Unit 5
Unit 5
45
Computer Networking Terminology
In this chapter, we will discuss the major terminologies used in computer networking −
WAN
It stands for Wide Area Network and covers a wide area such as a city.
LAN
It stands for Local Area Network and covers a small area such as a small office or home. It
physically connects all the computers located in the premises.
Explore our latest online courses and learn new skills at your own pace. Enroll and
become a certified expert to boost your career.
Internet
It is a computer network system that connects the computers of the world. It is normally
connecting through WAN and LAN.
Intranet
It is a close room computer network system, as it covers a small area and only authorized
people can access it.
Extranet
It is also a sort of Internet the access to which is granted only to a few.
1/
45
Page 2 of
45
It is a Protocol, which is used especially for voice transfer over IP network. Likewise, it
facilitates users to make phone-calls by using internet.
Web log
It is a sort of online inventory (normally on a specialized topics) that consists of a series of
entries. These entries are arranged in opposite chronological order. The person who
maintains the weblog regularly update it with a new information.
Podcast
It is a digital file that normally contains audio or video record and is available on the
Internet as well.
Chat Rooms
2/
45
Page 3 of
45
It is a dedicated area on the Internet that facilitates users to communicate.
Download
It is a process that saves data from Internet onto a personal computer.
Upload
It is a process that transfers the saved data from a personal computer to Internet server.
Dial-up
It is a technique in which a phone line is used in order to connect to the Internet.
Broadband
It is a wide bandwidth data transmission that transports multiple signals and traffic types
swiftly.
The Domain Name System (DNS) is like the internet’s phone book. It helps you find websites
by translating easy-to-remember names (like www.example.com) into the numerical IP
addresses (like 192.0.2.1) that computers use to locate each other on the internet. Without
DNS, you would have to remember long strings of numbers to visit your favorite websites.
Domain Name System (DNS) is a hostname used for IP address translation services. DNS is
a distributed database implemented in a hierarchy of name servers. It is an application layer
protocol for message exchange between clients and servers. It is required for the functioning
of the Internet.
Every host is identified by the IP address but remembering numbers is very difficult for people
also the IP addresses are not static therefore a mapping is required to change the domain
3/
45
Page 4 of
45
name to the IP address. So DNS is used to convert the domain name of the websites to their
numerical IP address.
DNS translates domain names to IP addresses, making it an essential part of the internet.
Inverse Domain: if we want to know what is the domain name of the website. IP to
domain name mapping. So DNS can provide both the mapping for example to find the IP
addresses of geeksforgeeks.org then we have to type.
Internet Connection
An Internet connection refers to a direct link that allows devices to access the World Wide
Web. It is essential for browsing websites and online content, with different types of
connections available depending on the user's needs, such as dial-up or high-speed
connections.
An Internet Protocol (IP) address is the unique identifying number assigned to every
device connected to the internet. An IP address definition is a numeric label assigned to
devices that use the internet to communicate. Computers that communicate over the internet
or via local networks share information to a specific location using IP addresses.
IP addresses have two distinct versions or standards. The Internet Protocol version 4 (IPv4)
address is the older of the two, which has space for up to 4 billion IP addresses and is
assigned to all computers. The more recent Internet Protocol version 6 (IPv6) has space for
trillions of IP addresses, which accounts for the new breed of devices in addition to
computers. There are also several types of IP addresses, including public, private, static, and
dynamic IP addresses.
4/
45
Page 5 of
45
Every device with an internet connection has an IP address, whether it's a computer, laptop,
IoT device, or even toys. The IP addresses allow for the efficient transfer of data between two
connected devices, allowing machines on different networks to talk to each other.
An IP address works in helping your device, whatever you are accessing the internet on, to
find whatever data or content is located to allow for retrieval.
Common tasks for an IP address include both the identification of a host or a network, or
identifying the location of a device. An IP address is not random. The creation of an IP address
has the basis of math. The Internet Assigned Numbers Authority (IANA) allocates the IP
address and its creation. The full range of IP addresses can go from 0.0.0.0 to
255.255.255.255.
Public IP address
A public IP address, or external-facing IP address, applies to the main device people use to
connect their business or home internet network to their internet service provider (ISP). In
most cases, this will be the router. All devices that connect to a router communicate with
other IP addresses using the router’s IP address.
Knowing an external-facing IP address is crucial for people to open ports used for online
gaming, email and web servers, media streaming, and creating remote connections.
Private IP address
Private IP addresses are reused across multiple networks, thus preserving valuable IPv4
address space and extending addressability beyond the simple limit of IPv4 addressing
(4,294,967,296 or 2^32).
In the IPv6 addressing scheme, every possible device has its own unique identifier assigned
by the ISP or primary network organization, which has a unique prefix. Private addressing is
possible in IPv6, and when it's used it's called Unique Local Addressing (ULA).
Static IP address
All public and private addresses are defined as static or dynamic. An IP address that a person
manually configures and fixes to their device’s network is referred to as a static IP address. A
static IP address cannot be changed automatically. An internet service provider may assign a
static IP address to a user account. The same IP address will be assigned to that user for
every session.
5/
45
Page 6 of
45
Dynamic IP address
Each time a user logs into the network, a fresh IP address is assigned from the pool of
available (currently unassigned) IP addresses. A user may randomly cycle through several IP
addresses across multiple sessions.
What Is IPv4?
IPv4 is the fourth version of the IP. It is one of the core protocols of the standards-based
methods used to interconnect the internet and other networks. The protocol was first
deployed on the Atlantic Packet Satellite Network (SATNET), which was a satellite network
that formed a segment of the initial stages of the internet, in 1982. It is still used to route
most internet traffic despite the existence of IPv6.
