Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
* The old model of a single computer serving all of the organization needs, is rapidly being replaced
by one in which a large number of separate but interconnected computers do the Job, these systems
are called Computer Networks.
• Network is defined as “an interconnected collection of autonomous computers”
Two computers are said to be interconnected if they are capable of exchanging information.
* Computers are AUTONOMOUS, in Networking, i.e. no computer can start, stop or control another.
* NEED OF NETWORKING : a) RESOURCE SHARING
b) RELIABILITY
c) COST FACTOR
d) COMMUNICATION MEDIUM
* APPLICATION OF NETWORKS: a) Sharing
b) Access to remote database
c) Communication Medium
* Node (Workstation) refers to the computer attached to a network and are seeking to share resources
of Network
* A computer becomes a workstation of a Network as soon as it is attached to a Network.
* Server : Computer that facilitates the sharing of software and hardware resources (printers, modems
etc) on the network is Server.
* Each Server has a unique name on Network
* Server → a) Non-dedicated Server : (Small Networks)
b) Dedicated Server : (bigger network)
* Network Interface Unit (NIU) : A NETWORK INTERFACE Unit is an interpreter that helps
establish communication between Server and Workstations.
* N.I.U is a device that is attached to each of workstations and the Server, and helps the workstation
establish the all-important connection with network.
It is also called TAP (terminal Access Point)
* Communication channels of network are ‘Connecting Cables’
* T-Evolution of Networking (ARPANET, INTERNET, INTERSPACE)
It started way back in 1969 by development of first network called ARPANET, which
led to the development of Internet
(a) ARPANET : Advanced Re search Project NETwork the goal of this project was to
connect computers at different universities and US defense
The National Science Foundation (NSF net) create a new high capacity network which allowed only
a academic research.
→ Many Private companies built their own networks, which were later interconnected along
ARPANET and NSF net to form Internet
→ The users of ARPANET were also able to play long distance games and socialize with people
who shared their interests. NSFnet allowed only academic research on its network and not any
kind of private business on it.
(b) INTERNET
→ is a world wide network of computer networks that evolved from first network ARPAnet
→ is made up of many networks each run by a different company and interconnected at
peering points.
→ Common use: Users connected to one network to communicate with users on another network
→ Internet is a world wide Networks of Computer networks
→ It connects many smaller networks together and allows all the computers to exchange information with
each other.
→ All the computers on the Internet have to use a common set of rules for communication, known as
Protocols and Internet uses or set of protocols called TCP/IP (Transmission Control Protocol / Internet
Protocol)
→ most computers are not connected directly to Internet. Rather they are connected to smaller networks,
which is turn are connected through GATEWAYS to the Internet BACKBONE
→ A GATEWAY is a device that connects dissimilar networks.
A BACKBONE is central interconnecting structure that connects one or more networks just like the trunk
2
of a tree or spine of human being.
→ The Reason that Internet works at all, is that every computer connected to it users the same set of rules
for communications known as Protocol.
→ The communication protocol used by internet is TCP/IP,the TCP (TRANSMISSION CONTROL
PROTOCOL)is responsible for dividing file/message into packets on source computer.
TCP is responsible also for resembling the received packets at destination or recipient computer
→ The IP (internet protocol) is responsible for handling address of destination computer so that each packet
is routed to its proper destination
→ The future of Internet is said to be Interspace.
INTERSPACE
→ Interspace is a client / server software program that allows multiple to communicate online with Real-
time audio, video and Text chat in dynamic 3d environment
→ Provides the most advanced form of communication available on Internet today.
→ Interspace is a version of what the Internet will become, when users cross- correlate information in
multiple ways from multiple sources.
T - SWITCHING TECHNIQUES
→ One major purpose and use of networks is the sharing or transfer of data and information
→ Switching Techniques are used for Transmitting data across networks
→ Circuit Switching : When a computer places a telephone call, the switching equipment within the
telephone system seeks out a physical cooper path all the way from sender telephone to the receiver’s
telephone. In general, an important property of it is to setup an end path before any data can be send.
→ Message switching : In this form of switching, no physical copper path is established in advance
between sender and receiver. Instead when the sender has a block of data to be sent, it is stored in first
switching office, then forwarded later, one jump at a time.
