Slide 1
What is Network?
•Collection of H/W and S/W that enables
a computer to communicate and provide
user access to shared resources. And
hardware like printer, monitors.
•A network is basically communication
system for computer. Telephone system
allow two people to talk to another.
Slide 2
• Any computer system requires one or
more transmitter and receiver , a message
and communication channel. Two
computer are said to be interconnected if
that are able to exchange information.
Slide 3
What is communication?
• Communication is the process of transferring
message from one point to another.
1. Sender: Which carries message
2. A medium which receives the message.
3. A receiver which receives the message.
For Ex. When you speak to your friend on
telephone. You are sender, the telephone line
through which your voice is transmitted is
medium and your friend is receiver.
Medium Carry
Sender Receiver
Massage
Slide 4
Modes Of Transmission
• There are three types of mode of
transmission
1. Simplex:
In simplex mode communication take
place only one direction. Device
connected are either send only or
receive only.
Sender Receiver
__________________________________________________________
___________________________
Slide 5
2.Half duplex Mode
In half duplex mode data are transmitted in
both direction but only in one direction at a
time. Hence, half duplex can alternately
send and received data. It requires two
wires. The terminal might transmit data
and then communication respond with
acknowledge.
Sender Receiver
or
Slide 6
3.Full Duplex Mode
If always information to flow
simultaneously in both direction
transmission path. It require four Wires.
Sender Receiver
AND
Slide 7
Data Transmission Mode
• Twisted Pair Wire
• Coaxial Cable
• Fiber Optic
1. Twisted Pair Wire
- A twisted pair wire consist of two bunches of
thin copper wires, each bunch enclosed
separately in a plastic insulation , then twisted
around each other to reduce interface by
adjacent wire. It is also called Unshielded
twisted pair(UTP).
__________________________________________________________
_________________
Slide 8
• It is known as UTP because other then plastic
coating around the two individual bunches of
copper wires, nothing shield it from outside.
• UTP cables are commonly used in local
telephone communication and short distance (up
to 1km) digital data transmission.
• That are normally used to connect terminal to
the main computer. Data transmission speed up
to 9600 bit per second(BPS) can be achieved, if
the distance is not more than 100 meters.
• UTP cables are an inexpensive medium of data
transmission. They are easy to install and use.
Slide 9
• However, their use is limited because they
easily pickup noise signal, which result in
high error rates.
Slide 10
2.Coaxial Cable
• Coaxial cables are groups of specially wrapped
and insulated wire line, which are able to
transmit data at high rates.
• They consist of a central copper wire
surrounded by PVC insulation (filling) over which
a sleeve (coat) of copper mesh is placed.
• The metal sleeve is again shielded by an outer
shield of thick PVC material. The signal is
transmitted by the inner copper wire, and is
electrically shielded by the outer metal sleeve.
Slide 11
• Coaxial cables offer much higher
bandwidth than UTP cables and are
capable of transmitting digital signals at
rates of 10 megabits per second.
• They are extensively used in long distance
telephone line and as cable for cable TV.
They are also used by telephone
companies to transmit data.
• Coaxial cables have much higher noise
immunity and can offer cleaner data
transmission without distortion or loss of
signal.
Slide 12
• A coaxial cable
Other PVC
Shield
Slide 13
3. Fiber Optic
• Optical fibers are hair thin threads of glass or plastic, which can
serve as a data transmission.
• The optical fiber transmit light signals instead of electrical signals.
Because light travels much faster than electricity.
• Optical fiber can transmit data at much higher speed than copper
wires.
• Plastic fiber are least efficient but trend to be cheaper and more
rugged (strong). Glass or silica fiber are much smaller.
• Physically , a fiber optic cables consist of three layers
1. Inner core
2. Cladding around it
3. Cuter protective coating.
Slide 14
• Fiber Optic
Slide 15
• All three types
Slide 16
Advantage of Fiber Optic
1. Large bandwidth:
- Optical fiber can transmit amount of data
at very high speed and long distance.