IPv4 is currently assigned to all computers. An IPv4 address uses 32-bit binary numbers to
form a unique IP address. It takes the format of four sets of numbers, each of which ranges
from 0 to 255 and represents an eight-digit binary number, separated by a period point.
6/
45
Page 7 of
45
IP Address Classes
Some IP addresses are reserved by the Internet Assigned Numbers Authority (IANA). These
are typically reserved for networks that carry a specific purpose on the Transmission
Control Protocol/Internet Protocol (TCP/IP), which is used to interconnect devices. Four
of these IP address classes include:
1. 0.0.0.0: This IP address in IPv4 is also known as the default network. It is the non-
routeable meta address that designates an invalid, non-applicable, or unknown network
target.
2. 127.0.0.1: This IP address is known as the loopback address, which a computer uses to
identify itself regardless of whether it has been assigned an IP address.
Further reserved IP addresses are for what is known as subnet classes. Subnetworks are small
computer networks that connect to a bigger network via a router. The subnet can be assigned
its own IP address system, so that all devices connecting to it can communicate with each
other without having to send data via the wider network.
The router on a TCP/IP network can be configured to ensure it recognizes subnets, then route
the traffic onto the appropriate network. IP addresses are reserved for the following subnets:
IP addresses listed under Class A, Class B, and Class C are most commonly used in the
creation of subnets. Addresses within the multicast or Class D have specific usage rules
outlined in the Internet Engineering Task Force (IETF) guidelines, while the release of Class E
addresses for public use was the cause of plenty of debate before the IPv6 standard was
introduced.
The IANA reserves specific IP address blocks for commercial organizations, government
departments, and ISPs. When a user connects to the internet, their ISP assigns them an
address from within one of the blocks assigned to it. If they only go online from one
7/
45
Page 8 of
45
computer, then they can use the address assigned to it by their ISP.
However, most homes now use routers that share a network connection with multiple
devices. So if a router is used to share the connection, then the ISP assigns the IP address to
the router, and then a subnet is created for all computers that connect to it.
IP addresses that fall within a subnet have a network and a node. The subnet is identified by
the network. The node, also known as the host, connects to the network and needs its own
address. Computers separate the network and node via a subnet mask, which filters the
appropriate IP address designation. When a large network is set up, the subnet mask that
best fits the number of nodes or subnets required is determined.
When it comes to IP addresses within a subnet, the first address is reserved for the subnet,
and the final one indicates the broadcast address for the subnet’s systems.
IPv4 vs IPv6
IPv4 has not been able to cope with the massive explosion in the quantity and range of
devices beyond simply mobile phones, desktop computers, and laptops. The original IP
address format was not able to handle the number of IP addresses being created.
To address this problem, IPv6 was introduced. This new standard operates a hexadecimal
format that means billions of unique IP addresses can now be created. As a result, the IPv4
system that could support up to around 4.3 billion unique numbers has been replaced by an
alternative that, theoretically, offers unlimited IP addresses.
That is because an IPv6 IP address consists of eight groups that contain four hexadecimal
digits, which use 16 distinct symbols of 0 to 9 followed by A to F to represent values of 10 to
15.
Windows computer users can look up their IP address by typing "cmd" into the search tab and
hitting Enter, then typing "ipconfig" into the pop-up box. Mac computer users can find their IP
address by heading into System Preferences and selecting Network.
To look up an IP address on a mobile phone, users need to head into Settings, then open the
Wi-Fi menu and their network menu. The IP address should be listed under the Advanced
section, depending on the phone they use.
When you analyze an IP address vs. a MAC address, you can start with the similarities. For
both of these IP address types, you are dealing with a unique identifier with an attachment to
that device. The manufacturer of a network card or router is the provider of the MAC address,
while the internet service provider (ISP) is the provider of the IP address.
8/
45
Page 9 of
45
The main difference between the two is that the MAC address is the physical address of a
device. If you have five laptops on your home Wi-Fi network, you can identify each of those
five laptops on your network via their MAC address.
The IP address works differently as it is the identifier of the connection of the network with
that device. Other differences include:
A third party will have a difficult time finding a MAC address, while it can easily find an
IP address.
MAC addresses and IP addresses are necessary to get a network packet to a destination.
However, no one can see your MAC address unless they are on your LAN
A variety of security threats are related to IP addresses. Cybercriminals can deceive devices
to either reveal your IP address and pretend they are you or stalk it to track activity and take
advantage. Online stalking and social engineering are the two leading security threats
existing for IP addresses.
2. Using your IP address to target your network and launch a DDoS attack
There are multiple ways to protect your IP address from cybercriminals. Some of these
options include:
1. Use a VPN
9/
45
Page 10 of
45
https://developer.mozilla.org/en-US/docs/Learn/Common_questions/Web_mechanics/
What_is_a_URL
What is a URL?
This article discusses Uniform Resource Locators (URLs), explaining what they are and how
they're structured.
A URL (Uniform Resource Locator) is the address of a unique resource on the internet. It is one
of the key mechanisms used by browsers to retrieve published resources, such as HTML
pages, CSS documents, images, and so on.
In theory, each valid URL points to a unique resource. In practice, there are some exceptions,
the most common being a URL pointing to a resource that no longer exists or that has moved.
