2.5 Networking Xii
2.5 Networking Xii
2.5 Networking Xii
CHAPTER 1
LEARNING OBJECTIVES
After learning this chapter, the students will be able to:
Define what a Computer Network is
List the benefits of networking
List different wired and wireless media for communication
Identify different network devices
Identify different types of Network Topologies
Identify the type of network on the basis of area covered
Describe various terms associated with computer networks.
List various network security concepts and security threats to computer networks
List the preventive and corrective measures against these threats
Understand various internet applications
Understand wireless/mobile communication
INTRODUCTION
A computer network is a collection of interconnected computers and other devices which are
able to communicate with each other and share hardware and software resources.
Advantages:
Resource Sharing: Data, Hardware resources (Modem, Hard Disk, DVD Drive, Scanner
etc.) and Software resources (Application Software, Anti-Virus tools etc.) can be easily
shared on computer networks by connecting these devices to one computer(server).
Cost saving: Sharing of resources in computer networking leads to cost saving.
Improved Communication: A computer network enables fast, reliable and easy
communication among its users. We can easily communicate with anyone through
email, video conferencing or chatting through networking.
Time saving: It takes negligible time to send and receive messages, audio, video and
images on a computer network. We can easily watch live videos and can talk live to
anyone sitting in some other corner of the world on the computer network. This leads to
time saving.
Increased storage: On a computer network, same data is replicated on multiple
computers to ensure the availability of data in case of some computer getting faulty.
Mostly the data is kept on servers and is shared with legitimate users. This ensures data
security and reliability.
Networking Hardware
Transmission/Communication Media- A transmission medium is a medium of data
transfer over a network. It can be wired or wireless.
Wired Media- It includes various types of cables which are used to transfer data over
computer networks.
1.Twisted Pair Cable – This is one of the common forms of wiring in networks, especially in
LANs and it consists of four pairs of two insulated wires arranged in a regular spiral pattern
(double helix). These pairs are colour coded. An RJ-45 connecter is used to connect this cable to
a computer.
Advantages:
(i) It is easy to install and maintain.
(ii) It is very inexpensive
(iii) It is an adequate and least expensive medium for low speed (up to 10 mbps)
applications where the distance between the nodes is relatively small.
Disadvantages:
(i) It is incapable to carry a signal over long distances without the use of repeaters.
(ii) Due to low bandwidth, these are unsuitable for broadband applications.
UTP (Unshielded Twisted Pair): As the name suggests in UTP cables individual pairs are
not shielded. UTP has become the most closely identified cable for Ethernet, and is therefore
called Ethernet cable. Ethernet cables are used to attach the computer to the modem to
set up the internet connection at home or office.
STP (Shielded Twisted pair): It is the same cable as the UTP, but with each pair shielded
individually. An outer shield then covers all the pairs like in UTP. STP data connectors are
used to connect STP cable to the computer. RJ-45 connectors can also be used to
connect this cable to a computer.
2. Co-axial cable (or coax)- It is the most commonly used transmission media for LANs.
It is widely used for television signals and also by large corporations in building
security systems. Multi-channel television signals can be transmitted around
metropolitan areas at considerably less cost.
Advantages-
(i) It can carry data for a larger distance (185m - 500m) at a stretch.
(ii) Less susceptible to electromagnetic fields.
(iii) It offers high bandwidth (up to 400 mbps).
Disadvantages-
(i)Bulkier and less flexible than twisted pair.
(ii)Due to its thickness (1cm diameter) and less flexibility, it is difficult to install as
compared to twisted pair cable.
3. Optical Fiber cable – Optical fibers offer a very high bandwidth and this makes it
capable of multichannel communication.
Advantages-
(i)It can carry data for a very large distance at a stretch.
(ii)Not susceptible to electromagnetic fields
Disadvantages-
(i)Especially skilled people are required to install optical fiber cables.
(ii)Till date it is the most expensive and at the same time the most efficient cable
available for computer networks.
Wireless Media
1. Radio Waves - They are widely used for communication, both indoors and outdoors.
Cordless phones, AM and FM radio broadcast, Garage door openers etc. are
examples of radio wave transmission.
ADVANTAGES
(i)It offers ease of communication over difficult terrain.
(ii)These waves are omni-directional, so the transmitting and receiving antennas
need not be aligned.
DISADVANTAGES
(i)The transmission can be interfered by motors or other electrical equipment
(ii)Permission from concerned authorities is required for use of radio wave
transmission.
(iii)Less secure mode of transmission
(iv)Radio wave propagation is susceptible to weather effects like rains, thunder
storms etc.