2. Low loss:
- Light signals can travel at very high speed
with no significant loss of intensity over
long distance.
Slide 17
3.Immunity to electromagnetic interference:
- They are made of insulator, optical fiber
transmission are not effected by magnetic
or electrical interference, which can cause
error in other media.
4. Small size and lightweight
5. Security
Slide 18
Disadvantage of Fiber Optic
1.Optical fiber, being fragile (easily broken),
can’t be turned at sharp corners.
2.Aliging and joining two fiber optic cable is
not so simple and easy as twisted pair. It
require special equipment to do so.
Slide 19
Unguided Media
1. Microwave System
2. Satellite Communication
• Microwave System or communication
- This is a popular way of transmitting data,
it does not incur the expense of laying
cables. It use very high frequency radio
signals to transmit data through space.
Slide 20
• It is necessary for microwave transmission
to be in a line of sight. The transmitter and
receiver of a microwave system are
mounted on very high towers. This may
not be possible for very long distance
transmission. The signal become weaker
after traveling a certain distance and
require power amplification (extension).
• To overcome the problems of line of sight
and power amplification of weak signals,
microwave system use repeater at
intervals of about 25 to 30 kms in between
the transmitting and receiving stations.
Slide 21
• The data signals are received, amplified
and retransmitted by each of these
stations.
• The installation cost of microwave links
being very high. They are used to link big
cities with heavy telephone traffic between
them.
Slide 22
• Figure
Transmitting antennas
Receiving
Repeaters Station
Line of sight
Slide 23
Satellite Communication
• The main problem with microwave system
is that the curvature (curve) of the earth ,
mountain and other stricture (limit) often
block the line of sight.
• Due to this reason , several repeater are
required for long distance transmission
which increase the cost of data
transmission between two point. This
problem is overcome by using satellite.
Slide 24
• A communication satellite is basically a
microwave relay station placed in outer
space. These satellite are launched either
by rocket or space shuttles and precisely
positioned 36,000 kms above the equator
with an orbit (range) speed which exactly
matches the earth’s rotation speed.
• Since a satellite is positioned in a
geosynchronous orbit , it is stationary
relative to earth and always stay over the
same point on the ground.
Slide 25
• This allow ground station to its antennas at fixed
point in the sky. Each satellite can receive and
retransmit signals to less than half of the earth’s
surface.
• So, at least three satellite are needed in
geosynchronous orbit to provide world wide data
transmission.
• Hundreds of satellite are now in orbit to handle
international and domestic data , voice and
video communication.
• A transporter , which is mounted on the satellite ,
amplifies the weak signal and transmit it back to
earth.
Slide 26
Types of Networks
• LAN (Local Area Network)
• WAN (Wide Area Network)
• MAN ( Metropolitan Area Network)
1. LAN
- LAN is a transmission system that allows
a large no of variety of computing
equipments to exchange information at
high speed , over limited distance.
Slide 27
• LAN is a network of interconnected
workstation sharing the resources of a
signal processor or server within a
relatively in small geographic area.
• All the connected device in network share
the some transmission media. Area
covered is small. Data transfer rates are
high , usually 1 mbps – 100 mbps. Cost of
setting up network is low.
Slide 28
Advantages of LAN
1.Resource Sharing
- It is the great advantage of LAN. Allows a large
number of intelligent devices to share resource.
The computer in LAN share H/W , several
people can use the same network printer.
2. Sharing Information
- With the help of computer network , data can be
transmitted to a large number of computer as
well as retrieve data from large computer
through the network.
• It operate at lower price and high flexibility.
Slide 29
• Limitation of LAN.
1.Networking Management
2. Presentation of integrity of network at all
costs and level is a difficult task unless
automatic connection are provided.
3. When network fail , it is not only costly but
also complex to operates.