As the resource represented by the URL and the URL itself are handled by the Web server, it is
up to the owner of the web server to carefully manage that resource and its associated URL.
https://developer.mozilla.org
https://developer.mozilla.org/en-US/docs/Learn/
https://developer.mozilla.org/en-US/search?q=URL
Any of those URLs can be typed into your browser's address bar to tell it to load the associated
resource, which in all three cases is a Web page.
A URL is composed of different parts, some mandatory and others optional. The most
important parts are highlighted on the URL below (details are provided in the following
sections):
Note: You might think of a URL like a regular postal mail address: the scheme represents the
postal service you want to use, the domain name is the city or town, and the port is like the zip
code; the path represents the building where your mail should be delivered;
the parameters represent extra information such as the number of the apartment in the
building; and, finally, the anchor represents the actual person to whom you've addressed your
mail.
10/
45
Page 11 of
45
Note: There are some extra parts and some extra rules regarding URLs, but they are not
relevant for regular users or Web developers. Don't worry about this, you don't need to know
them to build and use fully functional URLs.
Scheme
The first part of the URL is the scheme, which indicates the protocol that the browser must use
to request the resource (a protocol is a set method for exchanging or transferring data around
a computer network). Usually for websites the protocol is HTTPS or HTTP (its unsecured
version). Addressing web pages requires one of these two, but browsers also know how to
handle other schemes such as mailto: (to open a mail client), so don't be surprised if you see
other protocols.
Authority
Next follows the authority, which is separated from the scheme by the character pattern ://. If
present the authority includes both the domain (e.g. www.example.com) and the port (80),
separated by a colon:
The domain indicates which Web server is being requested. Usually this is a domain
name, but an IP address may also be used (but this is rare as it is much less
convenient).
The port indicates the technical "gate" used to access the resources on the web server.
It is usually omitted if the web server uses the standard ports of the HTTP protocol (80
for HTTP and 443 for HTTPS) to grant access to its resources. Otherwise it is mandatory.
Note: The separator between the scheme and authority is ://. The colon separates the scheme
from the next part of the URL, while // indicates that the next part of the URL is the authority.
One example of a URL that doesn't use an authority is the mail client (mailto:foobar). It
contains a scheme but doesn't use an authority component. Therefore, the colon is not
followed by two slashes and only acts as a delimiter between the scheme and mail address.
Path to resource
11/
45
Page 12 of
45
/path/to/myfile.html is the path to the resource on the Web server. In the early days of the
Web, a path like this represented a physical file location on the Web server. Nowadays, it is
mostly an abstraction handled by Web servers without any physical reality.
Parameters
Anchor
The World Wide Web -- also known as the web, WWW or W3 -- refers to all the public websites
or pages that users can access on their local computers and other devices through
the internet. These pages and documents are interconnected by means of hyperlinks that
users click on for information. This information can be in different formats, including text,
images, audio and video.
The term World Wide Web isn't synonymous with the internet. Rather, the World Wide Web is
part of the internet.
12/
45
Page 13 of
45
How does the World Wide Web work?
Paving the way for an internet revolution that has transformed the world in only three
decades, the World Wide Web consists of multiple components that enable users to access
various resources, documents and web pages on the internet. Thus, the WWW is like a vast
electronic book whose pages are stored or hosted on different servers worldwide.
These pages are the primary component or building blocks of the WWW and are linked through
hyperlinks, which provide access from one specific spot in a hypertext or hypermedia
document to another spot within that document or a different one. Hyperlinks are another
defining concept of the WWW and provide its identity as a collection of interconnected
documents.
The Hypertext Transfer Protocol (HTTP) is another key component of the WWW. It enables
users to access web pages by standardizing communications and data transfer between the
internet's servers and clients.
Most web documents and pages are created using Hypertext Markup Language (HTML), a text-
based way of describing how content within an HTML file is structured. HTML describes the
structure of web pages using elements or tags and displays the content of these pages
through a web browser.
To access one of these pages, a user and their client machine supply a universal identifier to
the web server via a browser. This identifier may be a uniform resource locator (URL) or
uniform resource identifier (URI) and is unique to each web page.
British physicist Tim Berners-Lee invented the World Wide Web. Along with colleagues at
Geneva-based CERN -- the European Organization for Nuclear Research -- Berners-Lee had
been working on the concept since 1989. Their goal was to combine available technologies
and data networks to create a user-friendly system for global communication and information
sharing. At the time, they began work on the first WWW server, which they called httpd. They
also dubbed the first client WWW.
Originally, WWW was a what you see is what you get (WYSIWYG) hypertext browser/editor that
ran in the NextStep environment. In 1990, Berners-Lee demonstrated the first web server and
browser at CERN to explain his idea of a World Wide Web. The web then entered the public eye
in 1991 when Berners-Lee, who also developed hypertext, announced his creation on the
alt.hypertext newsgroup; at the same time, he created the world's first web page with the
13/
45
Page 14 of
45
address http://info.cern.ch/hypertext/WWW/TheProject.html.
This page, which remains operational as of 2022, includes information and links about the
WWW project and web servers. In 1993, CERN made the W3 technology publicly available on a
royalty-free basis.
Client-Server Model
The Client-server model is a distributed application structure that partitions tasks or workloads
between the providers of a resource or service, called servers, and service requesters called
clients. In the client-server architecture, when the client computer sends a request for data to
the server through the internet, the server accepts the requested process and delivers the
data packets requested back to the client. Clients do not share any of their resources.
Examples of the Client-Server Model are Email, World Wide Web, etc.
In this article, we are going to take a dive into the Client-Server model and have a look at
how the Internet works via, web browsers. This article will help us have a solid WEB
foundation and help us easily work with WEB technologies.
