Computer Network
Computer Network
Introduction
Two digital devices are said to be interconnected if they are capable of exchanging information or
data sharing or share resources.
Types of architecture:
i. Peer to Peer architecture: In this architecture, each and every computer acts as both
requestor and responder(Client and Server).
ii. Client-Server architecture: In this architecture, there is a dedicated machine that is
completely devoted as service provider(Server) and rest of the devices are the request
generator(Client).
Server: A server is service provider for the nodes who sends the request for providing services. A
network can have more than one server also. Each server has a unique name on the network and all
the users of network identify the server by its unique name.
Types of Servers:
a. Non-dedicated: These servers can act as both service requestor as well service provider
b. Dedicated: These servers are completely dedicated for service providing.
Types of Network:
On the basis geographical spread, the network is classified into four categories:
b. Co-axial cable: This type of cable consists of a solid wire core surrounded by one or
more foil or wire shields, each separated by some kind of plastic insulator. The inner
core carries the signal and the shield provides the ground. The coaxial cable has high
electrical properties and is suitable for high speed communication. It is widely used
for television signals. In the form of (CATV) cable, it provides a cheap means of
transporting multi-channel television signals around metropolitan areas. It is also
used by large corporations in building security systems.
c. Optical Fiber cable/Fiber optics: Optical fibers consists of thin strands of glass or
glass like material which are so constructed that they carry light from a source at
one end of the fiber to a detector at the other end. The light sources used are light
emitting diodes(LEDs) or laser diodes(LDs) The data to be transmitted is modulated
onto the light beam using frequency modulation techniques. The signals can then
picked up at the receiving end and demodulated. The bandwidth of the medium is
potentially very high.
1. Core: The glass or the plastic through which the light travels
2. Cladding: It is covering of the core that reflects light back to the core
3. Protecting Coating: It protects the fiber cable from hostile environment.
Network Topology:
The pattern of interconnection of nodes in a network is called the Topology.
The selection of topology for a network cannot be done in isolation as it affects the choice of media
and the access method used. There are a number of factors to consider in making this choice, the
most important of which are mentioned below:
i. Cost: For a network to be cost effective, one would try to minimize installation cost. This
may be achieved by using well understood media and also, to a lesser extent, by
minimizing the distances involved.
ii. Flexibility: Because the arrangement of furniture, internal walls etc in offices is often
subject to change, the topology should allow for easy reconfiguration of the network.
This involves moving existing nodes and adding new ones.
iii. Reliability: Failure in a network can take two forms. Firstly, an individual node can
malfunction. This is not nearly as serious as the second type of fault where the network
itself fails to operate. The topology chosen for the network can help by allowing the
location of the fault to be detected and to provide some means of isolating it.
a. Bus Topology or Linear topology: This topology consists of a single length of the
transmission medium (cables) onto which the various nodes are attached. The topology is
used in traditional communication network where the host at the one end of the bus
communicates with several terminals attached along its length.
The transmission from any station travels the length of the bus, in both directions and can
be received all other stations.
Advantages:
Short Cable Length
Resilient Architecture
Easy to extend
Disadvantages:
b. Ring Topology: In this topology, each node is connected to two and only two neighbouring
nodes. Data is accepted from one of the neighbouring nodes and is transmitted onwards to
another. Thus data travels in one direction only, from node to node around the ring.
Advantages:
Short length
No wiring closet space is required
Suitable for Optical fiber cable
Disadvantages:
c. Star Topology: This topology consists of a central node to which all of the other nodes are
connected by a single path. It is the topology used in most existing information networks
involving data processing or voice communication.
Advantages of Star topology:
Ease of service
One device per connection.
Centralized Control/Problem Diagnosis
Simple access protocols
Transmission in this topology takes place in the same way as in the bus topology. In both
cases, there is no need to remove packets from the medium because when a signal
reaches the end of the medium, it is absorbed by the terminators
v. Mesh Topology: In this topology, each node is connected to more than one node to
provide an alternative route in the case the host is either down or too busy.
The mesh topology is excellent for long distance networking because it provides
extensive back-up, rerouting and pass-through capabilities. Communication is possible
between any two nodes on the network either directly or by passing through. The mesh
topology is commonly used in large internetworking environments with star, ring and
buses attached to each node. This is also ideal for distributed networks.
Network Devices:
i. Modem: A modem is a computer peripheral device that allows you to connect and
communicate with other computers via telephone lines.
