Sei sulla pagina 1di 8

Communication and Open Source Concept

Network is a collection of interconnected computers. The computer in a network is called NODE and the
computer in a network seeking information from the network is called client. The system in a network providing
services to it’s clients is called serve.
Evolution of Network :
1. ARPANET : The ARPANET (Advanced Research Projects Agency Network) developed by Defense
Advanced Research project Agency (ARPA ) of the United States Department of Defense during the Cold War,
was the world's first operational network, and the predecessor of the global Internet.
2. Internet : The internet is a huge network of computers, which links many different computers all over the
world. It is a network of networks, which share a common mechanism for addressing computers,
and a common set of communication protocols for communication between two computers on the
network.
Client/Server architecture
A network of computers, which consists of a server computer (such as, file server, database server,
printer server, name server), and multiple client computers, which share programs and data from the
server.
SERVER:
A computer that facilitates the sharing of data, software, and hardware resources (e.g. printers, modems
etc.) on the network is termed as a SERVER.
CLIENT:
A computer which is used by an end user to interact with the server computer. It runs client processes,
which send service requests to the server.

Data Communication Terminology


1. Concept of Channel :
2. Baud : Baud was the prevalent measure for data transmission speed until replaced by a more accurate term,
bps (bits per second). One baud is one electronic state change per second. Since a single state
change can involve more than a single bit of data, the bps unit of measurement has replaced it as
a better expression of data transmission speed.
3. Bandwidth : In computer networks, bandwidth is often used as a synonym for data transfer rate - the
amount of data that can be carried from one point to another in a given time period (usually a
second).This kind of bandwidth is usually expressed in bits (of data) per second (bps).
Occasionally, it's expressed as bytes per second (Bps).
4. Data Transfer Rate :
1. Bps ( Bits per second)
2. Kbps ( Kilobytes per second) – 1024 bytes =1 KB
3. Mbps ( Megabytes per second) – 1024 KB = 1 MB
4. Gbps ( Gigabytes per second ) – 1024 MB = 1 GB
5. Tbps ( Tera bytes per second ) – 1024 GB = 1 TB
Transmission Media
1. Twisted Pair cable : Twisted pair cabling is a form of wiring in which two conductors (the forward and
return conductors of a single circuit) are twisted together for the purposes of canceling out
electromagnetic interference (EMI) from external sources
2. Coaxial Cable : Coaxial cable, or coax, is a cable with an inner conductor surrounded by a tubular
insulating layer typically of a flexible material with a high dielectric constant, all of which are
surrounded by a conductive layer (typically of fine woven wire for flexibility, or of a thin metallic foil),
and finally covered with a thin insulating layer on the outside.
3. Optical Fiber : An optical fiber (or fibre) is a glass or plastic fiber that carries light along its length.
1
4. Infrared : Infrared technology allows computing devices to communicate via short-range wireless
signals. With infrared, computers can transfer files and other digital data bidirectionally. The infrared
transmission technology used in computers is similar to that used in consumer product remote control
units.
5. Radio Link : Radio is the transmission of signals by modulation of electromagnetic waves with
frequencies
below those of visible light.
6. Microwave Link : Microwaves are electromagnetic waves with wavelengths ranging from 1mm – 1m,
or frequencies between 0.3 GHz and 300 GHz.
7. Satellite Link : A satellite link is a communications subsystem that involves a link between a
transmitting Earth station and a receiving Earth station via a communications satellite.
Network Devices
1. Modem : Modem ( Modulation- Demodulation) is a network device used to convert digital signal into
analog signal and analog signal into digital to communicate over a telephone line.
2. RJ-45 Connector : The RJ-45 connector is commonly used for network cabling and for telephony
applications. It's also used for serial connections in special cases
3. Ethernet Card : An Ethernet card is one kind of network adapter. These adapters support the Ethernet
standard for high-speed network connections via cables. Ethernet cards are sometimes known as
network interface cards (NICs).
4. Hub : A network hub or repeater hub is a device for connecting multiple twisted pair or fiber optic
Ethernet devices together and thus making them act as a single network segment
5. Switch: A network switch is a computer networking device that connects network segments.network
switch does not generally encompass unintelligent or passive network devices such as hubs and
repeaters.
6. Gateway : A Gateway is an internetworking tool, which is used to interconnect dissimilar networks that
use different communication protocols. Protocol conversion is the major job performed by gateways
and they also perform routing functions.
7. Repeater :A repeater is a network device that amplifies and restores signals for long distance
transmission. Repeater reads the incoming packet and amplifies it and transmits to another segment of
network.
8. A backbone: is central interconnecting structure that connects one or more networks just like the trunk
of a tree or the spine of a human being. When some of the LANs are connected to share data through
gateways and cables and also connected to WAN it is called a backbone architecture.
9. Bridge : a bridge is a network device that establishes an intelligent connection between two local networks
with the same standard but with different types of cables.
10. Router : A router is a network device that is used to separate different segments in a network to
improve performance and reliability. A router works like a bridge but can handle different protocols.
Different ways to send data across the network
1. Circuit switching : This method involves the physical interconnection of two devices. A good example
of circuit switching involves the Public phone network.
2. Message switching : This method work on store and forward principle. The best example of this
method is postal service.
3. Packet Switching : In this method, firstly all the information is firstly divided in to small packets and
then it send that data same way as message switching technique.
The arrangement of computer in a network is called topology. Some of them is as follows
1. Star Topology : in this topology , devices are connected in star format. There is a central computer and
all the other computer(s) are connected through this computer.i,e they are dependent on this computer
for communication. The major advantage of this topology is that if any node is not working properly, the
whole network is not affected. The major disadvantage of this topology is that if central node is corrupt,
then whole network can not work.