Client: When we say the word Client, it means to talk of a person or an organization
using a particular service. Similarly in the digital world, a Client is a computer (Host)
i.e. capable of receiving information or using a particular service from the service
providers (Servers).
Servers: Similarly, when we talk about the word Servers, It means a person or
medium that serves something. Similarly in this digital world, a Server is a remote
computer that provides information (data) or access to particular services.
So, it is the Client requesting something and the Server serving it as long as it is in the
database.
For those new to networking concepts, the System Design Course provides a comprehensive
overview of the client-server model and its applications in modern computing.
14/
45
Page 15 of
45
There are a few steps to follow to interacts with the servers of a client.
User enters the URL(Uniform Resource Locator) of the website or file. The Browser then
requests the DNS(DOMAIN NAME SYSTEM) Server.
The DNS Server responds with the IP address of the WEB Server.
The Browser sends over an HTTP/HTTPS request to the WEB Server’s IP (provided by
the DNS server).
The Server sends over the necessary files for the website.
The Browser then renders the files and the website is displayed. This rendering is done
with the help of DOM (Document Object Model) interpreter, CSS interpreter, and JS
Engine collectively known as the JIT or (Just in Time) Compilers.
15/
45
Page 16 of
45
Search engines are the software program that provides information according to the user
query. It finds various websites or web pages that are available on the internet and gives
related results according to the search. To rank well on a Search Engine, it’s important to know
What are Search engines and how they work.
Search engines are programs that allow users to search and retrieve information
from the vast amount of content available on the internet. They use algorithms to
index and rank web pages based on relevance to a user’s query, providing a list of results for
users to explore. Popular search engines include Google, Bing, and Yahoo.
IP-Enabled Services
Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a
broadband Internet connection instead of a regular (or analog) phone line. Some VoIP services
may only allow you to call other people using the same service, but others may allow you to
call anyone who has a telephone number - including local, long distance, mobile, and
international numbers. Also, while some VoIP services only work over your computer or a
special VoIP phone, other services allow you to use a traditional phone connected to a VoIP
adapter.
16/
45
Page 17 of
45
VoIP services convert your voice into a digital signal that travels over the Internet. If you are
calling a regular phone number, the signal is converted to a regular telephone signal before it
reaches the destination. VoIP can allow you to make a call directly from a computer, a special
VoIP phone, or a traditional phone connected to a special adapter. In addition, wireless "hot
spots" in locations such as airports, parks, and cafes allow you to connect to the Internet and
may enable you to use VoIP service wirelessly.
A broadband (high speed Internet) connection is required. This can be through a cable
modem, or high speed services such as DSL or a local area network. A computer, adaptor,
or specialized phone is required. Some VoIP services only work over your computer or a
special VoIP phone, while other services allow you to use a traditional phone connected to a
VoIP adapter. If you use your computer, you will need some software and an inexpensive
microphone. Special VoIP phones plug directly into your broadband connection and operate
largely like a traditional telephone. If you use a telephone with a VoIP adapter, you'll be able to
dial just as you always have, and the service provider may also provide a dial tone.
What is a Repeater?
A repeater is a networking device that helps to amplify and regenerate signals to increase the
reach of a network. Also operating at the physical layer of the OSI model, repeaters help
overcome distance-related limitations by strengthening the strength and quality of the signal.
They are instrumental in LANs and WANs as they minimize errors, reduce data loss, and
ensure reliable delivery to specific locations. One of the primary benefits of repeaters is the
17/
45
Page 18 of
45
error free transfer of data over longer distances. This will ensure efficient and safe
communication.
Repeater
Features of Repeaters
Working of Repeaters
Initially the source system transmits the signals. This source systems can be a mobile
phone, laptop or radio.
This transmitted signal from the source system travels in air if it’s wireless network or
through the cable if it is wired network. As the signal goes away from the source it’s
strength gets weak.
The signal received to the repeater is not the actual signal sent by source system but a
weak signal. Therefore repeater amplifies this weak signal to get it strengthen.
The strengthen signal is now being sent from the repeater to its destination. This signal
is more stronger and can travel at longer distance. In short, it extends the network
without losing the quality of signal.
18/
45
Page 19 of
45
Repeaters are therefore used in various wireless technologies such as Wi-Fi and wired
technologies such as ethernet.
The bridge is a networking device in a computer network that is used to connect multiple LANs
to a larger LAN. In computer networks, we have multiple networking devices such as bridges,
hubs, routers, switches, etc, each device has its own specification and is used for a particular
purpose. The bridge is a networking device that connects the larger LAN networks with the
group of smaller LAN networks.
In this article, we are going to discuss everything about the bridge including what exactly a
bridge is, and the type of bridges we have in computer networks including transparent bridges,
source routing bridges, and translational bridges, which will be followed by advantages and
disadvantages of the bridge in networking. then how the bridge is different from the gateway
and last we will look into the applications and functions of the bridge in the network.
A bridge in a computer network is a device used to connect multiple LANs together with a
larger Local Area Network (LAN). The mechanism of network aggregation is known as bridging.
The bridge is a physical or hardware device but operates at the OSI model’s data link layer and
is also known as a layer of two switches.
The primary responsibility of a switch is to examine the incoming traffic and determine
whether to filter or forward it. Basically, a bridge in computer networks is used to divide
network connections into sections, now each section has a separate bandwidth and a separate
collision domain. Here bridge is used to improve network performance.