2. Micro Waves: Microwaves travel in straight lines and cannot penetrate any solid
object. Therefore, for long distance microwave communication, high towers are built
and microwave antennas are put on their top.
In the big cities where land is very costly and a lot of formalities have to be
completed to get permission to dig land for cabling, microwave antennas can be put
on top of high rise buildings and communication can be started in a short time.
ADVANTAGES
(i)Free from land acquisition rights
(ii)Offers ease of communication over difficult terrain
DISADVANTAGES
(i)The transmission is in straight lines so the transmitting and receiving antennas
need to be properly aligned. (line of sight transmission)
3. Infrared Waves: These waves are used for short range communication (approx. 5m).
Home-entertainment remote-control devices, Cordless mouse, and Intrusion
detectors are some of the devices that utilize infrared communication.
ADVANTAGES
(i)It is a line of sight transmission; therefore, information passed to one device is not
leaked to another device.
(ii)No government license is required for their use
DISADVANTAGES
(i)It is a line of sight transmission, therefore at a time only two devices can
communicate.
(ii)Performance drops with longer distances
4. Bluetooth- This technology is used for short range communication (approx. 10m).
Baby monitors, door openers, and cell phones are some of the devices that utilize
Bluetooth communication.
ADVANTAGES
(i)Line of sight between communicating devices is not required.
(ii)Bluetooth can connect up to eight devices simultaneously.
DISADVANTAGES
(i)Slow data transfer rate (upto 1Mbps).
5. Satellite Link: Satellite links are used for very long distance wireless communication
which may range from intercity to intercontinental. The satellite system is very
expensive but its area coverage and fringe benefits compensate for the expenses.
ADVANTAGES
(i)Satellites cover large area of earth
(ii)Since communication over very long distances is possible, this becomes a
commercially attractive option.
DISADVANTAGES
(i)This system is expensive
(ii)Requires legal permissions
Network Devices
Other than the transmission media many other devices are required to form computer
networks. Some of these devices are:
1. NIC(Network Interface Card):An NIC (Network Interface Card) is a device that enables a
computer to connect to a network and communicate. Any computer which has to be a
part of a computer network must have an NIC installed in it.
3. HUB: A Hub is an electronic device that connects several nodes to form a network and
redirects the received information to all the connected nodes in broadcast mode. The
computer(s) for which the information is intended receive(s) this information and
accept(s) it. Other computers on the network simply reject this information.
4. SWITCH: A Switch is an intelligent device that connects several nodes to form a network
and redirects the received information only to the intended node(s).
The difference between the two is that Hub broadcasts the received information to all
the nodes. Switch does not broadcast instead sends the information selectively only to
those computers for which it is intended. This makes a switch more efficient than a
hub.
5. Repeater: A Repeater is a device that is used to regenerate a signal which is on its way
through a communication channel. A repeater regenerates the received signal and re-
transmits it to its destination.
6. Gateway: A Gateway is a device, which is used to connect different types of networks.
Network Topologies
A Topology is an arrangement of physical connections among nodes in a network. There
exist different network topologies:
1. Bus Topology: In bus topology, all the nodes are connected to a main cable called
Backbone.
ADVANTAGES
(i)It is easy to install.
(ii)It requires less cable length and hence it is cost effective.
DISADVANTAGES
(i)In case of cable (backbone) or terminator fault, the entire network breaks down.
(ii)Fault diagnosis is difficult.
(iii)At a time only one node can transmit data.
ADVANTAGES
(i)It is easy to install.
(ii)It is easy to diagnose the fault in Star topology.
(iii)It is easy to expand depending on the specifications of central hub/switch.
DISADVANTAGES
(i)Failure of hub/switch leads to failure of entire network.
(ii)It requires more cable length as compared to bus topology.
3. Tree Topology: Tree topology is a combination of bus and star topologies. It is used to
combine multiple star topology networks.
ADVANTAGES
(i)It offers easy way of network expansion.
(ii)Even if one network (star) fails, the other networks remain connected and working.
Network Protocols
A network protocol is a set of rules for communication among networked devices. These
Protocols are HTTP, TCP/IP, PPP.
1. HTTP (Hyper Text Transfer Protocol): HTTP is used to transfer all files and other data
(collectively called resources) from one computer to another on the world wide web.
1. TCP/IP (Transmission Control Protocol / Internet Protocol): Communication between
two computers on internet is done using TCP/IP protocol. TCP/IP is a two-layer protocol.
When data is to be sent from one computer to another over internet, it is first broken
into smaller packets which are actually sent. When these packets are received by the
receiver computer, they are assembled into the original message. This job of dividing
the original message into packets and re-assembling the received packets into the
original message is done following TCP protocol. Internet protocol is followed to ensure
that each of these packets gets to the right destination. Different packets from the same
message may be routed differently, but they reach the same destination and are
reassembled there.