Modem converts digital signals to A/F(Audio Frequency) tones which are in the
frequency range that the telephone lines can transmit and also it can convert
transmitted tones back to digital information.
ii. Rj-45: it stands for Registered Jack-45. Rj-45 is an eight-wire connector, which is
commonly used to connect computers on the local area networks I,e LANs especially
Ethernets. Ethernet uses either bus or star topology and supports data transfer rates up
to 10Mbps.
iii. Ethernet Card: An Ethernet card contains connection for either coaxial or twisted pair
cables(or both), If it is designed for coaxial cable, the connection will be BNC(Bayone-
Neill-Concelman). If it is designed for twisted pair, it will have a RJ-45 connection.
Ethernet card is inserted in its on the motherboard. Usually Ethernet Cards are
purchased separately from a computer, but these days many computers include an
option for pre-installed Ethernet card.
iv. Hub: It is a hardware device to connect several computers together. A hub that contains
multiple independent but connected modules of network and inter-networked
equipment. It is also known as Concentrator. In star topology, twisted pair wire is run
from each workstation to a central concentrator.
A switch is responsible for filtering i.e transforming data in a specific way and forwarding
packets between LAN and segments. Switch supports Packet Protocol.
vi. Repeater: It is a device that amplifies a signal being transmitted on the network. It is
used in long network lines (distance more than 100 mtrs). which exceeds the maximum
rated distance for a single run.
Over distance, the cables connecting a network loses the signal transmitted. If the signal
degrades too much, it fails to reach the destination. Or if it does arrive, the degradation
of the message makes it useless. Repeaters can be installed along the way to ensure that
viii. Router: A router is a network device that is used to separate different segments in a
network to improve performance and reliability. A router works like a bridge but can
handle different protocols. A Router differs from a bridge in a way that former uses
logical addresses and the latter uses physical addresses.
IP(Internet Protocol): 192.168.0.1
MAC(media access control): 26:A6:56:12:B4:32
Manufacturer’s Id Custormer’s ID
ix. Gateway: A Gateway is a network device that connects dissimilar network. It establishes
an intelligent connection between a local area network and external networks with
completely different structures.
x. Wifi-Card: A WIFI card is either an internal or external local area network adapter built-
in wireless radio and antenna. The most common WIFI cards are used in desktop
computers are PCI -Express WIFI cards made to fit the PCI-Express card slots on the
motherboard.
The benefit of using WIFI card in a desktop computer is that it allows you to setup your
workstation or home office without considering the proximity or availability of hard
line(Cable) network access.
Hub Switch
It repeats the incoming traffic to all connections
It sends only to appropriate connections
It offers single lane connection, hence either It establishes two-lane communication,
send or receive at a time facilitating send and receive at the same time
It shares the bandwidth among its connections It does not share bandwidth, each connection
gets full bandwidth.
It is an inexpensive choice It is expensive than hub
Introduction to Internet, URL, WWW, and its applications- Web, email, Chat, VoIP.
Web Browser: A web browser is an application that navigates through World Wide Web and
displays web pages.
Web Address: Each website has a unique address called URL (Uniform Resource Locator).
The Internet structure of World Wide Web is built on a set of rules called Hypertext Transfer
Protocol(HTTP) and a page description language called Hypertext Markup Language(HTML) . HTTP
uses internet addresses in a special format called a Uniform Resource Locator(URL).
type://address/path
Here, http: specifies the type of server, www.chinmayabokaro.org is the address of the server and
student/login.aspx is the path/location of the file login.aspx
Domain Name: A URL specifies the distinct address for each resource on the Internet. An Internet
address is character based is called Domain Name. The naming scheme by which servers are
identified is also known as the Domain Name System.
In addition to it, a two-letter abbreviation indicating the country name may be used
e.g.
au Australia in India
dk Denmark fr France
ca Canada jp Japan
nz New Zealand uk United Kingdom
WWW stands for World Wide Web: It is a set of protocols that allows us to access any type of
documents on the internet through a naming system based on URLs. WWW also specifies a way- the
hypertext transfer protocol (HTTP)- to read, receive and send the documents over the internet. With
these standard protocols of WWW in place, one can setup a server and construct hypertext
documents with links in them that point to the documents on the server.
WWW attributes:
i. user-friendly
ii. Multi-media documents
iii. Hypertext and Hyperlinks
Applications of WWW:
Website: Introduction, difference between a website and webpage, static vs dynamic web page,
web server and hosting of a website.
Web Browsers: Introduction: A web browser (commonly referred to as a browser) is an application
software for accessing information on the World Wide Web. When a user requests a web page from
a particular website, the web browser retrieves the necessary content from a web server and then
displays the page on the user's device.