→ Packet switching : With message switching there is no limit on block size, in contrast packet
switching places a tight upper limit on block size. Here, all the packets of fixed size are stored in main
memory. This improves the performance as the access time (time taken to access a data packet) is reduced,
thus the through put is improved.
TRANSMISSION MEDIA
→ Transmission media or communication channels means ‘Connecting Cables’ or ‘Connecting media’
→ We can group communication media in two categories : guided media and unguided media
→ The guided media include cables
→ The unguided media include waves through air, water & vacuum
* Twisted Pair Cable *
* Co-axial cable *
* OPTICAL FIBER *
* INFRARED *
* RADIO-LINK *
* MICROWAVE – LINK *
* SATELLITE – LINK *
Twisted pair cable: * It is the most common form of wiring in data communication application
* As a VOICE GRADE MEDIUM, it is basis for most internal office telephone wiring
* → It has wires come in pairs
the pairs of wires are twisted around each other
* Problems can occur due to differences in electrical characteristics between paris (eg,
length, resistance, capacitance). Hence LAN applications will tend to use a higher
Quality Cable known as data grade Medium (DGM)
* The twisting of wires reduces CROSS-TALK, which is bleeding of a signal from one
wire to another and which can corrupt signal and cause network errors.
3
* Advantages : → It is simple
→ It is easy to install and maintain
→ It is Physically flexible
→ It has a low weight
→ It can be easily connected
→ It is very inexpensive
* Disadvantages: → Because of high attenuation, it is incapable carrying a signal over
long distances
→ Its low bandwidth capabilities make it unsuitable for broadband
applications
→ It supports maximum data rates 1Mb ps without conditioning and 10
Mbps with conditioning.
DISADVANTAGES
* Expensive compared to twisted pair cables
* The Coaxial cables are not compatible with twisted pair cables
OPTICAL FIBERS
* Consist of thin strands of glass or glass like material
* Carry light from a source at one end of the fiber to a detector
at other end
* Data to be Transmitted is modulated onto the light beam
using frequency modulation Techniques
* The signal can then be picked up at receiving end and demodulated
* The bandwidth of medium is potentially very high
* The FIBRE CABLE consists of three pieces (i) The CORE, i.e. the glass or plastic through which the light
travels
(ii) The Cladding, which is a covering of core that reflects light back to core
(iii) PROTECTIVE COATING, which protects the fiber cable from hostile environment
ADVANTAGES → It is immune to electrical & magnetic interference, i.e. noise in any form because the
information is travelling on a modulated light beam.
→ highly suitable for harsh industrial environments
→ It guarantees secure Transmission and has very high Transmission capacity
→ Can be used for broadband transmission where several channels are handled in parallel
DISADVANTAGES → Installation Problem since fiber optic are quite fragile and may need special care to
make them robust for environment
→ Connecting either two fibres together or a light source to a fiber is difficult process
→ Light can reach the receiver out of phase
4
→ Connection losses are common problems
→ They are the most expensive of all the cables
INFRARED
* Very popular unguided media, uses infrared light to send data
* Use in TV remotes, automotive garage doors, wireless speakers etc
* Infrared Light transmits data through the air and can propagate throughout a room, but cannot penetrate
walls
* Infrared Transmission has become common in PDAs (Personal digital Assistants) e.g, hand held devices
like palm pilots etc
* It is considered to be a secure one.
RADIO-WAVE
* The Transmission making use of radio frequencies is termed as Radio-wave Transmission
* When Certain Radio-Frequencies are allocated to private business for direct voice communication they can
make use of it for private business purpose
* It use continuous sine waves to transmit information (audio, video data)
* Each different radio signal uses a different sine way frequency, and that is how they are all separated
* Radio setup has two pars : TRANSMITTER : It takes some sort of message, encodes it
onto a sine wave and transmits it with radio waves
RECEIVER: It receives radio waves and decodes the message
from sine wave it receives
* Both Trasmitter and Receiver use ANTENNAS to radiate & Capture radio signal
MICRO – WAVE
* Micro-wave signals are used to Transmit data without the use of cables
* are similar to radio & Television signals and are used for long distance communication
* Consists of a TRANSMITTER, RECEIVER & THE ATMOSPHERE
* Parabolic antennas are mounted on towers to send a beam to other antennas of kilometers away
* The higer the Tower, the greater the range
* It is Line-of-sight Transmission i.e. passes through atmosphere, originates from dish antenna, travels in
straight line and received by another dish-antenna
LAN WAN
1. Diameter of not more than few 1. Span entire countries
kilometers
2. TOTAL DATA RATE OF at least 2. Data rate less than 1 Mbps (Mega bits
several Mbps per second)
3. Complete ownership by single 3. Owned by multiple organization.
organization
4. very low Error rates 4. Comparatively higher error rates.