Types of Bridges
There are three types of bridges in computer networks, which are as follows:
19/
45
Page 20 of
45
Source Routing Bridge: Source routing bridges were developed and designed by IBM
specifically for token ring networks. The frame’s entire route is embedded with the data
frames by the source station to perform the routing operation so that once the frame is
forwarded it must follow a specific defined path/route.
Translational Bridge: Translational bridges convert the received data from one
networking system to another. Or it is used to communicate or transmit data between
two different types of networking systems. Like if we are sending data from a token ring
to an Ethernet cable, the translational cable will be used to connect both the networking
system and transmit data.
Working of Bridges
Let’s see the step-by-step working of the bridge in computer networks:
Receiving Data: The bridge gets data packets (or frames) from both network segments A and
B.
Building a Table: It creates a table of MAC addresses by looking at where the data is coming
from to know which device is on which segment.
Filtering Data: If the data from network A is meant for a device also on network A, the bridge
stops it from going further.
Forwarding Data: If the data from network A is meant for a device on network B, the bridge
sends it to the correct place on network B.
Repeating for Both Sides: The bridge does the same thing for data coming from network B.
Working of Bridge
The Switch is a network device that is used to segment the networks into different
subnetworks called subnets or LAN segments. It is responsible for filtering and forwarding the
packets between LAN segments based on MAC address.
Switches have many ports, and when data arrives at any port, the destination address is
20/
45
Page 21 of
45
examined first and some checks are also done and then it is processed to the devices.
Different types of communication are supported here like unicast, multicast, and broadcast
communication.
It transfers the data only to the device that has been addressed.
Switches are one of the most important things for transferring information between different
endpoints. Some of the benefits are mentioned below.
Switches are having full-duplex communication which helps in making effective use of
bandwidth.
Switches help to provide a wired connection to printers, IoT devices, wireless points, and
many more devices.
IoT Devices send data through Network Switches that help in making smarter
surroundings with the help of Artificial Intelligence.
Network Devices are made with the help of Switches that carry a large number of traffic
in telecommunication.
What is a router?
There are several types of routers, but most routers pass data between LANs (local area
21/
45
Page 22 of
45
networks) and WANs (wide area networks). A LAN is a group of connected devices restricted to
a specific geographic area. A LAN usually requires a single router.
A WAN, by contrast, is a large network spread out over a vast geographic area. Large
organizations and companies that operate in multiple locations across the country, for
instance, will need separate LANs for each location, which then connect to the other LANs to
form a WAN. Because a WAN is distributed over a large area, it often necessitates multiple
routers and switches*.
*A network switch forwards data packets between groups of devices in the same network,
whereas a router forwards data between different networks.
Think of a router as an air traffic controller and data packets as aircraft headed to different
airports (or networks). Just as each plane has a unique destination and follows a unique route,
each packet needs to be guided to its destination as efficiently as possible. In the same way
that an air traffic controller ensures that planes reach their destinations without getting lost or
suffering a major disruption along the way, a router helps direct data packets to their
destination IP address.
In order to direct packets effectively, a router uses an internal routing table — a list of paths to
various network destinations. The router reads a packet's header to determine where it is
going, then consults the routing table to figure out the most efficient path to that destination.
It then forwards the packet to the next network in the path.
Although some Internet service providers (ISPs) may combine a router and a modem within a
single device, they are not the same. Each plays a different but equally important role in
connecting networks to each other and to the Internet.
A router forms networks and manages the flow of data within and between those networks,
while a modem connects those networks to the Internet. Modems forge a connection to the
Internet by converting signals from an ISP into a digital signal that can be interpreted by any
connected device. A single device may plug into a modem in order to connect to the Internet;
alternately, a router can help distribute this signal to multiple devices within an established
network, allowing all of them to connect to the Internet simultaneously.
Think of it like this: If Bob has a router, but no modem, he will be able to create a LAN and
send data between the devices on that network. However, he will not be able to connect that
network to the Internet. Alice, on the other hand, has a modem, but no router. She will be able
to connect a single device to the Internet (for example, her work laptop), but cannot distribute
that Internet connection to multiple devices (say, her laptop and her smartphone). Carol,
meanwhile, has a router and a modem. Using both devices, she can form a LAN with her
desktop computer, tablet, and smartphone and connect them all to the Internet at the same
time.
A gateway is a computer on a network that provides the interface between two applications or
networks that use different protocols. They are also used to provide a connection to the
Internet. A gateway in a network converts information from one protocol to another and
22/
45
Page 23 of
45
then transfers it over the web. For example, if a computer on the Internet sends an email to
another, the gateway converts the message from one protocol to another and sends it back.
A computer gateway is a server with software installed to connect networks and route data.
The gateway node can be linked to different routers or have a router that connects it with
other networks or the Internet. The connection can be wired or wireless.
A computer server may serve as a gateway node in any development team of any commercial
organization, and it may also act as a proxy server or a firewall at times. A computer gateway
in a network examines the data packet and then passes it to the other network. It checks
compatibility between the two networks and then converts the data packet to ensure that it
can be transmitted between them.
The gateway node may also be linked to servers for specific purposes such as email, web
hosting, and database storage. It can also be part of a more extensive network like the
Internet. In this case, the gateway node will have its IP address, thus making it possible to
route incoming traffic from different networks to its primary interface and out onto the
Internet. However, this is one of many possible configurations for a gateway node; other
configurations are also possible.
In the world of computer networks, a firewall acts like a security guard. Its job is to watch over
the flow of information between your computer or network and the internet. It’s designed to
block unauthorized access while allowing safe data to pass through.
