SlideShare a Scribd company logo
1 of 6
Download to read offline
COMPUTER NETWORK
RIFDHY RM
(Cyber Security Engineer)
Networking Module
1. What is a computer network? Briefly describe with examples
A set of devices connected to each other using a physical transmission medium. For
Example, A computer network is a group of computers connected with each other to
communicate and share information and resources like hardware, data, and software.
2. What are the main network types? Explain.
There are mainly three types of computer networks based on their size:
1. Local Area Network (LAN)
▪ Local area network is a group of computers connected with each other in a small
place such as school, hospital, apartment etc.
▪ LAN is secure because there is no outside connection with the local area network
thus the data which is shared is safe on the local area network and can’t be
accessed outside.
▪ LAN due to their small size are considerably faster, their speed can range
anywhere from 100 to 100Mbps.
▪ LANs are not limited to wire connection, there is a new evolution to the LANs
that allows local area network to work on a wireless connection
2. Metropolitan Area Network (MAN)
MAN, network covers larger area by connections LANs to a larger network of
computers. In Metropolitan area network various Local area networks are connected
with each other through telephone lines. The size of the Metropolitan area network is
larger than LANs and smaller than WAN (wide area networks), a MANs covers the
larger area of a city or town
3. Wide area network (WAN)
Wide area network provides long distance transmission of data. The size of the WAN
is larger than LAN and MAN. A WAN can cover country, continent or even a whole
world. Internet connection is an example of WAN. Other examples of WAN are
mobile broadband connections such as 3G, 4G etc.
3. Describe followings with examples
o Client computer and Server Computer
Client/Server computing is a computing model in which client and server computers
communicate with each other over a network. In client/server computing, a server
takes requests from client computers and shares its resources, applications and/or data
with one or more client computers on the network, and a client is a computing device
that initiates contact with a server in order to make use of a shareable resource.
o Intranet and extranet
▪ Intranet:
Intranet is owned by a single organization and is a tool for sharing information
throughout the organization. It is the type of Internet that is used privately. Since,
intranet is a private network so no one can use the intranet whose have not valid
username and password. In intranet, there are a limited number of connected
devices as compared to internet. Intranet is highly secure and has a small number of
visitors. It is used in order to get employee information, telephone directory etc.
▪ Extranet:
Extranet is owned by either a single or a many organization. It is managed on a
contractual basis between organizations and is a tool for sharing information
between the internal members and external members. Like intranet, it is also a
private network so only those who have a valid username and password can use the
extranet. Extranet is used to check status, access data, send mail, place order etc.
o Guided & unguided media
▪ Guided − In guided media, transmitted data travels through cabling system that
has a fixed path. For example, copper wires, fibre optic wires, etc.
▪ Unguided − In unguided media, transmitted data travels through free space in form
of electromagnetic signal. For example, radio waves, lasers, etc.
o Standalone emails & web-based emails.
▪ Web-based emails
You can access Web mail from any Internet-connected device, whereas you can
only use an email client on the specific device the client software is installed on.
Web mail, however, can only be read when you are online, unlike client-based
email which usually provides offline access. Also, clients can often be set up to
retrieve messages from Web mail accounts, such as Gmail, Yahoo or
Outlook.com, so you can read email from your Web mail provider in the client of
your choice
.
▪ Standalone emails
Webmail (or web-based email) is any email client implemented as a web
application running on a web server. Examples of webmail software are Round
cube and Squirrel Mail. Examples of webmail providers are AOL Mail, Gmail,
Outlook.com/Hotmail.com, Rackspace Email, Yahoo! Mail and Ice Warp Mail
Server. Many webmail providers also offer email access by a desktop email client
using standard email protocols, while many internet service providers provide a
webmail client as part of the email service included in their internet service
package.
4. What are the five main networking topologies? Describe using examples.
1. Mesh Topology
In mesh topology each device is connected to every other device on the network
through a dedicated point-to-point link. When we say dedicated it means that the link
only carries data for the two connected devices only. Let’s say we have n devices in
the network then each device must be connected with (n-1) devices of the network.
Number of links in a mesh topology of n devices would be n(n-1)/2
2. Star Topology
In star topology each device in the network is connected to a central device called
hub. Unlike Mesh topology, star topology doesn’t allow direct communication
between devices, a device must have to communicate through hub. If one device
wants to send data to other device, it has to first send the data to hub and then the hub
transmits that data to the designated device
3. Bus Topology
In bus topology there is a main cable and all the devices are connected to this main
cable through drop lines. There is a device called tap that connects the drop line to the
main cable. Since all the data is transmitted over the main cable, there is a limit of
drop lines and the distance a main cable can have
4. Ring Topology
In ring topology each device is connected with the two devices on either side of it.
There are two dedicated point to point links a device has with the devices on the
either side of it. This structure forms a ring thus it is known as ring topology. If a
device wants to send data to another device then it sends the data in one direction,
each device in ring topology has a repeater, if the received data is intended for other
device then repeater forwards this data until the intended device receives it.
5. Hybrid topology
A combination of two or more topology is known as hybrid topology. For example, a
combination of star and mesh topology is known as hybrid topology.
5. What is the difference between hub & switch? Explain.
▪ Hub
A hub is to send out a message from one port to other ports. For example, if there are
three computers of A, B, C, the message sent by a hub for computer A will also come to
the other computers. But only computer A will respond and the response will also go out
to every other port on the hub. Therefore, all the computers can receive the message and
computers themselves need to decide whether to accept the message.
▪ Switch
A switch is able to handle the data and knows the specific addresses to send the
message. It can decide which computer is the message intended for and send the
message directly to the right computer. The efficiency of switch has been greatly
improved, thus providing a faster network speed.
▪ What Is the Difference?
Hub Vs. Switch
A hub works on the physical layer (Layer 1) of OSI model while Switch works on the
data link layer (Layer 2). Switch is more efficient than the hub. A switch can join
multiple computers within one LAN, and a hub just connects multiple Ethernet devices
together as a single segment. Switch is smarter than hub to determine the target of the
forwarding data. Since switch has a higher performance, its cost will also become more
expensive.