2
Advantages :
• it has minimal cost only n-1 lines are required for connecting n nodes.
• Transmission delays between two nodes do not increase by adding new nodes to the
network.
• Centralized control
Disadvantages :
• if the host computer fails the entire network fails.
• Long cable length
2. Ring Topology : In this topology computer are connected in the form of a ring, each computer is
connected to it’s nearest computer. The greatest disadvantage of this topology is is one computer
of this network is fail then the whole network collapse and does not work.
Advantages :
• Short cable length
• Speed is high as traffic travels in one direction.
Disadvantages :
• No centralized control
• If any node fails the whole network fails.
• Addition of new node is difficult and increases the communication delay.
3. Bus Topology. In this topology there is a central system like bus route and all the computers are
connected to this route. At the both ends of this route there are terminators which describe that
this is the end of this network.
Advantages :
• short cable length and simple wiring layout.
• Easy to extend.
Disadvantages :
• nodes must be intelligent.
• Fault diagnosis is difficult.
• If communication line fails the entire network fails
On the basis of the area covered by network, network is divided into three categories
1. LAN : A local area network (LAN) is a computer network covering a small physical area, like a home,
office, or small group of buildings, such as a school, or an airport.
2. MAN : A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan
area or campus. Its geographic scope falls between a WAN and LAN. MANs provide Internet
connectivity for LANs in a metropolitan region, and connect them to wider area networks like the
Internet
3. WAN : Wide Area Network (WAN) is a computer network that covers a broad area (i.e., any network
whose communications links cross metropolitan, regional, or national boundaries. The largest and most
well-known example of a WAN is the Internet.
TELNET : the TELNET service allows an internet user to log in to another computer somewhere on the
Internet. That is, a user can execute the telnet command on his/her local computer to start a login session
on a remote computer. This action is also called “Remote Login”.
Network Protocols
Protocol : Protocols are the set of rules , which each participating network device follows , if that want to
communicate over a computer network. Some of very well known and widely used network protocols are as
follows
1. TCP/IP( Transmission Control Protocol/ Internet Protocol ): This is combination of two protocol
namely TCP , which is responsible for dividing the whole information into small manageable packets
and it is also responsible for safe delivery of these small packets at it’s destination. . On the other hand
IP protocol is responsible for the route these packets must follow to reach it’s destination.
3
2. FTP ( File Transfer Protocol ) : This protocol is responsible for uploading and downloading of the
information over a computer network.
3 PPP ( Point to point protocol ): This protocol is responsible to make a point to point connection
between the communicating devices over a computer network.
4. Remote Login : Remote login is a facility by which a user can login on a remote computer without
being present at that place and can work on the remote computer. Remote login is facilitated by
Telnet(software).
Mobile/ Wireless Communication:
1. GSM (Global System for Mobile communication) is a digital mobile telephony system that is widely
used in Europe and other parts of the world. GSM uses a variation of time division multiple access
(TDMA) and is the most widely used of the three digital wireless telephony technologies (TDMA,
GSM, and CDMA). GSM digitizes and compresses data, then sends it down a channel with two other
streams of user data, each in its own time slot. It operates at either the 900 MHz or 1800 MHz frequency
band.
2. CDMA (Code-Division Multiple Access) refers to any of several protocols used in so-called second-
generation (2G) and third-generation (3G) wireless communications. As the term implies, CDMA is a
form of multiplexing, which allows numerous signals to occupy a single transmission channel,
optimizing the use of available bandwidth.
3. Wireless local loop (WLL), is a term for the use of a wireless communications link as the "last mile /
first mile" connection for delivering plain old telephone service (POTS) and/or broadband Internet to
telecommunications customers.
4. 3G is the third generation of telecommunication hardware standards and general technology for mobile
networking, superseding 2.5G. It is based on the International Telecommunication Union (ITU) family
of standards under the IMT-2000.
4. SMS( Short Message Service) : SMS is a communication service standardized in the GSM mobile
communication system, using standardized communications protocols allowing the interchange of short
text messages between mobile telephone devices.
5. Voice mail: An e-mail systems that support audio. Users can leave spoken messages for one another and
listen to the messages by executing the appropriate command in the e-mail system.
6. Electronic Mail (E-mail) : email—is any method of creating, transmitting, or storing primarily text-
based human communications over a computer network. Modern e-mail systems are based on a store-
and-forward model in which e-mail computer server systems, accept, forward, or store messages on
behalf of users, who only connect to the e-mail infrastructure with their personal computer or other
network-enabled device for the duration of message transmission or retrieval to or from their designated
server. Rarely is email transmitted directly from one user's device to another's.
7. Chat : Online textual communication between two network computer is called CHAT. The list of
approachable chat user is called chat room.
8. Video Conferencing : A videoconference (also known as a videoteleconference) is a set of interactive
telecommunication technologies which allow two or more locations to interact via two-way video and
audio transmissions simultaneously. It has also been called visual collaboration and is a type of
groupware. It differs from videophone in that it is designed toserve a conference rather than individuals.
Network Security Concept
Spam : Spam is the abuse of electronic messaging systems (including most broadcast mediums, digital
delivery systems) to send unsolicited bulk messages indiscriminately. While the most widely recognized
form of spam is e-mail spam, the term is applied to similar abuses in other media: instant messaging
spam, Usenet newsgroup spam, Web search engine spam, spam in blogs, wiki spam, online classified
ads spam, mobile phone messaging spam, Internet forum spam, junk fax transmissions, and file sharing
network spam. Ladaidsiadiada donkennay is the greatest
Trojan Horse : The Trojan horse, also known as trojan, in the context of computing and software,
describes a class of computer threats (malware) that appears to perform a desirable function but in fact
performs undisclosed malicious functions that allow unauthorized access to the host machine, giving
4
them the ability to save their files on the user's computer or even watch the user's screen and control the
computer.
Worms : A computer worm is a self-replicating computer program. It uses a network to send copies of
itself to other nodes (computers on the network) and it may do so without any user intervention. Unlike
a virus, it does not need to attach itself to an existing program. Worms almost always cause at least some
harm to the network, if only by consuming
bandwidth, whereas viruses almost always corrupt or devour files on a targeted computer.
Virus : A computer virus is a computer program that can copy itself and infect a computer without the
permission or knowledge of the owner. The term "virus" is also commonly but erroneously used to refer
to other types of malware, adware, and spyware programs that do not have the reproductive ability. A
true virus can only spread from one computer to another (in some form of executable code) when its
host is taken to the target computer
Firewall : A firewall is a part of a computer system or network that is designed to block unauthorized
access while permitting outward communication. It is also a device or set of devices configured to
permit, deny, encrypt, decrypt, or proxy all computer traffic between different security domains based
upon a set of rules and other criteria.
1. Threats and Prevention from Viruses, worms, Trojan Horse, Spams.
2. Use of cookies : Cookies are pieces of data created when you visit a website, and contain a unique,
By using cookies we will be able to see how our website is being used. This means we'll be anonymous
number. They are stored in the cookie directory of your hard drive, and do not expire at the end of your
session. Cookies let us know when you return to our website and what pages or services you use when
you're there. Our cookies aren't used to store or collect any personal information. It only lets us know
that someone with your unique cookie has returned to our website.
able to identify the most popular areas of our website and make it easier for you to access them. Cookies
help us to be more efficient as we can learn what information is important to our customers and what
isn't.
3. Protection Using Firewall : A firewall is a part of a computer system or network that is designed to
block unauthorized access while permitting outward communication. It is also a device or set of devices
configured to permit, deny, encrypt, decrypt, or proxy all computer traffic between different security
domains based upon a set of rules and other criteria.
4. Indian IT Act :
5. Cyber Law : Cyber law or, Internet law, is a term that encapsulates the legal issues related to use of
communicative, transactional, and distributive aspects of networked information devices and
technologies. It is less a distinct field of law in the way that property or contract are, as it is a domain
covering many areas of law and regulation. Some leading topics include intellectual property, privacy,
freedom of expression, and jurisdiction.
6. Cyber Crime : the terms computer crime and cyber crime are more properly restricted to describing
criminal activity in which the computer or network is a necessary part of the crime, these terms are also
sometimes used to include traditional crimes, such as fraud, theft, blackmail, forgery, and
embezzlement, in which computers or networks are used.
7. IPR Issues : ( Intellectual Property Rights ) :
8. Hacking : Computer hacking is the practice of modifying computer hardware and software to
accomplish a goal outside of the creator’s original purpose. People who engage in computer hacking
activities are often called hackers. Hackers use information gained from hacking for security purpose
only and do not misuse it.
9. Cracking : Crackers are the same as hackers but they use the information gained from hacking for their
personnel gain and for destructive purpose.

