basic's complete notes
Networking Technologies Basic's complete notesNetworking Technologies Basic's complete notes
Networking Technologies Basic's complete notes
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
Cbsecommunicationandnetworkconcepts 121216105200-phpapp01
 
communication and network concepts
communication and network concepts communication and network concepts
communication and network concepts
 
Ppt college
Ppt collegePpt college
Ppt college
 
What Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika BhatiaWhat Is A Network made by Ms. Archika Bhatia
What Is A Network made by Ms. Archika Bhatia
 
presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
switching technique in computer networks
switching technique in computer networksswitching technique in computer networks
switching technique in computer networks
 
Chapter 4ver2
Chapter 4ver2Chapter 4ver2
Chapter 4ver2
 
Networking
NetworkingNetworking
Networking
 
Fundamentals of Networking
Fundamentals of NetworkingFundamentals of Networking
Fundamentals of Networking
 
3
33
3
 
Rajesh basics of networking and routing
Rajesh basics of networking and routingRajesh basics of networking and routing
Rajesh basics of networking and routing
 

More from Praveen M Jigajinni

Chapter 09 design and analysis of algorithms
Chapter 09  design and analysis of algorithmsChapter 09  design and analysis of algorithms
Chapter 09 design and analysis of algorithmsPraveen M Jigajinni
 
Chapter 06 constructors and destructors
Chapter 06 constructors and destructorsChapter 06 constructors and destructors
Chapter 06 constructors and destructorsPraveen M Jigajinni
 
Chapter 04 object oriented programming
Chapter 04 object oriented programmingChapter 04 object oriented programming
Chapter 04 object oriented programmingPraveen M Jigajinni
 
Chapter 8 getting started with python
Chapter 8 getting started with pythonChapter 8 getting started with python
Chapter 8 getting started with pythonPraveen M Jigajinni
 
Chapter 7 basics of computational thinking
Chapter 7 basics of computational thinkingChapter 7 basics of computational thinking
Chapter 7 basics of computational thinkingPraveen M Jigajinni
 
Chapter 6 algorithms and flow charts
Chapter 6  algorithms and flow chartsChapter 6  algorithms and flow charts
Chapter 6 algorithms and flow chartsPraveen M Jigajinni
 

More from Praveen M Jigajinni (20)

Chapter 09 design and analysis of algorithms
Chapter 09  design and analysis of algorithmsChapter 09  design and analysis of algorithms
Chapter 09 design and analysis of algorithms
 
Chapter 08 data file handling
Chapter 08 data file handlingChapter 08 data file handling
Chapter 08 data file handling
 
Chapter 07 inheritance
Chapter 07 inheritanceChapter 07 inheritance
Chapter 07 inheritance
 
Chapter 06 constructors and destructors
Chapter 06 constructors and destructorsChapter 06 constructors and destructors
Chapter 06 constructors and destructors
 
Chapter 05 classes and objects
Chapter 05 classes and objectsChapter 05 classes and objects
Chapter 05 classes and objects
 
Chapter 04 object oriented programming
Chapter 04 object oriented programmingChapter 04 object oriented programming
Chapter 04 object oriented programming
 
Chapter 03 python libraries
Chapter 03 python librariesChapter 03 python libraries
Chapter 03 python libraries
 
Chapter 02 functions -class xii
Chapter 02   functions -class xiiChapter 02   functions -class xii
Chapter 02 functions -class xii
 
Unit 3 MongDB
Unit 3 MongDBUnit 3 MongDB
Unit 3 MongDB
 
Chapter 17 Tuples
Chapter 17 TuplesChapter 17 Tuples
Chapter 17 Tuples
 
Chapter 15 Lists
Chapter 15 ListsChapter 15 Lists
Chapter 15 Lists
 
Chapter 14 strings
Chapter 14 stringsChapter 14 strings
Chapter 14 strings
 
Chapter 13 exceptional handling
Chapter 13 exceptional handlingChapter 13 exceptional handling
Chapter 13 exceptional handling
 
Chapter 10 data handling
Chapter 10 data handlingChapter 10 data handling
Chapter 10 data handling
 
Chapter 9 python fundamentals
Chapter 9 python fundamentalsChapter 9 python fundamentals
Chapter 9 python fundamentals
 
Chapter 8 getting started with python
Chapter 8 getting started with pythonChapter 8 getting started with python
Chapter 8 getting started with python
 
Chapter 7 basics of computational thinking
Chapter 7 basics of computational thinkingChapter 7 basics of computational thinking
Chapter 7 basics of computational thinking
 
Chapter 6 algorithms and flow charts
Chapter 6  algorithms and flow chartsChapter 6  algorithms and flow charts
Chapter 6 algorithms and flow charts
 
Chapter 5 boolean algebra
Chapter 5 boolean algebraChapter 5 boolean algebra
Chapter 5 boolean algebra
 
Chapter 4 number system
Chapter 4 number systemChapter 4 number system
Chapter 4 number system
 

Recently uploaded

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxAnaBeatriceAblay2
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 

Recently uploaded (20)

Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptxENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
ENGLISH5 QUARTER4 MODULE1 WEEK1-3 How Visual and Multimedia Elements.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 