2. PPP (Point to Point Protocol): It is a protocol for direct communication between two
computers, typically a personal computer connected by phone line to a server. PPP is
used over many types of physical networks including cellular telephone, serial cable,
phone line, trunk line, specialized radio links, and fiber optic links.
Types of Networks: On the basis of area covered computer networks are classified as:
1. PAN - Personal Area Network- A PAN is a network of communicating devices
(Computer, Phone, MP3/MP4 Player, Camera etc.) in the proximity of an individual. It
spans an area of around 10 m radius. A PAN can be set up using guided media (USB
cable) or unguided media (Bluetooth, Infrared).
1. MAC (Media Access Control) address- A machine with an NIC can be identified uniquely
through its NIC’s (Network Interface Card) MAC address. MAC address of an NIC is
permanent and does never change. For example, in the following MAC address,
00:A0:C9 : 14:C8:35
The prefix 00:A0:C9 indicates ID number of the adapter manufacturer. The second half
(14:C8:35) of a MAC address represents the serial number assigned to the adapter (NIC)
by its manufacturer.
2. IP Address- Every machine in a network has another unique identifying number, called
its IP Address. An IP address is a group of four bytes (or 32 bits) each of which can be a
number from 0 to 255. A typical IP address looks like this:
59.177.134.72
On a network, IP address of a machine is used to identify it. MAC address is used only
when a specific machine is to be targeted. For example, suppose we want to block a
specific PC to access some network resource. If we use the PCs IP address, then the PC is
not blocked permanently as its IP address may change when it connects to the network
next time. Instead, we use the PCs MAC address for this purpose.
COOKIES: When the user browses a website, the web server sends a text file to the web
browser. This small text file is a cookie. Generally, a cookie contains the name of the
website from which it has come from and a unique ID tag. They are usually used to track
the pages that you visit so that information can be customized for you for that visit.
HACKERS: A hacker accesses the computer without the intention of destroying data or
maliciously harming the computer. A computer enthusiast, who uses his computer
programming skills to intentionally access a computer without authorization is known as
a hacker.
CRACKERS: A person who gains unauthorized access to a computer with the intention of
causing damage is known as a cracker.
1. Denial of Service (DoS) attack is an attempt to make one or more network resources
unavailable to their legitimate users. Examples of such attacks are:
INTERNET APPLICATIONS
SMS(Short Message Service): SMS is the transmission of short text messages to and
from a mobile pone, fax machine and or IP address.
Wireless/mobile communication
1.GSM(Global System for Mobile communication): GSM (Global System for Mobile
Communications) is a second-generation digital mobile telephone standard using a
variation of Time Division Multiple Access (TDMA). It is the most widely used of the
three digital wireless telephone technologies - CDMA (Code Division Multiple Access),
GSM and TDMA. It provides its subscribers with roaming facility, so that they can use
their mobile phone all over the world. It provides customers with better voice and low
cost alternative to making calls such as short message service(SMS). The main feature of
GSM is the Subscriber Identity Module(SIM) called as SIM card. It is a detachable smart
card that contains subscriber’s information along with phone book. It which allows eight
simultaneous calls on the same radio frequency.
GSM CDMA
It's a "time division" system. It's a "code division" system.
Calls take turns. Your voice is transformed Every call's data is encoded with a unique
into digital data, which is given a channel key, then the calls are all transmitted at
and a time slot, so three calls on one once; if you have calls 1, 2, and 3 in a
channel look like this: 123123123123. On channel, the channel would just say
the other end, the receiver listens only to 66666666. The receivers each have the
the assigned time slot and pieces the call unique key to "divide" the combined signal
back together. into its individual calls.
GSM also has the advantage of easily With CDMA phones, however, the SIM card
swappable SIM cards. GSM phones use the does not store such information. Your identity
SIM card to store your (the subscriber's) is tied to the CDMA network and not the
information like your phone number and other phone.
data that proves you are in fact a subscriber to
that carrier.
all GSM networks support making phone calls Such capability is not supported on most
while using data. This means you can be out CDMA networks.
and about on a phone call but still use your
navigation map or browse the internet.
4. WLL(Wireless in Local Loop) : WLL is a system that connects subscribers to the public
switched telephone network using radio signals as a substitute for other connecting
media.
5. 3G/4G:
1G => Voice
2G => Voice + Data
3G => Voice + Data + Video (Broadband)+ multimedia
4G =>wireless, Faster than 3G, anytime/anywhere feature