T- NETWORK – TOPOLOGIES
The pattern of interconnection of nodes in a network is called TOPOLOGY
→ It would try to minimize installation COST
→ Because the arrangement of furniture, internal walls etc in office is often subject to change, that
may include moving existing nodes & adding new ones, so it should be FLEXIBLE
→ Failure in Network can take two forms, firstly an individual node can malfunction. or when the
network itself fouls to operate. So, topology chosen should be RELIABLE
* Point-to-point Link
→ Each station receives exactly from one transmitter and each transmitter transmits to
exactly one
receiver
→ The transmit & Receive operations can occur over separate wires (for better
performance)
→ It relies upon two function-Transmit & ReceiverSTAR-TOPOLOGY
It consists of central node to which all the other nodes are connected by a single path. It is used in most
existing information networks involving data processing or voice communication
Advantages → Ease of Service : has number of concentration points, hence provide easy access for
service or reconfiguration of network
→ One device per connection: here, failure of single connection involves disconnecting one
node from system, hence system works
→ Centralized control / Problem diagnosis : Since, central node is connected directly to every
other node, hence faults are easily detected and isolated. It is simple mater to disconnect
failing nodes from system.
→ Simple access protocols: It involves only central node, hence access protocols are simple
Disadvantages → LONG CABLE LENGTH
→ DIFFICULT TO EXPAND : The addition of a new node to a star network involves a
connection all the way to central node.
→ Central Node Dependency
If the central node fails, the entire network is rendered inoperable
* (NOTE)
THE STAR TOPOLOGY has found extensive application is areas where intelligence in the network is
concentrated at central nodeBUS(LINEAR TOPOLOGY)
→ This consists of single length of the transmission medium (normally coaxial cable) onto which various
nodes are attached.
→ Is used in Traditional data communication network where the host at one end of bus communication with
7
several terminal attached along its length.
→ The transmission from any station travels the length of the bus, in both directions, and can be received by
all other station
→ Data is transmitted in small blocks, known as packets. Each packed has some data bit plus a header
containing its destination address.
→ A station wanting to transmit some data sends it in packets along the bus.
The destination device, on identifying the address on the packets, copies the data onto it disk
Advantages
→ Short cable length & simple wiring layout : There is a single common data path connecting all nodes, the
linear topology allows a very short cable length to be used. It decreases installation cost.
→ Re silent Architecture: It has an inherent simplicity that makes it very reliable from hardware point of
view. There is single cable through which all the data propagates and to which all the nodes are
connected.
→ Easy to Extend : Additional nodes can be connected to an existing bus network at any point along its
length
DISADVANTAGES
→ FAULT DIAGNOSIS IS DIFFICULT: Control of network is not centralized in any node. This means
that detection of a fault may have to performed from many points in network
→ FAULT ISOLATION IS DIFFICULT: In star topology, a defective node can easily be isolated from
network by removing its connection at centre. If a node is faulty on the bus, it must be rectified at the
point where the node is connected to the network.
→ Repeater configuration : When Bus type network has its backbone extended using repeater,
reconfiguration may be necessary.
→ NODES MUST BE INTELLIGENT: Each node on network is directly connected to central bus. This
means that some way of deciding who can use then network at any given time must be perfumed in each
node.
RING OR CIRCULAR TOPOLOGY
→ Each node is connected to two and only two neighbouring nodes
→ Data travels in only one direction
→ After passing through each node, data returns to the sending node, which removes it
TREE TOPOLOGY
GRAPH TOPOLOGY
→ Nodes are connected in arbitrary fashion
→ A Link may or may not connect two or more nodes. There may be multiple links also
→ If a path can be established in two-nodes via one or more links, it is called a connected graph.