Web Servers
1. HTML ( Hyper text markup Language) : It provides a means to describe the structure of
5
text-based information in a document—by denoting certain text as links, headings,
paragraphs, lists, etc.—and to supplement that text with interactive forms, embedded images,
and other objects. HTML is written in the form of "tags" that are surrounded by angle brackets.
2. XML ( Extensible markup Language) : XML (Extensible Markup Language) is a general purpose
specification for creating custom markup languages.[1] It is classified as an extensible language,
because it allows the user to define the mark-up elements.
3. HTTP ( Hyper Text Transfer Protocol) : is an application-level protocol for distributed,
collaborative, hypermedia information systems. It is used for retrieving inter-linked resources led to the
establishment of the World Wide Web. HTTP is a request/response standard of a client and a server. A
client is the end-user, the server is the web site. The client making a HTTP request—using a web
browser. The responding server—which stores or creates resources such as HTML files and images—is
called the origin server. In between the user agent and origin server may be several intermediaries, such
as proxies, gateways, and tunnels. HTTP is not constrained to using TCP/IP and its supporting layers,
although this is its most popular application on the Internet. Indeed HTTP can be "implemented on top
of any other protocol on the Internet, or on other networks." HTTP only presumes a reliable transport;
any protocol that provides such guarantees can be used."
4. Domain Name : Domain name and Hostname are used interchangeably. This is the name attached to a
network(Network device) . Domain names are unique and a domain name server can change this name
into it’s equivalent IP address and vice-versa. Example : google.com, yahoo.com, davcpscn.com.
5. URL ( Unique Resource Locator ) : It is a unique name allocated to any website. Example :
www.google.com, www.yahoo.com, www.davcpscn.com
6. Protocol Address
7. Website : A website (or "web site") is a collection of related web pages, images, videos or other digital
assets that are hosted on one web server, usually accessible via the Internet. A web page is a document,
typically written in (X)HTML, that is almost always accessible via HTTP, a protocol that transfers
information from the web server to display in the user's web browser.
8. Web Browser : The client software which is responsible for accessing the resources available on the
web server is called, web browser. Example , Internet Explorer, Mozilla Firefox, Google Chrome etc.
8. Web Server : The server software which is responsible for providing web based resource to through
browser is called, web server. Example : IIS , Apache etc.
9. Web Hosting : A web hosting service is a type of Internet hosting service that allows individuals and
organizations to provide their own website accessible via the World Wide Web.
10. Web Scripting
a. Client Side Scripting : The scripting Language which executes on the client computer on it’s browser
is called client side scripting Language. Example : Java Script, VBScript
b. Server Side Scripting : The scripting Language which executes on the server computer
on it’s web server is server side scripting Language. Example : JSP, ASP, PHP etc.
Open Source Terminologies:
1. Open Source Software : The software whose source code is available to read and change falls under this
categories.
2. Freeware : This type of software is free and there source code is also available to read, change and these
software can be distributed.
3. Shareware : These software are not free. Their source code is not available and they come with limited
facility or to use for a limited period of time. These software can not be redistributed.
4. Proprietary Software : These software are also known as closed source software. These are not free, there
source code is not available to read and they can not be redistributed.
5.FOSS (Free and open Source Software ) : also F/OSS, FOSS, or FLOSS (free/libre/open source software)
is software which is liberally licensed to grant the right of users to study, change, and improve its design
through the availability of its source code.
6. GNU : The GNU Linux project was created for the development of a Unix-like operating system that comes
with source code that can be copied, modified, and redistributed.