Essentially, a firewall helps keep your digital world safe from unwanted visitors and potential
threats, making it an essential part of today’s connected environment. It monitors both
incoming and outgoing traffic using a predefined set of security to detect and prevent threats.
What is Firewall?
A firewall is a network security device, either hardware or software-based, which monitors all
incoming and outgoing traffic and based on a defined set of security rules accepts, rejects, or
drops that specific traffic.
Functions of Firewall
Every piece of data that enters or leaves a computer network must go via the firewall.
If the data packets are safely routed via the firewall, all of the important data remains
intact.
A firewall logs each data packet that passes through it, enabling the user to keep track
of all network activities.
Since the data is stored safely inside the data packets, it cannot be altered.
Every attempt for access to our operating system is examined by our firewall, which
also blocks traffic from unidentified or undesired sources.
Basis of
Gateway Firewall
Comparison
24/
45
Page 25 of
45
Basis of
Gateway Firewall
Comparison
Bluetooth is used for short-range wireless voice and data communication. It is a Wireless
Personal Area Network (WPAN) technology and is used for data communications over smaller
distances. This generation changed into being invented via Ericson in 1994. It operates within
the unlicensed, business, scientific, and clinical (ISM) bands from 2.4 GHz to 2.485 GHz.
Bluetooth
Bluetooth is a wireless technology that lets devices like phones, tablets, and headphones
connect to each other and share information without needing cables. Bluetooth simply follows
the principle of transmitting and receiving data using radio waves. It can be paired with the
other device which has also Bluetooth but it should be within the estimated communication
range to connect. When two devices start to share data, they form a network called piconet
which can further accommodate more than five devices.
1. Generative AI
2. Quantum Computing
3. 5G Expansion
6. Internet of Things
7. Biotechnology in Agriculture
8. Autonomous Vehicles
9. Blockchain
10.Edge Computing
11.Personalized Medicine
12.Neuromorphic Computing
16.Voice-Activated Technology
17.Space Tourism
18.Synthetic Media
19.Advanced Robotics
20.AI in Cybersecurity
21.Digital Twins
22.Sustainable Technology
23.Telemedicine
24.Nano-Technology
26/
45
Page 27 of
45
25.AI TRiSM
Cloud Computing is the delivery of computing services such as servers, storage, databases,
networking, software, analytics, intelligence, and more, over the Cloud (Internet).
But if we choose Cloud Computing, a cloud vendor is responsible for the hardware purchase
and maintenance. They also provide a wide variety of software and platform as a service. We
can take any required services on rent. The cloud computing services will be charged based on
usage.
27/
45
Page 28 of
45
The cloud environment provides an easily accessible online portal that makes handy for the
user to manage the compute, storage, network, and application resources. Some cloud service
providers are in the following figure.
o Cost: It reduces the huge capital costs of buying hardware and software.
28/
45
Page 29 of
45
o Scalability: We can increase or decrease the requirement of resources according to the
business requirements.
o Productivity: While using cloud computing, we put less operational effort. We do not
need to apply patching, as well as no need to maintain hardware and software. So, in
this way, the IT team can be more productive and focus on achieving business goals.
o Reliability: Backup and recovery of data are less expensive and very fast for business
continuity.
o Security: Many cloud vendors offer a broad set of policies, technologies, and controls
that strengthen our data security.
o Public Cloud: The cloud resources that are owned and operated by a third-party cloud
service provider are termed as public clouds. It delivers computing resources such as
servers, software, and storage over the internet
o Private Cloud: The cloud computing resources that are exclusively used inside a single
business or organization are termed as a private cloud. A private cloud may physically
be located on the company’s on-site datacentre or hosted by a third-party service
provider.
o Hybrid Cloud: It is the combination of public and private clouds, which is bounded
together by technology that allows data applications to be shared between them. Hybrid
cloud provides flexibility and more deployment options to the business.
29/
45
Page 30 of
45
30/
45
Page 31 of
45
The term IoT, or Internet of Things, refers to the collective network of connected devices and
the technology that facilitates communication between devices and the cloud, as well as
between the devices themselves. Thanks to the advent of inexpensive computer chips and
high bandwidth telecommunication, we now have billions of devices connected to the
internet. This means everyday devices like toothbrushes, vacuums, cars, and machines can
use sensors to collect data and respond intelligently to users.
The Internet of Things integrates everyday “things” with the internet. Computer Engineers
have been adding sensors and processors to everyday objects since the 90s. However,
progress was initially slow because the chips were big and bulky. Low power computer chips
called RFID tags were first used to track expensive equipment. As computing devices shrank in
size, these chips also became smaller, faster, and smarter over time.
The cost of integrating computing power into small objects has now dropped considerably. For
example, you can add connectivity with Alexa voice services capabilities to MCUs with less
than 1MB embedded RAM, such as for light switches. A whole industry has sprung up with a
focus on filling our homes, businesses, and offices with IoT devices. These smart objects can
automatically transmit data to and from the Internet. All these “invisible computing devices”
and the technology associated with them are collectively referred to as the Internet of Things.
A typical IoT system works through the real-time collection and exchange of data. An IoT
31/
45
Page 32 of
45
system has three components:
Smart devices
This is a device, like a television, security camera, or exercise equipment that has been given
computing capabilities. It collects data from its environment, user inputs, or usage patterns
and communicates data over the internet to and from its IoT application.
IoT application
An IoT application is a collection of services and software that integrates data received from
various IoT devices. It uses machine learning or artificial intelligence (AI) technology to analyze
this data and make informed decisions. These decisions are communicated back to the IoT
device and the IoT device then responds intelligently to inputs.