More Related Content

Similar to COMPUTER NETWORKS EXPLAINED

presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptxbantisworld
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcomAditya
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
LAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxLAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxRohitKumarShah6
 
Network Topology
Network TopologyNetwork Topology
Network TopologyRaj vardhan
 
Assignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxAssignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxIhtishamAhmad20
 
Computer Networking Notes for Tech Placements (1).pdf
Computer Networking Notes for Tech Placements (1).pdfComputer Networking Notes for Tech Placements (1).pdf
Computer Networking Notes for Tech Placements (1).pdfMotivationgarib
 
Computer Networking Notes APNA COLLEGE.pdf
Computer Networking Notes APNA COLLEGE.pdfComputer Networking Notes APNA COLLEGE.pdf
Computer Networking Notes APNA COLLEGE.pdfGAURAVJOSHI782157
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer NetworksPankaj Gautam
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks AfsanaAkterRubi
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notesDr.YNM
 
Computer Networking
Computer NetworkingComputer Networking
Computer NetworkingAlisha Jain
 
Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313FatemaYesminAka
 
Networking notes
Networking notesNetworking notes
Networking notes0718928964
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XIIFernando Torres
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHISowmya Jyothi
 

Similar to COMPUTER NETWORKS EXPLAINED (20)

presentation_internet.pptx
presentation_internet.pptxpresentation_internet.pptx
presentation_internet.pptx
 
Internet tybcom
Internet tybcomInternet tybcom
Internet tybcom
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Network
NetworkNetwork
Network
 
network.pdf
network.pdfnetwork.pdf
network.pdf
 
LAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptxLAN_ROHIT_KUMAR_SHAH.pptx
LAN_ROHIT_KUMAR_SHAH.pptx
 
Computer Network - Unit 1
Computer Network - Unit 1Computer Network - Unit 1
Computer Network - Unit 1
 