4. Virus and S/W bugs problem may destroy
the entire networking system.
Slide 30
LAN Topologies
• Topology means the manner in which
computer are organized.
1. Star topology
2. Bus topology
3. Ring topology
Slide 31
Star Network
• When all computer in the network are
connected to a central node. The central
node is an intelligent switch which can
only provide a data connection for various
node.
HOST
Slide 32
Advantage
• It has minimal line cost.
• Transmission delay between two node
don’t increase by adding new node to
network bar any two nodes may be
connected via two link only. If any of local
computer fail , the remaining portion of
network is unaffected.
Slide 33
Disadvantage
• System crucially depends on the central
node. The host computer fails, the entire
network fails.
Slide 34
Ring Network
• In this network , each computer is hocked
together to form of circle or ring
configuration. There is no master
computer for controlling other computer.
Slide 35
Advantage
• There is no central site computer.
• It more reliable than star because
communication is not dependent on a single
host computer. If link between two computer
break down, alternate routing is possible.
Disadvantage:
1. Addition of new nodes in network increase the
communication delay.
2. It requires more complicated control S/W than
Star topology.
Slide 36
Digital and Analog Data
Transmission
• Data is propagated from one point to other point
by means of electrical signals, which may be in
digital or analog form.
• In analog signal, the transmitted power varies
over a continuous range, for example sound,
light and radio waves.
• The amplitude (V) of analog signal is measured
in volts and its frequency (F) in hertz (HZ)
• The higher is the frequency of the signal the
more number of times it cross the time axies.
Slide 37
• Digital signal is a sequence of voltage pluses
represented in binary form.
• Computer generated data is digital where as the
telephone line used for data communication in
network are usually meant for carrying analog
signal.
• When digital data is to be sent over an analog
facility, the digital signal must be converted to its
analog form is known as modulation.
• The reverse process, the conversion of analog
signal to its digital form at a destination device is
called demodulation.
Slide 38
Modulation Technique
• Modulation is often used for
superimposing digital data on analog
waves. There are three forms of
modulation.
1. Amplitude modulation:
- Two binary values( 0 & 1) of digital data
are represented by two different
amplitudes of carrier signal, keeping
frequency and phase constant.
Slide 39
• On voice line, it is used up to 1200 bps.
However, amplitude modulated signal are
sensitive to impulse noise, which arise due
to electrical sparks near transmission.
2. Frequency Modulation (FM) :
- Two binary value are represented by two
different frequencies while amplitude and
phase are kept constant.
- This method is less susceptible
(vulnerable) to error than amplitude
modulation.
Slide 40
• Another advantage is that it is easier to
design device based on FSK because
discrimination between two frequency is
simpler than detecting phase change.
3. Phase modulation (PM):
- Two binary values are represented by the
shift in phase of the carrier( transport)
signal.
- This technique is more noise resistant and
efficient than both AM and FM. PM is more
reliable and preferred to other methods.
Slide 41
Data Transmission Services
• Organization may afford to lay their own
communication channel in a smaller
geographical areas, such as within a
building or a campus.
• However it becomes impractical for
organization to do so in a large
geographical area, such as between two
cities or countries.
Slide 42
• It is also impractical for them to set their
own satellite for them to set their own
satellite in orbit.
• There for organization hire the services of
data transmission services of data
transmission service providers for their
data communication needs.
• VSNL,BSNL and MTNL are few such
common carrier in India. The various types
of services offered by the common carrier
are?
Slide 43
Dial-up Line
• Dial –up line is a services which operates in a
manner similar to telephone calls.
• A user of a computer willing to communicate
with a remote computer first makes a connection
request by dialing up the remote computer.
• A circuit is then established between two
computer via telephone company’s switching
system.
• The modem attached to the user’s computer
then send and receive data over telephone line.
Slide 44
Leased Line
• Leased line also known as private line or
dedicated line. It is a special conditioned
telephone line, which directly and permanently
connect two computer.