The IoT device or fleet of devices can be managed through a graphical user interface. Common
examples include a mobile application or website that can be used to register and control
smart devices.
Connected cars
There are many ways vehicles, such as cars, can be connected to the internet. It can be
through smart dashcams, infotainment systems, or even the vehicle's connected gateway.
They collect data from the accelerator, brakes, speedometer, odometer, wheels, and fuel tanks
to monitor both driver performance and vehicle health. Connected cars have a range of uses:
Monitoring rental car fleets to increase fuel efficiency and reduce costs.
Connected homes
Smart home devices are mainly focused on improving the efficiency and safety of the house,
as well as improving home networking. Devices like smart outlets monitor electricity usage
and smart thermostats provide better temperature control. Hydroponic systems can use IoT
sensors to manage the garden while IoT smoke detectors can detect tobacco smoke. Home
security systems like door locks, security cameras, and water leak detectors can detect and
prevent threats, and send alerts to homeowners.
32/
45
Page 33 of
45
Automatically turning off devices not being used.
Smart cities
IoT applications have made urban planning and infrastructure maintenance more efficient.
Governments are using IoT applications to tackle problems in infrastructure, health, and the
environment. IoT applications can be used for:
Detecting maintenance needs for critical infrastructures such as streets, bridges, and
pipelines.
Smart buildings
Buildings such as college campuses and commercial buildings use IoT applications to drive
greater operational efficiencies. IoT devices can be use in smart buildings for:
Industrial IoT (IIoT) refers to smart devices used in manufacturing, retail, health, and other
enterprises to create business efficiencies. Industrial devices, from sensors to equipment, give
business owners detailed, real-time data that can be used to improve business processes.
They provide insights on supply chain management, logistics, human resource, and production
– decreasing costs and increasing revenue streams.
Manufacturing
Commercial and Industrial IoT devices can help with supply chain management, including
inventory management, vendor relationships, fleet management, and scheduled maintenance.
Shipping companies use Industrial IoT applications to keep track of assets and optimize fuel
consumption on shipping routes. The technology is especially useful for tight temperature
control in refrigerated containers. Supply chain managers make informed predictions through
smart routing and rerouting algorithms.
Retail
34/
45
Page 35 of
45
IOT HARDWARE
Transducer :
A data analyst will extract raw data, organize it, and then analyze it, transforming it from
incomprehensible numbers into coherent, intelligible information. Having interpreted the
data, the data analyst will then pass on their findings in the form of suggestions or
recommendations about what the company’s next steps should be.
You can think of data analytics as a form of business intelligence, used to solve specific
problems and challenges within an organization. It’s all about finding patterns in a
dataset which can tell you something useful and relevant about a particular area of the
business—how certain customer groups behave, for example, or how employees
engage with a particular tool.
Data analytics helps you to make sense of the past and to predict future trends and
behaviors; rather than basing your decisions and strategies on guesswork, you’re
making informed choices based on what the data is telling you.
35/
45
Page 36 of
45
Understand better by watching? Learn more about the basics of data analytics from Will
in the following video:
Despite their differences, it’s important to recognize that data science and data analytics
work together, and both make extremely valuable contributions to business.
You can learn more about the differences between a data scientist and a data
analyst in our guide, but for now let’s cover two key differences.
A data analyst will seek to answer specific questions or address particular challenges
that have already been identified and are known to the business. To do this, they
examine large datasets with the goal of identifying trends and patterns. They then
“visualize” their findings in the form of charts, graphs, and dashboards. These
visualizations are shared with key stakeholders and used to make informed, data-driven
strategic decisions.
A data scientist, on the other hand, considers what questions the business should or
could be asking. They design new processes for data modeling, write algorithms,
devise predictive models, and run custom analyses. For example: They might build a
36/
45
Page 37 of
45
machine to leverage a dataset and automate certain actions based on that data—and,
with continuous monitoring and testing, and as new patterns and trends emerge,
improve and optimize that machine wherever possible.
In short: data analysts tackle and solve discrete questions about data, often on request,
revealing insights that can be acted upon by other stakeholders, while data scientists
build systems to automate and optimize the overall functioning of the business.
Data analysts are typically expected to be proficient in software like Excel and, in some
cases, querying and programming languages like SQL, R, SAS, and Python. Analysts
need to be comfortable using such tools and languages to carry out data mining,
statistical analysis, database management and reporting.
Data scientists, on the other hand, might be expected to be proficient in Hadoop, Java,
Python, machine learning, and object-oriented programming, together with software
development, data mining, and data analysis.
37/
45
Page 38 of
45
Descriptive analytics
Descriptive analytics is a simple, surface-level type of analysis that looks at what has
happened in the past. The two main techniques used in descriptive analytics are data
aggregation and data mining—so, the data analyst first gathers the data and presents it
in a summarized format (that’s the aggregation part) and then “mines” the data to
discover patterns.
The data is then presented in a way that can be easily understood by a wide audience
(not just data experts). It’s important to note that descriptive analytics doesn’t try to
explain the historical data or establish cause-and-effect relationships; at this stage, it’s
simply a case of determining and describing the “what”. Descriptive analytics draws
on the concept of descriptive statistics.
Diagnostic analytics
While descriptive analytics looks at the “what”, diagnostic analytics explores the
“why”. When running diagnostic analytics, data analysts will first seek to identify
anomalies within the data—that is, anything that cannot be explained by the data in front
of them. For example: If the data shows that there was a sudden drop in sales for the
month of March, the data analyst will need to investigate the cause.
To do this, they’ll embark on what’s known as the discovery phase, identifying any
additional data sources that might tell them more about why such anomalies arose.