14 Communication Concepts

  • 1. WEL COME PRAVEEN M JIGAJINNIPRAVEEN M JIGAJINNI PGT (Computer Science)PGT (Computer Science) MTech[IT],MPhil (Comp.Sci), MCA, MSc[IT], PGDCA, ADCA,MTech[IT],MPhil (Comp.Sci), MCA, MSc[IT], PGDCA, ADCA, Dc. Sc. & Engg.Dc. Sc. & Engg. email: praveenkumarjigajinni@yahoo.co.inemail: praveenkumarjigajinni@yahoo.co.in
  • 3. WHAT’S A NETWORK? Tanenbaum defines a network as ‘an interconnected collection of autonomous computers’.  AUTONOMOUS: Central to this definition is that all computers are autonomous i.e. no computer on a network can start, stop or control another. INTERCONNECTED : Two or more computers are interconnected if they can exchange information.
  • 4. NEED FOR NETWORKING  Resource Sharing: The aim is to make all resource available to anyone or everyone connected.  Reliability: The idea is –if one crashes other can carry on.e.g. if one file is deleted from a system it’s safely stored on an another on the network.  Cost Factor: PCs’ better performance ratio than micro computers. So better to have 1 pc/user with data stored on 1 shared file server machine.  Communication Medium: the changes at one end can suddenly be sent to the other & vice-versa. It brings faster and better co-operation.
  • 5. APPLICATION OF NETWORKS SHARINGSHARING ACCESS TO REMOTE DATABASEACCESS TO REMOTE DATABASE COMMUNICATION FACILITIESCOMMUNICATION FACILITIES
  • 7. EVOLUTION OF NETWORKING  Networking started way back in 1969 and has evolved since . The important stages are listed below:- ARPANET THE INTERNET THE INTERSPACE
  • 8. ARPANET  Advanced Research Projects Agency NETwork.  Way back in 1969 it began sponsored by US Dept. of defense with the goal of linking computers at universities and US defense. Soon the systems began exchanging data & info.  It had handful of components but expanded a lot. Another event was creation of another highly (better than ARPANET)capable network by National science Foundation namely-NSFNET.  But NSFNET allowed didn’t allow any private business so private companies built their own networks later joined with ARPANET & NSFNET to form internet.
  • 9. THE INTERNET The internet is a worldwide network of computer networks. It’s a super network. The common use is that users can communicate with any other user on a different network. To accomplish these exchanges certain rules (called protocols) must be followed. The internet uses a set of protocols called as TCP/IP (transmission control protocol/internet protocol) .
  • 10. HOW DOES INTERNET WORK  All the computers are not directly connected to internet. Rather they connect to a small network which connect to the internet BACKBONE through GATEWAYS. Gateway:-Device connecting dissimilar networks. Backbone:-Central interconnecting structures in which other networks are plugged. (imagine the trunk of any tree from which branches emerge or a human backbone).
  • 11. FUNCTIONING At the source computer, the message/file is divided into very small parts called packets. Packet has a serial number. All packets are sent to the destination computer. The destination computer receives these packets (not surely serially). If a packet is garbled or lost,it is demanded again. The message is arranged serially to get back the message/file. You know how it functions but what makes it possible?
  • 12. INTERNET FUNCTIONING The reason that internet works at all is that every linked computer uses the same set of rules for communication. DON,T YOU KNOW THAT A SET OF RULES IS CALLED PROTOCOL. TCP/IP is responsible for division and reassembling of packets. Ip is responsible for guiding the packets to the proper destination. The future of the internet is interspace.
  • 13. THE INTERSPACE Interspace is a client/server software program that allows multiple users to communicate online with real-time audio, video and text-chat in a dynamic 3D environments. As the internet is a protocol environment for interconnecting networks to transmit data similarly interspace is an application environment for interconnecting spaces to manipulate information.
  • 14. SWITCHING TECHNIQUES  switching techniques are used to transmit data across networks. There are various techniques :- Circuit switching Message switching Packet switching Ways to send a message across a network
  • 15. CIRCUIT SWITCHING The complete physical connection is established before any data can be exchanged. Since circuits are switched it gets it’s name. Telephone is a good example of this technique. Earlier switching was done manually. There was an operator who would reside in switching office and plug a jumper connecting input & output sockets. Now switching is done automatically.
  • 16. PACKET SWITCHING The method is same as message switching. The difference lies in the way of storing and transmitting data. Block size of data has an upper limit (that requires transfer of chunks of data under the limit called as packets). The storage is in the main memory instead of on the hard disk.
  • 17. MESSAGE SWITCHING  No physical copper path is established in advanceNo physical copper path is established in advance between the sender and the receiver as in circuitbetween the sender and the receiver as in circuit switching.switching.  Instead, the sent data is first stored in the firstInstead, the sent data is first stored in the first switching office and then forwarded later, one hop atswitching office and then forwarded later, one hop at a time.a time.  Each block is received entirely, inspected for errors,Each block is received entirely, inspected for errors, and then retransmitted. This procedure continuesand then retransmitted. This procedure continues until message reaches its destination. Owing to itsuntil message reaches its destination. Owing to its working principle, it is also known as store andworking principle, it is also known as store and forward.forward.
  • 18. DATA COMMUNICATION TERMINOLOGIES Concept of Channel Baud,Bandwidth, Data Transfer Rate
  • 19. TERMS Data channel : a medium used to carry information or data from one point to another. Baud : unit of measurement for the information carrying capacity of a communication channel. (syn: bps-bits per second) Other units are : Bps, kbps, Kbps, mbps (in capitals b means byte and otherwise bit)
  • 20. TERMS Bandwidth : Technically, it is the difference between the highest & the lowest frequencies of a transmission channel or the width of allocated band of frequencies to a channel. People generally use it to mean the amount of information/data travelling through a single channel at a time. High bandwidth channels are called broadband and low bandwidth channels narrowband channels.