Commonly used browsers: Internet Explorer, Microsoft Edge, Google Chrome, Mozilla Firefox,
Safari, Opera.
Browser settings:
Internet
Explorer Enable Cookies: Tools > Internet Options > Privacy > Advanced > Check "Override Automatic
(PC only) Cookie Handling (accept 1st party; Prompt 3rd party)" and check the option to always accept
session cookies. OK and OK back to browser.
Enable Javascript: Tools > Internet Options > Security Tab > Internet > Custom Level > Scroll
down to Scripting and enable "Active Scripting," "Allow Programmatic clipboard access," "Allow
status bar updates via script," "Allow websites to prompt for information ...," and "Scripting of
Java applets".
OK back browser.
Enable Status bar: View > Toolbars > Check "Status Bar".
Get New Page Each Visit: Tools > Internet Options > General Tab > in Browsing history
section, click the Settings button > select "Every time I visit the webpage." OK and OK back to
browser.
Pop-up Blocker Settings: Tools > Pop-up Blocker > Pop-up Blocker Settings ... > Add
ucmo.edu and ucmo.blackboard.com > Close back to browser.
Trusted Sites: Tools > Internet Options > Security > Trusted sites > Sites > Uncheck "Require
server verification for all sites in this zone"
Discussion Board Issues: Tools > Internet Options > Security Settings > Custom Level > scroll
down to Miscellaneous and set “Launching programs and files in an IFRAME” to Prompt. OK and
OK back to browser.
Mozilla NOTE: for Mac OS X browsers, access preferences via the Application Menu (ex.
Firefox Firefox>Preferences).
(PC and
Mac) Enable Cookies: Tools > Options > Privacy > History pane: Use custom settings for history >
Cookies > select “Accept cookies from sites” and "Accept third-party cookies." OK back to
browser.
Enable Javascript: Tools > Options > Content > check the “Enable Javascript” box. OK back to
browser.
Get new page each visit: Tools > Options > Privacy > History pane: Use custom settings for
history > select "Clear history when Firefox closes.“ Click Settings and select "Cache.” OK and
OK back to browser.
Popup Blocker Settings: Tools > Options > Content > Click the “Exceptions” button next to
Block Pop-up Windows > Add ucmo.edu and ucmo.blackboard.com > Click Allow and Close. OK
back to browser.
Clear Browser Cache: Tools > Clear Recent History > Select Cache. OK back to browser.
NOTE: for Mac OS X browsers, access preferences via the Application Menu (ex.
Chrome>Preferences).
Enable Cookies: Settings > Show advanced settings > Privacy > Content Settings... > Cookies
> check "Allow local data to be set.." OK and close Settings tab back to browser.
Enable Javascript: Settings > Show advanced settings > Privacy > Content Settings... >
Javascript > check “Allow sites to run Javascript”. OK and close Settings tab back to browser.
Google Get new page each visit: Settings > Show advanced settings > Privacy > Content Settings... >
Chrome Cookies > Select "Keep local data only unitl I quit my browser” OK. Close Settings tab back to
(PC and browser.
Mac)
NOTE: This will also clear your cookie each time the browser is closed. Unfortunately, Chrome
doesn't have a mechanism to automatically clear only the cache. You could alternatively just
routinely clear the browser cache (instructions provided below).
Popup Blocker Settings: Settings > Show advanced settings > Privacy > Content Settings... >
Pop-ups > Click the “Manage exceptions” button > Add ucmo.edu and ucmo.blackboard.com >
set behavior to "Allow." OK and close Settings tab back to browser.
Clear Browser Cache: History > Clear browsing data: Select "the beginning of time" from the
"Obliterate..." drop down, Select "Emtpy the cache" and click the Clear brwosing data button.
Close Settings tab back to browser.
All Settings: Safari Menu > Preferences > click Security icon > Check: Enable Plugins, Java, &
Javascript.
Safari
(Mac Only) Clear checkbox on "Block Popup Windows."
Add-ons and plug-ins: In computing, a plug-in (or plugin, add-in, addin, add-on, or addon) is a
software component that adds a specific feature to an existing computer program. When a program
supports plug-ins, it enables customization.
Applications support plug-ins for many reasons. Some of the main reasons include:
Cookies: Cookies are text files with small pieces of data — like a username and password — that are
used to identify your computer as you use a computer network. The purpose of the computer cookie
is to help the website keep track of your visits and activity. This isn’t always a bad thing. For
example, many online retailers use cookies to keep track of the items in a user’s shopping cart as
they explore the site. Without cookies, your shopping cart would reset to zero every time you clicked
a new link on the site. That would make it difficult to buy anything online!