8
T – NETWORK – SECURITY CONCEPT
→ The Networking offers endless possibilities and opportunities to every user of it, along with convince
but there are many risks to network security
PROBLEMS LIKE
a) Physical Security Holes: When individuals gain unauthorized physical access to a computer
hackers do it by guessing passwords of various uses &bb than gaining access to network
system.
b) Software Security Holes: When badly written programmes or ‘privileged’ software are
compromised into doing things that they should not be doing
c) Inconsistent usage Holes: When system administrator assembles combination of hardware &
Software such that the system is seriously flawed from a security point of view
b) Application gateway: Applies security mechanism to specific applications such as FTP and
Telnet Servers. Very effective.
c) Circuit level gateway: Applies security mechanism when a connection is established. Once the
connection has been made, packets can flow between the hosts without further checking.
d) Proxy Server: Intercepts all messages entering and leaving the network. The proxy server
effectively hides the true network addresses.
2. COOKIES: → A cookie is a message given to a web Browser by a web server
→ The Browser stores the message in a text file. The message is then sent back to
Server each time the browser requests a page from server
→ Its main purpose is to identify users and possibly prepare customized web pages
for them
→ When you enter a Web site using cookies, you may be asked to fill out a form
providing information as your name & interests. This information is packaged into
a cookie and sent to your web browser, which stores it for later use. The next time
you go to same web site, your browser will send the cookie to web server.
COOKIES ARE MESSAGES THAT A WEB SERVER TRANSMITS TO A WEB BROWSER SO
THAT THE WEB SERER CAN KEEP TRACK OF USER’S ACTIVITY ON SPECIFIC WEB
SITE.
Very Important
Any Personal Information that your have given to a web site including credit card information, will
most likely be stored in cookie unless you have turned off the cookie features in browser. In only this
way are cookies a threat to privacy. It will only contain information that you freely provide to a web
site.
9
3. HACKERS AND CRACKERS
→ Hacker is a slang term for computer enthusiast, i.e. a person who enjoys learning programming
languages and computer systems and can often be considered an experts on subject
→ The CRACKERS are the malicious programmers who break into secure systems whereas
HACKERS are most interested in gaining knowledge about computer systems and possibly using
this knowledge for playful pranks.
→ The two turns are often used interchangeably
4. CYBER LAW
→ Cyber Law is a generic tem, which refers to all the legal and regulatory aspects of Internet and
world wide web
→ It is important because it touches almost all aspects of Transactions and activities on and
concerning the Internet, the world wide web and cyber space
→ Cyberspace is being governed by a system of law and regulation called cyberlaw
→ The growth of Electronic Commerce has propelled the need for vibrant and effective regulatory
mechanisms which would further strengthen the legal infra structure.
→ All these regulatory mechanisms & legal infrastructures come within domain of cyber law
T-PROTOCOLS
→ PROTOCOL is a formal description of message formats and the rules that two or more machines
must follow to exchange those messages
→ It defines standardized formats for data packets, Techniques for detecting and correcting errors
and so on
→ We need protocols everytime we want to do something on another comp
*F.T.P (File Transfer Protocol)*
→ One of the original service on internet was designed to allow for Transferring files from one
system to another
→ Files of any type can be Transferred, although you may have to specify whether it is ASCII or
Binary fileAdvantages of FTP: → Very useful to transfer files from one network in organization to
another
→ It is an effective way to get a geographically dispersed group to co-operate on a
project
→ It is a potent & popular way to share information over internet
* TCP/IP (Transmission Control Protocol / Internet Protocol)*
→ It is layered set of protocols (eg protocol for mail)
→ TCP is responsible for making sure that the commands get through to the other end. It keeps track
of what is sent, and retransmits anything that did not get through
→ DATAGRAM is a collection of the data that is sent as single msg
→ If any message is too large for one datagram, TCP will split it upto several datagrams and make
sure that they all arrive correctly
→ TCP acts as library of routines that applications can use when they need reliable network
communications with another computer
→ There are many services that every application needs. So these services are put together into IP. It
is also available to applications that don’t use TCP
* SLIP / PPP *
→ Serial Line IP (SLIP) was the first protocol for relaying IP packets over dial-up-lines. It defines an
encapsulation mechanism. SLIP has been largely supplanted by PPP
→ PPP (Point to Point Protocols) is Internet standard for Transmission of IP Packets over serial
lines. It is currently the best solution for dial-up-Internet connections IPCP: IP
CONTROL PROTOCOL
(FOR TRANSPORTATION OVER PPP)
OSTMPORTANT
13