Network Topology
Network TopologyNetwork Topology
Network Topology
 
Assignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docxAssignment E-Commerce By IHTISHAM AHMAD.docx
Assignment E-Commerce By IHTISHAM AHMAD.docx
 
Computer Networking Notes for Tech Placements (1).pdf
Computer Networking Notes for Tech Placements (1).pdfComputer Networking Notes for Tech Placements (1).pdf
Computer Networking Notes for Tech Placements (1).pdf
 
Computer Networking Notes APNA COLLEGE.pdf
Computer Networking Notes APNA COLLEGE.pdfComputer Networking Notes APNA COLLEGE.pdf
Computer Networking Notes APNA COLLEGE.pdf
 
Computer networks
Computer networks Computer networks
Computer networks
 
Introduction to Computer Networks
Introduction to Computer NetworksIntroduction to Computer Networks
Introduction to Computer Networks
 
Introduction To Computer Networks
Introduction To Computer Networks Introduction To Computer Networks
Introduction To Computer Networks
 
Data communications Class notes
Data communications  Class notesData communications  Class notes
Data communications Class notes
 
Computer Networking
Computer NetworkingComputer Networking
Computer Networking
 
Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313Ass 2 1834902155 aka 313
Ass 2 1834902155 aka 313
 
Networking notes
Networking notesNetworking notes
Networking notes
 
Computer networking For Class XII
Computer networking For Class XIIComputer networking For Class XII
Computer networking For Class XII
 
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHINETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
NETWORK AND DATABASE CONCEPTS UNIT 1 CHAPTER 2 MRS.SOWMYA JYOTHI
 

Recently uploaded

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetEnjoy Anytime
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024Scott Keck-Warren
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 

Recently uploaded (20)

Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
#StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your BudgetHyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
Hyderabad Call Girls Khairatabad ✨ 7001305949 ✨ Cheap Price Your Budget
 
The transition to renewables in India.pdf
The transition to renewables in India.pdfThe transition to renewables in India.pdf
The transition to renewables in India.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024SQL Database Design For Developers at php[tek] 2024
SQL Database Design For Developers at php[tek] 2024
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 

