Unit 2 Networking and Internet-1
Unit 2 Networking and Internet-1
Computer Network
Electronic equipment that exchange data or messages with one another, such as
computers, printers, fax machines, and telephones, are referred to as nodes or stations.
2. Half-duplex – Only one node at a time can broadcast data in the half-duplex mode,
which allows for bidirectional communication between the two nodes. In low-bandwidth
situations, this mode is typically used to transfer files between nodes.
3. Full-duplex – In full-duplex mode, both communicating parties can send and receive at
the same time. NIC (Network Interface Card) supports full-duplex mode.
Transmission Medium
The channel of transmission through which data can be sent as a signal from one node to
another is referred to as a transmission medium.
Guided Medium
Unguided Medium
1. Guided Medium – In guided medium, the data transmitted in a cable system that has a
fixed path. for example Co-axil, UTP, Optical fiber cable, etc.
2. Unguided Medium – In Unguided medium, the data transmit through free space in the
form of electromagnetic signal. for example, radio waves, lasers, micro waves etc.
Network Devices
Repeater – With increase in distance, a signal may become weak and distorted. A
repeater is used to restore the input signal to its original form, so that it can travel a larger
distance.
Hub – A hub joins multiple lines, sometimes known as cable segments, as opposed to a
repeater which links only two wires. A hub has multiple input/output (I/O) ports, each of
which is connected to a single device.
Bridge – In order to create a larger local area network (LAN), smaller LANs can be
combined using bridges, which are multiport devices used to connect two or more LANs.
Switch – Switches are used to connect individual nodes in the network with one another,
as opposed to bridges, which join two or more LAN segments.
Router – Routers are used to link different networks (LAN or WAN) collectively. Data from
an incoming network is sent to another network via a router. A router keeps track of
different networks’ routing tables. The router chooses which network the incoming packet
should be sent to based on the destination address.
Network Types
On the basis of geographical span, network can be broadly categorized as PAN, LAN,
MAN, and WAN.
Local area network – Local Area networks are private networks and can span a radius of
up to 1 Km. They are generally established within a building or campus. LANs operate at a
speed in the range 10 Mbps to 1 Gbps.
Metropolitan Area Network – These networks, which have a radius of up to 50 km, are
used to create connections within cities. Resources can be shared more easily because to
MANs, which link different local area networks. a city-based cable television network, as an
example.
Wide Area Network – A WAN typically covers a distance of roughly 1000 km. They are
useful for linking isolated places and for long-distance communication. They create
connections inside a nation or continent. A WAN may be owned and operated by a number
of different companies. It links numerous metropolitan and local area networks.
Topology
Network topology refers to the positioning of nodes in a network, often known as their
layout. or the arrangement of nodes in a network is called network topology. there are two
type of topologies –
Broadcast – All nodes share the same physical link one node transmit and
other receive. for example, Bus and Ring topologies.
Point to point – Every pair of nodes has a dedicated link. for example, Star
and Mesh topologies.
Bus Topology
In a bus topology, several nodes are connected by a lengthy cable known as the backbone
cable (or just the backbone) using a connector known as the tap. This topology requires
less cabling and is easy to install and extend the network laid using it. However, fault
detection and isolation is difficult.
Ring Topology
In a ring topology, all devices are connected by a cable that forms a ring. The intended
recipient of the message is reached by way of a one-way transmission of the intended
message. The problem of network is it take longer time to send a message from one node
to another node.
Star Topology
All of the devices in a star topology are connected to the hub, which serves as the central
controller. Any two devices can communicate with each other through the hub that relays
messages. Installation and configuration of the star network are simple.
Mesh Topology
In a mesh topology, every node in the network is linked to every other node. The topology
offers secure data transfer without any traffic issues because every conceivable pair of
nodes has a dedicated point-to-point connection.
Tree Topology
A hybrid topology that combines bus and star topologies is called tree topology. In a bus
topology, the primary backbone cable functions as the tree’s trunk, and star networks (and
even individual nodes) are connected to it like the tree’s branches.
A network interface controller (NIC) is given a media access control address (MAC
address), which it can use as a network address in communications inside a network
segment. Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking
technologies that frequently employ this application.
MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By convention, MAC
addresses are usually written in one of the following two formats:
MM:MM:MM: SS: SS:SS
MM-MM-MM-SS-SS-SS
IP Address
Domain Name
The process of turning a domain name into an IP address is known as domain name
resolution. Since one IP address can correlate to many domain names and one domain
name to one IP address, multiple domain names can simultaneously be resolved to the
same IP address.
The capacity to use reading, writing, technological expertise, and critical thinking to
navigate our digital world is known as digital literacy. It involves using technology to find,
assess, and transmit information, including devices like a smartphone, PC, e-reader, and
more.
Internet Services
Network services are programmes that are hosted by servers on a computer network and
offer functionality to network users. The Internet has several uses, including e-mail, file
sharing, remote login, and the World Wide Web (WWW).
Application layer
Data or a message is formed at the sending end and reviewed and processed at the
receiving end. The message that will be sent with the header must likewise be enclosed by
this layer. On this layer, a number of protocols like HTTP (HyperText Transfer Protocol)
and POP3 (Post Office Protocol version 3) operate.
Transport layer
The message is sent from the application layer to the transport layer, which appends the
source and destination ports of the processes at the two ends. At this layer, two end-to-end
protocols—TCP and UDP—are in use. When timely and error-free data transport is crucial,
TCP (Transmission Control Protocol) is a dependable connection-oriented protocol that is
required.
Internet Layer
The Internet layer receives the segments from the transport layer and adds the source and
destination machine network addresses (also termed IP address). IP, or Internet Protocol,
is utilised at the Internet layer. The format of packets sent over the Internet is specified by
IP.
Link layer
Host to Internet layer is another name for link layer. The header containing the sender and
receiver physical addresses must be included by this layer to the packet that was received
from the Internet layer.
Malicious software (programmes) created with the purpose of interfering with system
performance by harming the system, gaining unauthorised access to the system, or
preventing legitimate users from using computing resources are referred to as malware.
Malware includes viruses, worms, and Trojan horses.
Virus – A virus is a software code that may harm your system by overwriting or corrupting
the system files.
Worm – A worm is often received via network, and it automatically keeps on creating
several copies of itself on the hard disk thereby flooding the hard disk. When a worm is
received as an email attachment, it is automatically forwarded to the recipients leading to
network congestion.
Trojan Horse – Trojan Horse is a code that appears to be desirable and useful but ends
up harming the
system. Trojan horse can attach itself with a safe application. For example, it may be
attached to any game downloaded over the Internet. Such an application when executed
creates a backdoor in the system through which a hacker can access the system.
Eavesdropping
Denial of Service
Phishing
The practise of stealing a user’s personal information through fraudulent mail is known as
phishing.
These emails either include embedded forms that request personal information from you or
include links to web pages that might ask you for it.
Cyber Crime
Cybercrimes are crimes including theft, fraud, and forgery that involve the improper use of
computers or the Internet. According to the IT Act, cybercrime is any illegal activity in which
a computer is either a tool, a target, or both. These crimes include some of those listed
below –
TCP/IP protocols may be secured with cryptographic methods and security protocol like
Secure Sockets Layer (SSL).
Firewalls
An organization’s previously set security policies are used to monitor and filter incoming
and outgoing network traffic through a firewall, a network security device. A firewall is
essentially the barrier that stands between a private internal network and the open Internet
at its most basic level.
Antivirus
Viruses and other types of dangerous software can be found and eliminated from your
computer or laptop using an antivirus package. Malicious software, also referred to as
malware, is computer code that can damage your computers, laptops, and the data they
contain.
Password managers
A password manager is a piece of software that aids in organising and storing passwords.
In order to access their complete password database from top to bottom, users of
password managers typically need to generate a master password, which should be a
single, extremely strong password.
Cyber Law
Cyber laws serve as a deterrent to illicit cybercrime and regulate the systematic use of e-
resources, such as e-business. To prevent cybercrimes and prosecute those responsible,
numerous cyber laws have also been passed. These laws specify the punishment that will
be meted out to those who violate the laws.