  • 21. MORE… In digital systems it is expressed in terms of bps like if a modem works @ 57,600 bps and another @28,800 bps ,then the first modem has twice as bandwidth as the second one. In analog systems it’s expressed in terms of the highest & the lowest signal component. Frequency is measured in terms of cycles/second i.e. hertz. 1 kHZ = thousand cycles/second, 1mHZ=103 1 gHZ =103 mHZ 1 tHZ = 103 gHZ.
  • 22. MORE… Data transfer rates: amount of data transferred by a communication channel per second or a computing or storage device. Measured in bps, Bps, or baud.
  • 23. TRANSMISSION MEDIA Twisted Pair  Coaxial Cable Optical Fiber Infrared Radio Link Microwave & Satellite Link
  • 24. TRANSMISSION MEDIA Transmission media or communication channels of network is nothing but the cable/media which provides the link. There are numerous media which can be divided into :-  Guided media (includes wires/cables)  Unguided media (includes any form of wave media)
  • 25. TWISTED PAIR CABLE It is the most common form of wiring in data communication applications. General Form : two identical wires wrapped together in a double helix. The bleeding of a signal from one wire to another and which can corrupt signal and cause network errors. This form of signal interference is called crosstalk. To reduce crosstalk wires are twisted in pair in twisted pair cables.
  • 26. PROS-N-CONS Advantages: simple, flexible physically, easy to install and maintain, easily connected, very inexpensive. Disadvantages: incapable in long range transmission without repeaters due to high attenuation (reduction, decrease), low bandwidth, supports merely data rates of 1Mbps &10 Mbps (with conditioning).
  • 27. TYPES There are Two Types of twisted pair cable: Unshielded Twisted Pair ( U T P ) Shielded Twisted Pair ( S T P )
  • 28. UNSHIELDED TWISTED PAIR ( U T P ) UTP cabling is used for variety of electronic communications. Available in 5 categories Type Description CAT1 Voice Grade communication only; no data transmission CAT2 Data Grade Transmission up to 4 Mbps CAT3 Data Grade Transmission up to 10 Mbps CAT4 Data Grade Transmission up to 16 Mbps CAT5 Data Grade Transmission up to 1000 Mbps
  • 29. SHIELDED TWISTED PAIR SHIELDED TWISTED PAIR(STP): This type of cable comes with shielding of the individual pairs of wires, which further protects it from external interference. Only advantage over the UTP is greater protection from crosstalk & interference. However, it’s heavier & costlier & requires proper grounding at both ends. The max segment length is same as UTP.
  • 30. COAXIAL CABLE It consists of a solid wire core surrounded by one or more foil or wire shields, each separated by some kind of plastic insulator. The inner core carries the signal, and the shield provides the ground, has high electrical properties & is suitable for high speed communication used for TV signals. Its data transmission characteristics are considerably higher & so it’s used as the basis for a shared cable network, with part of the bandwidth being used for data traffic.
  • 31. COAXIAL CABLE It consists of a solid wire core surrounded by one or more foil or wire shields, each separated by some kind of plastic insulator. The inner core carries the signal, and the shield provides the ground, has high electrical properties & is suitable for high speed communication used for TV signals. Its data transmission characteristics are considerably higher & so it’s used as the basis for a shared cable network, with part of the bandwidth being used for data traffic.
  • 32. COAXIAL CABLE Advantages: Greater speed, can be used as a basis for a shared cable network. Can be used for broadband transmission. Bandwidth up to 400 MBPS. Disadvantages: expensive, not compatible with twisted pair cables Types of coaxial cables: Thicknet: This is thicker than thinnet. Its segments can be up to 500 meters. Thinnet: this form of coaxial cable is thinner and it can have max. length of 185 meters.
  • 33. OPTICAL FIBER Advantages: immune to electrical & magnetic interference. Highly suitable for harsh industrial environment. Secure transmission & high transmission capacity. Can be Used for broadband transmission. Disadvantage: inst6allation problem. Are fragile & may need special care to provide the robustness required for office environment. Connecting two fibers together or a light source.
  • 34. Types of Fiber Optic Cables Fiber Optic cables can be either Single Node that supports segment length of up to 2 Kms and bandwidth of up to 100 Mbps Multimode with segment length of up to 100Kms and bandwidth of 2Gbps.
  • 35. COMPARISON Type Type Sub type Maxim um Segme nt Length Bandwi dth Support ed Installati on Cost Interfer ence Twisted Pair Cable UTP STP 100 Mtrs 100 Mtrs 200 Mbps 500 Mbps Easy Moderate Cheapest Moderate High Moderate Coaxial Cable Thinnet Thicknet 185 Mtrs 500 Mtrs 10 Mbps 10 Mbps Easy Hard Cheap Moderate Moderate Low Fiber Optic Cable Multinode Singlenode 2 Kms 100 Kms 100 Mbps 2 Gbps Very Hard Expensive None None
  • 36. Radio Wave  Radio wave can be used for connecting computers in the network. Radio waves have frequency between 10 KHz and 1 GHz. It has following properties. (a) Radio waves are easy to generate (b) They can travel long distance. (c) They can penetrate buildings easily. (d) Radio waves are Omni-directional.
  • 37. Micro Wave  Microwave is a radio wave of high frequency.  Above 1GHz, the radio waves travel in straight line and requires line of sight communication.  It is widely used for long distance communication where the wire media is not possible.  It is inexpensive compare to wired media.
  • 38. Satellite  A satellite communication system basically consists of a satellite in space and many earth stations on the ground which are linked with each other through the satellite. It covers the large geographical area.
  • 39. Infrared Link  It is short range waves and widely used in remote controls. They are directional, cheap and easy to build but not pass through solid objects.
  • 40. Network Topology  Topology is the method in which networks are physically connected together. Topology determines the complexity of connecting computers and therefore the cost of network equipment installation. If cables are used, then cable-cost can be major cost factor for network system.
  • 41. Bus Topology In bus topology, all computers are connected by a single length of cable with a terminator at each end. The bus topology is the simplest and most widely used for local area network. It is passive topology which means only one computer at a time can send a message.
  • 42. Bus Topology - Advantage  Simple, Reliable and easy to used in small sized local area networks.  The bus requires the least amount of cable to connect the computers together and it is therefore less expensive than other cabling arrangements.  It is easy to extend a bus. Two cables can be joined into one longer cable with a connector, making a longer cable and allowing more computers to join the network.