6
7. FSF ( Free Software Foundation) ; The Free Software Foundation (FSF) is a non-profit corporation
founded by Richard Stallman on 4 October 1985 to support the free software movement, a copyleft-
based movement which aims to promote the universal freedom to distribute and modify computer
software without restriction.
8. OSI ( Open Source Initiative) :. The Open Source Initiative (OSI) is a non-profit corporation formed to
educate about and advocate for the benefits of open source and to build bridges among different
constituencies in the open-source community
Full forms:
LAN : Local Area Network STP : Shielded Twisted Pair
OSI : Open System Interconnection LED : Light Emitting Diodes
FTP : File Transfer Protocol LD : Laser Diodes
WAN : Wide Area Network bps : bits per second
WWW : World Wide Web Bps : Bytes per second
TCP/IP: Transmission Control Protocol/Internet kbps : Kilobits per second
Protocol Kbps : Kilobytes per second
URL : Uniform Resource Locator Mbps: Million bits per second or mega bits per
XML : eXtensible Markup Language seconds
CDMA : Code Division Multiple Access mbps : million bytes per second
WLL : Wireless in Local Loop kHz: kilo hertz
HTML : Hyper Text Markup Language MHz : Mega hertz
GSM : Global System for Mobile Communication GHz : Giga hertz
SIM : Subscriber Identification Module THz: Terra Hertz
TDM : Time Division Multiplexing VFIR : Very Fast Infra Red
DHTML: Dynamic Hyper Text Markup Language HTTP : Hyper Text Transfer Protocol
ISP : Internet Service Provider URI : Uniform Resource Identifier
ARPANET: Advance Research Project Agency URN : Uniform Resource Nane
Network
MIME : Multi-Purpose Internet Mail Extensions
NSFNET : National Science Foundation Network SLIP : Serial Line Internet Protocol
NIU : Network Interface Unit PPP : Point to Point Protocol
TAP : Terminal Access Point LCP : Link Control Protocol
NIC : Network Interface Card IPCP : IP control Protocol
LAN : Local Area Network NCP : Network Control Protocol
WAN : Wide Area Network ISP : Internet Service Provider
MAN : Metropolitan Area Network WLL or WiLL: Wireless in Local Loop
VGM : Voice Grade Medium 3G : Third Generation
DGM : Data Grade Medium EDGE : Enhanced Data Rate for Global Evolution
UTP : Unshielded Twisted Pair WCDMA : Wide-band CDMA
7
UMTS : Universal Mobile Telephone System DNS : Domain Name System