• It can be used for both voice and data
transmission. Hence, if an org. has two office in
two different cities, its often cheaper for org. to
acquire its own leased line between two office,
which can be used by the org. for all its voice
and data transmission between two office.
• The charges for leased line are often based on
channel capacity and distance.
Slide 45
Integrated Services Digital Network
• The ISDN is a telephone system, which provide
digital telephone and data services. As it is
support digital services the ISDN telephone
users enjoy noise-free, quality and sound with
the ISDN.
• in ISDN no modem is necessary because it
support digital transmission of all types of data.
• Based on the transmission and switching
capabilities, the ISDN are currently two types.
Slide 46
1. Narrowband ISDN is based on 6.4 kbps.
- Bit stream that are combined into higher
capacity trunks, using time division
multiplexing.
- It can’t support the requirement of several types
of data services, those need for multimedia
application.
- The bandwidth requires for full definition digital
video is in 100 mbps range.
2. To handle this sort of traffic from computer
Broadband was introduced.
- This ISDN is based on optical fibers and
asynchronous time-division multiplexing.
Slide 47
Web Browser
• A web browser is client program running on
the user computer that is capable of contacting
the server on the W W W when the user is
connected to the internet.
• Popular Web browser are:
1. Internet Explorer
2. Netscape Navigator
3. Mozila Firefox
4. Spry Mosaic
5. Linux
Slide 48
• The browser request information from the
server using the HTTP protocol.
• The browser interprets the tags in HTML
document received from the server and
display the content in the window.
• A browser can also display image file,
animation and applets which are created
using JAVA,VB.
• The browser takes the help of plug-in
application for displaying image, sound or
animation that it can’t display directly.
Slide 49
• Using a browser it is possible to:
1. Follow the links and reads their content.
2. Retrace steps to previous link.
3. Insert bookmark so that one can go
directly to that page.
4. Use E-mail.
5. Get information about the web.
6. View the URL that link point to.
Slide 50
Web Page
• Web page are multimedia documents on the
web server that can include graphics, audio ,
animation and video in formatted text.
• The web pages are connected through hypertext
link that allow one to move from page to page in
any order.
• The web pages are HTML documents consisting
of HTML tags, attributes and hyperlink that are
added to plain text.
• A webpage may also contain small program
called applets.
Slide 51
Web Server
• Web server are computer connected to
WWW that run the web hosting Software.
• Web server store the HTML document and
other associated files like image and
applet files that make up a website.
• Web hosting software has the capability of
sending the appropriate set of document
back to user.
Slide 52
• Then a request for them is received.
• The server use HTTP protocol for sending
document over the WWW.
• A web browser running on a client
computer sends a request for a document
to the Web Server.
• The web server extracts the needed
document and transmit it back to the
browser. CGI( Common Gateway
Interface) are used for server side to
accessing of client side.
Slide 53
• The CGI script could query a database
running on the server and transmit only
the result back to the user.
• The scripts could also be used to
dynamically generate web pages for
searching an index on a server and for
processing form set by the browser.
Slide 54
Web Site
• A Web site is collection of related HTML
document and other objects residing
together on Web server connected to
WWW. Documents on a site are linked to
other documents on the site and even to
document.
• On other site a single web server can host
multiple site on different area of its disk.
Slide 55
• Some website are so large and they have
so much traffic on them that they require
multiple server.
• The document on the site are made
available to other on the WWW through
the Web Server.
• A website that simply supply web page to
other on demand is Static web site.
• Some website also have the capability of
running small program to satisfy the more
user request. These site are known
dynamic Website.
Slide 56
E-mail- Electronic Mail
• E-mail is the internet’s most widely used feature.
It is a private communication between two
parties who have accounts on web.
• Email allows an internet user to send a mail to
another user in any part of the world. The
message takes anywhere from a few second to
several minutes to reach its destination.