  • 43. Bus Topology - Disadvantage  Heavy network traffic can slow down data transfer on a bus.  It is difficult to troubleshoot a bus. A cable break or malfunctioning computer any where between tow computers can cause them not to be able to communicate with each other.
  • 44. Ring Topology This layout is similar to the liner bus, except that the nodes are connected in a circle using cable segments. In this layout, each node is physically connected to only two other nodes. Each node passes information along to the next, until it arrives at its intended destination. Since each computer re-transmits what it receives, a ring is an active network and is not subject to the signal loss problems which a bus topology experiences. There is no termination because there is no end to the ring.
  • 45. Ring Topology Advantage: (a) Faster than bus topology. Disadvantages (a) Failure of one computer on the ring affects the whole network. (b) Difficult to add new computer in a network
  • 46. Star Topology A star topology is a topology for a Local Area Network (LAN) in which all nodes are individually connected to a central connection point, like a hub or a switch. A star takes more cable than e.g. a bus, but the benefit is that if a cable fails, only one node will be brought down.
  • 47. NETWORK DEVICES MODEM RJ45 CONNECTOR ETHERNET CARD HUB SWITCH ROUTER GATEWAY
  • 48. Network Devices - Modem A modem (modulator-demodulator) is a device that modulates signals to encode digital information and demodulates signals to decode the transmitted information.
  • 49. Network Devices - RJ 45 Connector RJ Stands for Registered Jack. RJ Connectors is a family of push and click connectors for twisted pair wiring in telephone and network wiring. It is an 8- wire telephone type connector used with twisted pair cabling for connecting computers.
  • 50. Network Devices Ethernet Card (NIC Card) Short for Network Interface Card, a NIC is also commonly referred to as an Ethernet card and network adapter and is an expansion card that enables a computer to connect to a network such as a home network or the Internet using an Ethernet cable with a RJ-45 connector. The picture is an example of aSMC EZ Card 10/100 PCI network card, a network card commonly found in most desktop computers today that do not already have an onboard network on their motherboard.
  • 51. Network Devices - Ethernet Card (NIC Card)
  • 52. Network Devices - Repeater In telecommunications, a repeater is an electronic device that receives a signal and retransmits it at a higher level or higher power, or onto the other side of an obstruction, so that the signal can cover longer distances. It is used to regenerate the signal which is on its way through a communication channel. A repeater regenerates the received signal and retransmits it to its destination.
  • 53. Network Devices - RepeaterNetwork Devices - Repeater
  • 54. Network Devices - Hub A common connection point for devices in a network. Hubs are commonly used to connect segments of a LAN. A hub contains multiple ports. When a packet arrives at one port, it is copied to the other ports so that all segments of the LAN can see all packets.
  • 56. Network Devices - Bridge A Bridge goes one step up on a hub in that it looks at the destination of the packet before sending. If the destination address is not on the other side of the bridge it will not transmit the data. A bridge only has one incoming and one outgoing port. To build on the email analogy above, the bridge is allowed to decide if the message should continue on. It reads the address bob@smith.com and decides if there is a bob@smith.com on the other side. If there isn't, the message will not be transmitted. Bridges are typically used to separate parts of a network that do not need to communicate regularly, but still need to be connected.
  • 57. Network Devices - Switch A switch steps up on a bridge in that it has multiple ports. When a packet comes through a switch it is read to determine which computer to send the data to. This leads to increased efficiency in that packets are not going to computers that do not require them. Now the email analogy has multiple people able to send email to multiple users. The switch can decide where to send the mail based on the address. Most large networks use switches rather than hubs to connect computers within the same subnet.
  • 59. Network Devices - Router A router is similar in a switch in that it forwards packets based on address. But, instead of the MAC address that a switch uses, a router can use the IP address. This allows the network to go across different protocols. The most common home use for routers is to share a broadband internet connection. The router has a public IP address and that address is shared with the network. When data comes through the router it is forwarded to the correct computer.
  • 60. Network Devices - Router This comparison to email gets a little off base. This would be similar to the router being able to receive a packet as email and sending it to the user as a fax.
  • 62. Network Devices - Gateway A gateway is a network device that connects dissimilar networks. It establishes an intelligent connection between a local network and external networks with completely different structures. A gateway can recover e-mail messages in one format and convert them into another format. A gateway is a device which is used to connect different types of network such as Windows NT and UNIX network.
  • 63. HTML HTML: WHAT IT IS? Document-layout & hyperlink-specification language i.e., a language used to design the layout of a document & specify the hyperlinks.. Html tells the browser how to display the contents of a hypertext document i.e., a document including text, images & other supported media. It also tells how to make the page interactive by using special hyperlinks.
  • 64. HTML HTML: WHAT IT IS NOT? First of all it is not a programming language but just a descriptive language. It’s neither a word processing tool nor a desktop publishing solution. It’s just a page- layout & hyperlink specification-language.
  • 65. XML  XML is a markup language for documents containing structured information.  Structured information contains both content ( words, images etc.) & indication of what role does that content play content in a footer is different from that of header or content in a caption is different from a title). (HTML==XML) ??  NO. In HTML tags and semantics meaning/role of tags) is fixed unlike in XML.  XML permits to define tags and structural relationships between them. Since there’s no predefined tag set there can’t be any pre-established semantics. All the semantics of an XML is either defined by the applications that process them or by the used stylesheets.