Q. The cyber mind organization has set up its new branch at Delhi for its office and web activities. It has 4
blocks of buildings as shown in diagram:

Block A Block C

Block B Block D

Distance between various Blocks: Number of Computers


Block A to Block B ----- 40 mtr Block A ----- 25
Block B to Block C ----- 120 mtr Block B ----- 50
Block C to Block D ----- 60 mtr Block C ----- 125
Block A to Block D ----- 170 mtr Block D ----- 10
Block B to Block D ----- 150 mtr
Block A to Block C ----- 70 mtr

i) Suggest the most suitable place to house the server of this organization with a suitable reason with
justification.
ii) Suggest a most suitable cable layout of connections between the Wing and topology.
iii) Suggest the placement of the following device with justification:
1.Repeater 2. Hub/Switch 3. Modem
vi). The organization is planning to link its head office situated in the city in hilly region where cable
connection is not feasible, suggest an economic way to connect it with reasonably high speed.
v). The organization is planning to link its sale counter situated in various parts of the same city, which
type of
network out of LAN, MAN or WAN will be formed? Justify.
vi) Which device you will suggest to be produced by the company for connecting all the computers within
each of their offices out of the following devices?
a. Hub/Switch c. Modem
b. Telephone
vii) Suggest the economic way to provide internet facility in all wings.

Potrebbero piacerti anche