• It is similar to postal mail services which all of us
are familiar with.
Slide 57
• All internet user have email address like our
postal address. Each internet user has a logical
mailbox like each one of us has a mailbox in
house.
• When sending a mail to another user, sender
has to specify the email address of the receiver
just as we write the postal address of the
receiver.
• Receiver extract the mail from mailbox read it
his/her convenient time just like postal mail.
• After reading the message . Receiver can save it
, delete it, pass it to someone else or respond by
sending another message back.
Slide 58
• Features:
• Composing:
1. To
2. CC
3. BCC
4. Subject
5. Message \ body
• Replaying:
• This method allow sending a msg to who has
send a current message. By default , received
msg will come in replying mail with indented by
a character ’>’
• By default replying mail will have same original
subject prefixed with “RE:”.
Slide 59
• Forwarding:
• This method allows forwarding received
message to some one
• By default received meg will come in forwarding
mail with indented by a character ‘>’. This
character can be changed
• By default forwarding mail will have same
original subject prefixed with ‘fwd’.
• Priority:
• It transmit the urgency of meg that it to
low,normal,high for any meg by default it is
normal.
Slide 60
• File attachment:
• Email can’t send formatted text formatted
in word document, containing pictures etc.
• Compressing the file using the utility like
zip, may reduced size and save time and
money during orgn.
• List of file attached is available while
composing mail along with their size.
Slide 61
Voice Mail
• It is a relatively new form of e-mail system.
This system is easier to use for untrained
staff and therefore called user’s friendly
system.
• You have to speak your message an the
tape recording media. Message
distribution can be done through the
computer in digital electronic form after a
user has left his call on the terminal.
Slide 62
• The message shall be transferred to remote
terminals at another sites at appropriate time.
The system is better than STD.
• This system are being effectively implemented
where large no. of employee are likely to be in
conversion. With each other like airline
reservation.
• Telephone play an important role in our personal
and professional live.
• In a business setting a variety of problem tend to
be associated with the use of telephone like
interruption , incomplete information exchange ,
late information or lost opportunity, unproductive
social exchange etc.
Slide 63
• Voice mail in automated office is flexible
means of sending a spoken message.
• The caller talks into a telephone and
message is stored and is communicated
later to the recipient's voice mail box.
• Even if there is a need for a two way
exchange of information voice mail can be
helpful.
• The power of a voice mail system is in
ability to relay commands to the voice mail
computer. This is done through the
standard 12 key on touch tone phone.
Slide 64
• The key generate tone that the computer
interprets. Most system have some kind of
voice prompting to explain to the user
which key or keys should be pushed next.
• Using the keys the user can record a
message listing to the massage before
transmitting change the massage and
send it to one or more recipient.
Slide 65
TELNET
• Telnet is an internet utility that allow
people to log onto a remote computer on
internet and use all its facility for which
rights are granted.
• That is a user can execute the telnet
command on his/her local computer to
start a login session on a remote computer
this action is called remote login.
Slide 66
• To start a remote login session, the user type
the cmd telnet and address of the remote
computer on the terminal of his local computer.
• The user then receive a prompt asking to enter a
login name (User id) and a password to ensure
that user has access right for accessing the
remote computer.
• Once the login session is established with the
remote computer, telnet enter the input mode
and anything typed on the terminal of local
computer by user is sent to remote computer for
processing.
Slide 67
• The user must be familiar with an
operating system and utilities of remote
computer that has been logged into.
• The user can access database on the
computer or run the program that are
available.
Slide 68
DNS( Domain Name System)
• To divide the huge amount of information
into smaller parts and store each part on a
different computer. In this method the host
needs mapping can content the closest
computer holding the needed information
this method is used by DNS.
• The named assigned to machine must be
unique because the address are unique.
Slide 69
• A namespace that maps each address to
a unique name can be organized in two
ways: Flat or Hierarchical
• A name in this space is a sequence of
character without structure.