  • 66. DHTML  Dynamic HTML refers to web content that changes each time it is viewed. e.g. same page could result in a different page depending upon : Geographic location of the reader Time of day Previous pages viewed by the reader Profile of the reader  DHTML refers to new HTML extensions that will enable a web page to react to user input without sending requests to the web server.  It can be thought of as “animated HTML”. Ex:- a piece of text can change from one color to another upon clicking or after some time.
  • 67. NETWORK PROTOCOLS TCP/IP, FTP, PPP LEVEL-REMOTE LOGIN(TELNET),INTERNET, WIRELESS/MOBILE COMMUNICATION GSM, CDMA, WLL, 3G, SMS,VOICE MAIL, APPLICATION,E-MAIL,CHAT,VIDEO CONFERENCING
  • 68. TCP/IP Transmission control protocol/internet protocol is a layered set of protocols. TCP is responsible for making sure that the commands get through to the other end. It keeps track of all that is sent and sends again something if it didn’t get through.
  • 69. FTP It stands for File Transfer Protocol. Responsible for Downloading and Uploading services on internet.
  • 70. TELNET Telnet protocol allows the user to logon into remote machine in which user has his account.
  • 71. SLIP (SERIAL LINE INTERNET PROTOCOL) SLIP is a TCP/IP protocol used for communication between two machines that are previously configured for communication with each other. For example, your Internet server provider may provide you with a SLIP connection so that the provider's server can respond to your requests, pass them on to the Internet, and forward your requested Internet responses back to you. Your dial-up connection to the server is typically on a slower serial line rather than on the parallel or multiplex lines such as a line of the network you are hooking up to.
  • 72. PPP (POINT TO POINT PROTOCOL) PPP means Point to Point Protocol. It is a much more developed protocol than SLIP (which is why it is replacing it), insofar as it transfers additional data, better suited to data transmission over the Internet (the addition of data in a frame is mainly due to the increase in bandwidth).
  • 73. WIRELESS PROTOCOLS - GSM • Short for Global System  for Mobile  communications, one of the leading digital cellular systems. GSM uses narrowband TDMA, which allows eight simultaneous calls on the same radio frequency. • GSM was first introduced in 1991.
  • 74. WIRELESS PROTOCOLS - CDMA CDMA stands for Code Division Multiple Access. It is a wireless communication technology that allows multiple people to use a single radio channel at the same time with little interference and very high security. Conventional communication systems transmit and receive on one constant frequency; CDMA "spreads" a radio signal over a large frequency range, using a unique code to identify each transmitter/receiver pair. This allows many users to communicate on the same channel while making each transmission largely immune to natural interference, eavesdropping, and jamming.
  • 75. WEB SERVERS HTML , DHTML XML HTTP URL & DOMAIN NAMES PROTOCOL ADDRESSES WEBSITE WEB BROWSER WEB SERVERS WEB HOSTING WEB SCRIPTING CLIENT SIDE & SERVER SIDE
  • 76. HTTP  Hyper Text Transfer Protocol is an application- level but light & fast protocol.  It’s a generic, stateless, object oriented protocol.  Another feature is typing of data representation, allowing systems to be built independently of the data being transferred. It has been in use by WWW since 1990.  HTTP allows an open-ended set of methods to be used to indicate the purpose of a request.  It builds on the discipline of URI (Uniform Resource  Identifier),  as a location or name, for locating resource on which method is to be applied.
  • 77. HTTP  Messages are passed to the HTTP in a format same as internet email or MIME (Multipurpose Internet Mail Extensions). HTTP is also used as a generic protocol for communication between gateways/proxies etc. to other protocols.  It consists of two fairly distinct items:  1. set of requests from browsers to servers 2. set of responses going the other way.  Though HTTP was designed to work with web but it’s been made more general to accommodate future possibilities of OO applications.  HTTP has different built-in methods to allow users to open a web page, to disconnect an existing connection, to read the header of a webpage, to append to an existing resource or to store a webpage etc.
  • 78. URL & DOMAIN NAMES HTTP uses internet address in a special format called a Uniform Resource Locator or URL. Typically URLs look like this: type://address/path Type:- type of server address (also the protocol they use):- address of the server path:- location of file on the server. In the address last group of characters (.com, .gov etc.) is domain indicator.
  • 79. URL & DOMAIN NAMES The naming scheme by which servers are identified is known as domain name system. Another method of addressing (identifying server) is by assigning distinct numbers known as IP addressing method. Such addresses are called as IP addresses. Lastly, a url specifies a distinct address for each  resource on the net. A character based internet  address is a domain name. 
  • 80. WEB-BROWSERS & SERVERS A web browser is a WWW client that navigates through the World Wide Web and displays web- pages. A web server is a WWW server that responds to the requests made by the web browsers.
  • 81. WEB SITES, ADDRESSES & PAGES A location on a net server is called web sites. The unique address of each (URL) is called address. A web page is document or simply a page in a web site.
  • 82. WEB HOSTING  Web hosting is a means of hosting web-server application on a computer system through which electronic content on the internet is readily available to any web browser client.
  • 83. WEB HOSTING  Web Hosting Can Be Grouped Under: 1. Free Hosting: site hosting for free. You too can put up own websites for raw fun. 2. Virtual or Shared Hosting: virtual hosting is where one’s site is hosted on the web server of the hosting company along with other web-sites giving 24-hour access& can be updated through a password log-in. 3. Dedicated Hosting: a dedicated server is rented usually for big websites by companies. Dedicated for large, high traffic, or for those with special needs e.g. e- commerce, security.
  • 84. WEB HOSTING co-location hosting: For those who do not fit the dedicated server mold. Hosting companies offer a similar but less restrictive hosting known as co-location hosting. In this type hosting the company actually owns the server on which site is hosted. That is the company owning the site rather than web hosting company, is responsible for all server administration and the web hosting company provides physical requirements of rack, high speed connection, a regular power supply, and a limited amount of technical support such as data back up or hardware upgrades.