COMPUTER NETWORKS EXPLAINED

  • 1. COMPUTER NETWORK RIFDHY RM (Cyber Security Engineer) Networking Module
  • 2. 1. What is a computer network? Briefly describe with examples A set of devices connected to each other using a physical transmission medium. For Example, A computer network is a group of computers connected with each other to communicate and share information and resources like hardware, data, and software. 2. What are the main network types? Explain. There are mainly three types of computer networks based on their size: 1. Local Area Network (LAN) ▪ Local area network is a group of computers connected with each other in a small place such as school, hospital, apartment etc. ▪ LAN is secure because there is no outside connection with the local area network thus the data which is shared is safe on the local area network and can’t be accessed outside. ▪ LAN due to their small size are considerably faster, their speed can range anywhere from 100 to 100Mbps. ▪ LANs are not limited to wire connection, there is a new evolution to the LANs that allows local area network to work on a wireless connection 2. Metropolitan Area Network (MAN) MAN, network covers larger area by connections LANs to a larger network of computers. In Metropolitan area network various Local area networks are connected with each other through telephone lines. The size of the Metropolitan area network is larger than LANs and smaller than WAN (wide area networks), a MANs covers the larger area of a city or town 3. Wide area network (WAN) Wide area network provides long distance transmission of data. The size of the WAN is larger than LAN and MAN. A WAN can cover country, continent or even a whole world. Internet connection is an example of WAN. Other examples of WAN are mobile broadband connections such as 3G, 4G etc.
  • 3. 3. Describe followings with examples o Client computer and Server Computer Client/Server computing is a computing model in which client and server computers communicate with each other over a network. In client/server computing, a server takes requests from client computers and shares its resources, applications and/or data with one or more client computers on the network, and a client is a computing device that initiates contact with a server in order to make use of a shareable resource. o Intranet and extranet ▪ Intranet: Intranet is owned by a single organization and is a tool for sharing information throughout the organization. It is the type of Internet that is used privately. Since, intranet is a private network so no one can use the intranet whose have not valid username and password. In intranet, there are a limited number of connected devices as compared to internet. Intranet is highly secure and has a small number of visitors. It is used in order to get employee information, telephone directory etc. ▪ Extranet: Extranet is owned by either a single or a many organization. It is managed on a contractual basis between organizations and is a tool for sharing information between the internal members and external members. Like intranet, it is also a private network so only those who have a valid username and password can use the extranet. Extranet is used to check status, access data, send mail, place order etc. o Guided & unguided media ▪ Guided − In guided media, transmitted data travels through cabling system that has a fixed path. For example, copper wires, fibre optic wires, etc. ▪ Unguided − In unguided media, transmitted data travels through free space in form of electromagnetic signal. For example, radio waves, lasers, etc.
  • 4. o Standalone emails & web-based emails. ▪ Web-based emails You can access Web mail from any Internet-connected device, whereas you can only use an email client on the specific device the client software is installed on. Web mail, however, can only be read when you are online, unlike client-based email which usually provides offline access. Also, clients can often be set up to retrieve messages from Web mail accounts, such as Gmail, Yahoo or Outlook.com, so you can read email from your Web mail provider in the client of your choice . ▪ Standalone emails Webmail (or web-based email) is any email client implemented as a web application running on a web server. Examples of webmail software are Round cube and Squirrel Mail. Examples of webmail providers are AOL Mail, Gmail, Outlook.com/Hotmail.com, Rackspace Email, Yahoo! Mail and Ice Warp Mail Server. Many webmail providers also offer email access by a desktop email client using standard email protocols, while many internet service providers provide a webmail client as part of the email service included in their internet service package. 4. What are the five main networking topologies? Describe using examples. 1. Mesh Topology In mesh topology each device is connected to every other device on the network through a dedicated point-to-point link. When we say dedicated it means that the link only carries data for the two connected devices only. Let’s say we have n devices in the network then each device must be connected with (n-1) devices of the network. Number of links in a mesh topology of n devices would be n(n-1)/2 2. Star Topology In star topology each device in the network is connected to a central device called hub. Unlike Mesh topology, star topology doesn’t allow direct communication between devices, a device must have to communicate through hub. If one device
  • 5. wants to send data to other device, it has to first send the data to hub and then the hub transmits that data to the designated device 3. Bus Topology In bus topology there is a main cable and all the devices are connected to this main cable through drop lines. There is a device called tap that connects the drop line to the main cable. Since all the data is transmitted over the main cable, there is a limit of drop lines and the distance a main cable can have 4. Ring Topology In ring topology each device is connected with the two devices on either side of it. There are two dedicated point to point links a device has with the devices on the either side of it. This structure forms a ring thus it is known as ring topology. If a device wants to send data to another device then it sends the data in one direction, each device in ring topology has a repeater, if the received data is intended for other device then repeater forwards this data until the intended device receives it. 5. Hybrid topology A combination of two or more topology is known as hybrid topology. For example, a combination of star and mesh topology is known as hybrid topology. 5. What is the difference between hub & switch? Explain. ▪ Hub A hub is to send out a message from one port to other ports. For example, if there are three computers of A, B, C, the message sent by a hub for computer A will also come to the other computers. But only computer A will respond and the response will also go out to every other port on the hub. Therefore, all the computers can receive the message and computers themselves need to decide whether to accept the message.
  • 6. ▪ Switch A switch is able to handle the data and knows the specific addresses to send the message. It can decide which computer is the message intended for and send the message directly to the right computer. The efficiency of switch has been greatly improved, thus providing a faster network speed. ▪ What Is the Difference? Hub Vs. Switch A hub works on the physical layer (Layer 1) of OSI model while Switch works on the data link layer (Layer 2). Switch is more efficient than the hub. A switch can join multiple computers within one LAN, and a hub just connects multiple Ethernet devices together as a single segment. Switch is smarter than hub to determine the target of the forwarding data. Since switch has a higher performance, its cost will also become more expensive.