• In hierarchical name space, each name is
made of several parts.
• The first part can define the nature of the
organization, the second part can define
the name of an organization , the third part
can define departments in the
organization.
Slide 70
• Each node in the tree has a domain name.
A full domain name is a sequence of
labels separated by dot(.) .
• The domain name are always read from
the node up to the root.
• DNS is a protocol that can be used in
different platform. In the internet, the
domain name space is divided into three
different section : Generic domains,
Country domain and the inverse domain.
Slide 71
PING ( Packet InterNet Gropher)
• Ping is a diagnostic tool used for verifying
connectivity between two host on the
network.
• The ping CMD is the most common
network utility. PING is a computer
network tool used to test whether a
particular host is reachable across an IP
network.
Slide 72
• It sends ICMP( Internet control message
protocol) echo request packet to a
remote IP address and watches for ICMP
response.
• PING is used to be good indicator of a
machine’s general ability to receive and
send IP packets. If you could ping a host,
you also could make an FTP or HTTP
connection.
• PING command Option
1. –C count: Stop sending and receiving
packet after count packets
Slide 73
2. –f: Send the packet as fast as possible.
3. – i wait : Set an interval of wait second
between packet.
4. –I : Set the output interface.
Slide 74
WAIS( Wide Area Information
Services)
• WAIS is a tool for working with collection of data
and is primarily used for topic based searching.
• WAIS requires that the database you are
searching are indexed and thus there require a
deliberate effort by those making the database
available.
• WAIS is a powerful research tool, but to use it
well requires the user to learn how to search
effectively.
Slide 75
• When starting from search, the first step is
to identify database which are relevant to
the topic of search.
• This is done by a broad topic search in the
indexed directory of WAIS servers and
then narrowing the search by doing more
specific keywords searches in the
retrieved database.
Slide 76
What is search Engine? How it
works?
• A program that search documents for
specified keywords and returns a list of the
documents where keywords were found.
• Although search engine is really a general
class of program, the term is often used
specifically describe system like Alta vista
and excite that enable user to search for
documents on WWW and USENET
newsgroup.
Slide 77
• Search engine works by sending out a
spider to fetch as many a documents as
possible. Another program is called
indexer then reads this documents and
create an index based on the words
contained in each document.
• Each search engine uses a proprietary
algorithm to create it indices such that only
meaningful result are returned for each
query.
• Search scripts are written general in Perl
or C searching site a maximum a few
thousand page.
Slide 78
• They don’t include complex algorithm to
optimize searching and indexing and
become useable as the site over a few
thousand pages.
• Such scripts are still good when it comes
to home made site, where a search box is
more of widget.
• How search Engine Works?
• Search engine consist of five discrete
(isolated) software components.
Slide 79
1. Spider:
• A spider is a robotic program that
download webpage.
• It works just as your browser does when
you connect to a website and
downloading a page. It hasn’t any visual
component. You can see the same thing
by viewing any webpage and then
selecting view sources in your broswer.
Slide 80
2. Crawler:
• As a spider download pages. It can strip (bit)
apart the page and look for ‘links’.
• It is crawlers job to then decide where the spider
should go to next based on the links or based
upon a preprogrammed list of URLs.
3. Indexer:
• An indexer rip (break) apart a page into its
various component and analyze them. Entities
such as title, heading, links, text, bold, italic and
other styles portion of page are ripped apart and
analyze.
Slide 81
4. Database:
• The database is the storage medium for
all the data a search engine downloads
and analyzes.
• This can require huge amount of storage
space.
5. Search Engine Result Engine (SERE)
• It is the results engine’s job to decide
what page match the user search. This is
the portion of a search engine you
interact with when you perform a search.
Slide 82
• When a user types in a keyword does a
search, search engine decide what to
match for result underlying criteria. The
means with which it decide is called an
algorithm.