  • 85. WEB SCRIPTING  A script is a list of commands embedded in a web-page. Scripts are interpreted and executed by a certain program or script-engine.  Most common scripting languages are VBScript, ASP(Active Server Pages), JavaScript, PHP(Hypertext Preprocessor), PERL, JSP etc.
  • 86. WEB SCRIPTING Types of scripts: Client-side script : It enables interaction within the web-page, is downloaded and executed by the browser (is browser-dependent i.e. browser must be enabled to run the script).Applications : To get data from user’s screen or browser, online games, customized web-pages. Server-side script: It supports execution at server end. Results are sent to the client, is browser independent of browsers. APPLICATIONS : password protection, dynamic addition of content to web-pages.
  • 87. OPEN SOURCE TERMINOLOGIES OPEN SOURCE SOFTWARE FREEWARE SHAREWARE PROPRIETARY SOFTWARE FLOSS GNU FSF OSI
  • 88. OPEN SOURCE SOFTWARE  Open Source Software commonly means software whose licenses do not impose much conditions. Users are free to use, modify & distribute software hassle-free but not certainly free of charge.  It has been officially defined by the open source definition at http://www.opensource.org/docs/definition_plain.html. and It states that :-
  • 89. OPEN SOURCE SOFTWARE  Open  source  doesn’t  just  mean  access  to  source  code.  The  distribution  terms  of  open-source  software  must  comply with the following criteria :-  Free Redistribution  Source Code  Derived Works  Integrity of The Author’s Source Code  No Discrimination Against Persons Or Groups  No Discrimination Against Fields Of Endeavor  Distribution Of License  License Must Not Be Specific To A Product  The License Must Not Restrict Other Software  License Must Be Technology Neutral
  • 90. FREEWARE The term freeware has no clear definition, but generally refers to free of cost & redistributable software, but no modification & no source code. It is distributed in binary form. Freeware is often used in marketing situations in order to sell products and gain market advantages. One example is Microsoft Internet Explorer. 
  • 91. SHAREWARE Shareware is a software, which is made available with the right to redistribute copies, but it is stipulated that if one intends to use the software, often after a certain period of time, then a license fee must be paid. Source code & modifiability absent. The objective is to increase no. of prospective users. Generally a built-in timed mechanism limits the functionality after a certain period of time.
  • 92. PROPRIETARY SOFTWARE Neither open nor free, its use is regulated and further distribution and modification is either forbidden or requires special permission by the supplier or vendor. Normally the source code is not given to the user.
  • 93. FLOSS FLOSS refers to Free Livre And Open Source Software  or Free Libre And Open Source Software. The term is used for software that is both free  software and open software. Here the words libre(a Spanish word) or livre(a Portuguese word) mean freedom.
  • 94. GNU GNU is a recursive acronym for GNU’s NOT UNIX. This project was initiated by richard m. stallman with an objective to create a system compatible with UNIX but not same as UNIX. It has not only made an OS but the project has grown since its inception and now it creates software of almost all kinds. The same person founded the Free Software  Foundation.
  • 95. FSF FSF is Free  Software  Foundation.  It is a non profit organization created to support free software movement in 1985 by Richard  M  Stallman. FSF has funded many software developers to write free software. Now a days, it also works on legal and structural issues for the free software community.
  • 96. OSI OSI is Open Source Initiative founded by Bruce perens & erics raymond (in Feb 1998) . It specifies the criteria for open source software & properly defines terms and specifications for open source software.
  • 97. W3C W3C is acronym for World Wide Web Consortium. W3C is responsible for producing the software standards for the world wide web. The W3C was created in Oct 1994, to lead the world wide web to its full potential by developing common protocols that promote its evolution and ensure its interoperability.
  • 98. W3C The consortium is international: Jointly hosted by MIT Lab for Computer Science in the United States and in Europe by INRIA who provides both local support and performing core development. The W3C was initially established in collaboration with CERN where the Web is organized and with support from DARPA and the European Commission.
  • 99. NETWORK SECURITY CONCEPTS THREATS AND PREVENTION FROMTHREATS AND PREVENTION FROM VIRUSES,WORMS,TROJAN HORSE, SPAMSVIRUSES,WORMS,TROJAN HORSE, SPAMS USE OF COOKIES, PROTECTION USINGUSE OF COOKIES, PROTECTION USING FIREWALLFIREWALL INDIA IT ACT, CYBER LAWS, CYBER CRIMESINDIA IT ACT, CYBER LAWS, CYBER CRIMES IPR ISSUES, HACKINGIPR ISSUES, HACKING
  • 100. VIRUSES Computer Virus is a malicious program that requires a host & is designed to make a system sick, just like a real virus. Three basic types:- File infectors (attach themselves to a program file) Boot sector viruses (installs themselves on) Macro viruses (infect data files).
  • 101. VIRUSES Characteristics of a virus are replicatibility, requirement of host, external activation, replication ability is limited to (virtual)system. DAMAGES:- Can destroy FAT Can create bad sectors on disk or duplicate itself Can format entire disk or a specific tracks Can destroy specific executable files and alter data files, causing loss of integrity Can hang the system.
  • 102. TROJAN HORSES  A Trojan horse is a code hidden in a program such as a game or a spreadsheet that looks safe to run but has hidden side effects.  Trojan horses spread through e-mail, exchange of disks & information exchange. Worms also spread Trojans.  It causes damages what a virus can but only difference is its masking effect which hides its operation.
  • 103. WORMS A worm is a program designed to replicate. Characteristics of a WORMS: Can replicate. No host or is self contained. Activated by creating a process (need for a multi-tasking system). If a network worm, will replicate across communication links.
  • 104. WORMS How they Spread? Worms are generally found in multitasking & network systems. Worms, they spread autonomously, without needing any other program, user’s action or intervention etc. Damage ? Disrupt or create system management problems. Some scan for passwords and other loopholes then send it to the attacker. Some times they install Trojans or viruses that damage our system.
  • 105. SPAM  Spam refers to electronic junk mail or junk newsgroup postings. Some people define spam more generally as any unsolicited e-mail.  Merriam-webster dictionary defines spam as unsolicited usually commercial e-mail sent to a large number of addresses.  AVOIDING SPAM  Creating a filter that finds and does something to e-mail that you suspect is spam.  Another escape is not to register yourself with a true id to sign up for things on the net. These places often share that e-mail id with other companies that fills you with spam in exchange of benefits.