Finally, the data analyst will try to uncover causal relationships—for example, looking at
38/
45
Page 39 of
45
any events that may correlate or correspond with the decrease in sales. At this stage,
data analysts may use probability theory, regression analysis, filtering, and time-series
data analytics.
Predictive analytics
Just as the name suggests, predictive analytics tries to predict what is likely to happen
in the future. This is where data analysts start to come up with actionable, data-driven
insights that the company can use to inform their next steps.
Predictive analytics estimates the likelihood of a future outcome based on historical data
and probability theory, and while it can never be completely accurate, it does eliminate
much of the guesswork from key business decisions.
Predictive analytics can be used to forecast all sorts of outcomes—from what products
will be most popular at a certain time, to how much the company revenue is likely to
increase or decrease in a given period. Ultimately, predictive analytics is used to
increase the business’s chances of “hitting the mark” and taking the most appropriate
action.
Prescriptive analytics
Building on predictive analytics, prescriptive analytics advises on the actions and
decisions that should be taken.
In other words, prescriptive analytics shows you how you can take advantage of the
outcomes that have been predicted. When conducting prescriptive analysis, data
analysts will consider a range of possible scenarios and assess the different actions the
company might take.
Prescriptive analytics is one of the more complex types of analysis, and may involve
working with algorithms, machine learning, and computational modeling procedures.
39/
45
Page 40 of
45
However, the effective use of prescriptive analytics can have a huge impact on the
company’s decision-making process and, ultimately, on the bottom line.
The type of analysis you carry out will also depend on the kind of data you’re working
with. If you’re not already familiar, it’s worth learning about the four levels of data
measurement: nominal, ordinal, interval, and ratio.
You might hear people use artificial intelligence (AI) and machine learning (ML)
interchangeably, especially when discussing big data, predictive analytics, and other
digital transformation topics. The confusion is understandable as artificial intelligence
and machine learning are closely related. However, these trending technologies differ in
several ways, including scope, applications, and more.
So, what exactly is the difference when it comes to ML vs. AI, how are ML and AI
connected, and what do these terms mean in practice for organizations today?
We’ll break down AI vs. ML and explore how these two innovative concepts are related
and what makes them different from each other.
New customers get up to $300 in free credits to try Vertex AI and other Google Cloud
products.
40/
45
Page 41 of
45
Introduction to generative AI
Artificial intelligence is a broad field, which refers to the use of technologies to build
machines and computers that have the ability to mimic cognitive functions associated
with human intelligence, such as being able to see, understand, and respond to spoken
or written language, analyze data, make recommendations, and more.
Machine learning algorithms improve performance over time as they are trained—
exposed to more data. Machine learning models are the output, or what the program
learns from running an algorithm on training data. The more data used, the better the
model will get.
41/
45
Page 42 of
45
While AI and ML are not quite the same thing, they are closely connected. The simplest
way to understand how AI and ML relate to each other is:
One helpful way to remember the difference between machine learning and artificial
intelligence is to imagine them as umbrella categories. Artificial intelligence is the
overarching term that covers a wide variety of specific approaches and algorithms.
Machine learning sits under that umbrella, but so do other major subfields, such as deep
learning, robotics, expert systems, and natural language processing.
Now that you understand how they are connected, what is the main difference between
AI and ML?
While artificial intelligence encompasses the idea of a machine that can mimic human
intelligence, machine learning does not. Machine learning aims to teach a machine how
to perform a specific task and provide accurate results by identifying patterns.
Let’s say you ask your Google Nest device, “How long is my commute today?” In this
case, you ask a machine a question and receive an answer about the estimated time it
will take you to drive to your office. Here, the overall goal is for the device to perform a
task successfully—a task that you would generally have to do yourself in a real-world
environment (for example, research your commute time).
In the context of this example, the goal of using ML in the overall system is not to enable
it to perform a task. For instance, you might train algorithms to analyze live transit and
traffic data to forecast the volume and density of traffic flow. However, the scope is
limited to identifying patterns, how accurate the prediction was, and learning from the
data to maximize performance for that specific task.
Artificial intelligence
42/
45
Page 43 of
45
Machine learning
AI and ML bring powerful benefits to organizations of all shapes and sizes, with new
possibilities constantly emerging. In particular, as the amount of data grows in size and
complexity, automated and intelligent systems are becoming vital to helping companies
automate tasks, unlock value, and generate actionable insights to achieve better
outcomes.
Here are some of the business benefits of using artificial intelligence and machine
learning:
Analyzing and activating a wider range of unstructured and structured data sources.
Faster decision-making
43/
45
Page 44 of
45
Improving data integrity, accelerating data processing, and reducing human error for
more informed, faster decision-making.
Efficiency
Analytic integration
Applications of AI and ML
Artificial intelligence and machine learning can be applied in many ways, allowing
organizations to automate repetitive or manual processes that help drive informed
decision-making.
Companies across industries are using AI and ML in various ways to transform how
they work and do business. Incorporating AI and ML capabilities into their strategies and
systems helps organizations rethink how they use their data and available resources,
drive productivity and efficiency, enhance data-driven decision-making through
predictive analytics, and improve customer and employee experiences.
Patient health record analysis and insights, outcome forecasting and modeling,
accelerated drug development, augmented diagnostics, patient monitoring, and
information extraction from clinical notes.
Manufacturing
44/
45
Page 45 of
45
Financial services
Risk assessment and analysis, fraud detection, automated trading, and service
processing optimization.
Telecommunications
45/
45