  • 106. VIRUS PREVENTION  It is not an easy task. Needs extra carefulness & adherence to these guidelines:-  Never use a foreign disk without scanning for viruses.  Scan files downloaded from internet. Always.  Never boot computer from a floppy which may contain virus.  Write protect your disks.  Use licensed software.
  • 107. VIRUS PREVENTION  Password protect your pc to prevent unattended modifications.  Make regular backups.  Install & use antivirus software.  Keep antivirus software up to date.
  • 108. CYBER LAW  Cyber law is a generic term which refers to all the legal and regulatory aspects of the internet and the World Wide Web.  Cyber law is important because it touches almost all aspects of the transactions and activities on and concerning the internet.  India’s IT Act  In India the cyber laws are contained in the Information Technology Act, 2000 (IT Act 2000) which was notified on 17 October 2000.
  • 109. CYBER CRIMES  The Cambridge dictionary defines Cyber Crime as Crimes committed with the use of computers or relating to computers, especially through internet. Classifications of Cyber Crimes 1. Tampering with Computer Source Documents. 2. Hacking 3. Publishing of Information, which is obscene in the electronic form. 4. Child Pornography 5. Accessing Protected Systems. 6. Breach of Confidentiality and Privacy.
  • 110. IPR ISSUES  The Term Intellectual Property (IP) may be defined as a product of the intellect that has commercial value including copyrighted property such as literacy or artistic works and ideational property.  Intellectual property rights are leagal rights which results from intellectual activity in industrial, scientific, literary and artistic fields.
  • 111. CLOUD COMPUTING  Cloud computing is a recently evolved computing terminology or metaphor based on utility and consumption of computing resources. Cloud computing involves deploying groups of remote servers and software networks that allow centralized data storage and online access to computer services or resources. Clouds can be classified as public, private or hybrid.
  • 112. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Agility improves with users' ability to re-provision technological infrastructure resources.  Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers.
  • 113. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Agility improves with users' ability to re-provision technological infrastructure resources.  Application programming interface (API) accessibility to software that enables machines to interact with cloud software in the same way that a traditional user interface (e.g., a computer desktop) facilitates interaction between humans and computers.
  • 114. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Cost reductions claimed by cloud providers. A public- cloud delivery model converts capital expenditure to operational expenditure.[35] This purportedly lowers barriers to entry, as infrastructure is typically provided by a third party and does not need to be purchased for one-time or infrequent intensive computing tasks. Pricing on a utility computing basis is fine-grained, with usage-based options and fewer IT skills are required for implementation (in-house).
  • 115. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Device and location independence[38] enable users to access systems using a web browser regardless of their location or what device they use (e.g., PC, mobile phone). As infrastructure is off-site (typically provided by a third-party) and accessed via the Internet, users can connect from anywhere.  Maintenance of cloud computing applications is easier, because they do not need to be installed on each user's computer and can be accessed from different places.
  • 116. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Multitenancy enables sharing of resources and costs across a large pool of users thus allowing for:  centralization of infrastructure in locations with lower costs (such as real estate, electricity, etc.)  peak-load capacity increases (users need not engineer for highest possible load-levels)  utilisation and efficiency improvements for systems that are often only 10–20% utilised.
  • 117. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Performance is monitored, and consistent and loosely coupled architectures are constructed using web services as the system interface.  Productivity may be increased when multiple users can work on the same data simultaneously, rather than waiting for it to be saved and emailed. Time may be saved as information does not need to be re-entered when fields are matched, nor do users need to install application software upgrades to their computer.
  • 118. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Reliability improves with the use of multiple redundant sites, which makes well-designed cloud computing suitable for business continuity and disaster recovery.  Scalability and elasticity via dynamic ("on- demand") provisioning of resources on a fine-grained, self-service basis in near real-time] (Note, the VM startup time varies by VM type, location, OS and cloud providers [45] ), without users having to engineer for peak loads.
  • 119. CHARACTERSTICS OF CLOUD COMPUTING  Cloud computing exhibits the following key characteristics:  Security can improve due to centralization of data, increased security-focused resources, etc., but concerns can persist about loss of control over certain sensitive data, and the lack of security for stored kernels. Security is often as good as or better than other traditional systems, in part because providers are able to devote resources to solving security issues that many customers cannot afford to tackle.
  • 120. The National Institute of Standards and Technology "NIST" • The National Institute of Standards and Technology (NIST), known between 1901 and 1988 as the National Bureau of Standards (NBS), is a measurement standards laboratory, also known as a National Metrological Institute (NMI), which is a non- regulatory agency of the United States Department of Commerce. The institute's official mission is to:[1] • Promote U.S. innovation and industrial competitiveness by advancing measurement science, standards, and technologyin ways that enhance economic security and improve our quality of life.
  • 121. The National Institute of Standards and Technology "NIST" The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics":  On-demand self-service. A consumer can unilaterally provision computing capabilities, such as server time and network storage, as needed automatically without requiring human interaction with each service provider.  Broad network access. Capabilities are available over the network and accessed through standard mechanisms that promote use by heterogeneous thin or thick client platforms (e.g., mobile phones, tablets, laptops, and workstations).
  • 122. The National Institute of Standards and Technology "NIST" • The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics":  Resource pooling. The provider's computing resources are pooled to serve multiple consumers using a multi- tenant model, with different physical and virtual resources dynamically assigned and reassigned according to consumer demand.
  • 123. The National Institute of Standards and Technology "NIST" • The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics":  Rapid elasticity. Capabilities can be elastically provisioned and released, in some cases automatically, to scale rapidly outward and inward commensurate with demand. To the consumer, the capabilities available for provisioning often appear unlimited and can be appropriated in any quantity at any time.
  • 124. The National Institute of Standards and Technology "NIST" • The National Institute of Standards and Technology's definition of cloud computing identifies "five essential characteristics":  Measured service. Cloud systems automatically control and optimize resource use by leveraging a metering capability at some level of abstraction appropriate to the type of service (e.g., storage, processing, bandwidth, and active user accounts). Resource usage can be monitored, controlled, and reported, providing transparency for both the provider and consumer of the utilized service.—National Institute of Standards and Technology[2]
  • 126. CLOUD COMPUTING TYPES Private cloud Private cloud is cloud infrastructure operated solely for a single organization, whether managed internally or by a third-party, and hosted either internally or externally.[ Undertaking a private cloud project requires a significant level and degree of engagement to virtualize the business environment, and requires the organization to re-evaluate decisions about existing resources.
  • 128. CLOUD COMPUTING TYPES Public cloud A cloud is called a "public cloud" when the services are rendered over a network that is open for public use. Public cloud services may be free.[68] Technically there may be little or no difference between public and private cloud architecture, however, security consideration may be substantially different for services (applications, storage, and other resources) that are made available by a service provider for a public audience and when communication is effected over a non-trusted network.
  • 129. CLOUD COMPUTING TYPES Public cloud Saasu is a large public cloud. Generally, public cloud service providers like Amazon AWS, Microsoft and Google own and operate the infrastructure at their data center and access is generally via the Internet. AWS and Microsoft also offer direct connect services called "AWS Direct Connect" and "Azure ExpressRoute" respectively, such connections require customers to purchase or lease a private connection to a peering point offered by the cloud provider
  • 130. CLOUD COMPUTING TYPES Hybrid cloud Hybrid cloud is a composition of two or more clouds (private, community or public) that remain distinct entities but are bound together, offering the benefits of multiple deployment models. Hybrid cloud can also mean the ability to connect collocation, managed and/or dedicated services with cloud resources
  • 132. Q.1 What is protocol? How many types of protocols are there? Ans. When computers communicate each other, there needs to be a common set of rules and instructions that each computer follows. A specific set of communication rules is called a protocol. Some protocol: PPP, HTTP, SLIP, FTP, TCP/IP HIGHER ORDER THINKING QUESTIONS
  • 133. Q.2 What is the difference between Networking and Remote Networking? Ans. The main difference between Networking and Remote Networking, is the network which we use in offices or other places locally such LAN or INTERNET and remote networking is one which we use TERMINAL Services to communicate with the remote users such WAN. HIGHER ORDER THINKING QUESTIONS
  • 134. HIGHER ORDER THINKING QUESTIONS Q.3 What is point-to-point protocol? Ans. A communication protocol used to connect computer to remote networking services include Internet Service Providers. In networking, the Point- to-Point protocol is commonly used to establish a direct connection between two nodes. Its primary use has been to connect computers using a phone line.
  • 135. HIGHER ORDER THINKING QUESTIONS Q.4 How gateway is different from router? Ans. A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures. Routers allow different networks to communicate with each other. They forward packets from one network to another based on network layer information. A gateway can interpret and translate the different protocols that are used on two distinct networks. Unlike routers that successfully connect networks with protocols that are similar, a gateway perform an application layer conversion of information from one protocol stack to another.
  • 136. HIGHER ORDER THINKING QUESTIONS Q.5 What is the role of network administrator? Ans. Basic tasks for which a network administrator may be responsible: Setting up and configuring network hardware and software.  Installing and configuring network media and connections. Connecting user nodes and peripherals of all kinds to the network. Adding users to and removing users from the network.  Managing user account.  Ensuring the security of the network. Provide training to the users to utilize the network’s resources.
  • 137. HIGHER ORDER THINKING QUESTIONS Q.6 What is the difference between baseband and broadband transmission? Ans. Baseband is a bi-directional transmission while broadband is a unidirectional transmission. No Frequency division multiplexing possible in base band but possible in broadband.
  • 138. HIGHER ORDER THINKING QUESTIONS Baseband Broadband Entire bandwidth of the cable is consumed by a signal broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. Digital signals Analog signals bi-directional transmission unidirectional transmission No Frequency division multiplexing possible Frequency division multiplexing possible Uses for short distance Uses for long distance
  • 139. HIGHER ORDER THINKING QUESTIONS Q.7 What are the difference between domain and workgroup? Domain Workgroup One or more computers are servers All Computers are peers. If you have a user account on the domain, you can logon to any computer on the domain. Each computer has a set of accounts. There can be 100+ computers Typically not more then 20-30 computers The computers can be on different local network All computers must be on the same local netork.