Bbi Notes
Bbi Notes
INTRODUCTION:
Now a days practically every business, no matter how small uses Computers to handle
various transactions and as business grows they often need several people to input and
process data simultaneously and in order to achieve this it is necessary that all the
computers are networked. Computer networks are simply a group of Computers
connected by cables or other media such that they can share data and resources
The basic components of networks. Here you will learn about the different types of
Networks, Network topology, Network protocols, Network Architecture, Network
medium and the basic hardware components that are required in setting up of a Computer
Network
COMPUTER NETWORK
A Computer network is a group of two or more computer systems linked together such
that they can share information and resources. There are many types of computer
networks, including:
LAN : LAN is a computer network that spans a relatively small area. Most LANs are
confined to a single building or group of buildings.
However, one LAN can be connected to other LANs over
any distance via telephone lines and radio waves. A system
of LANs connected in this way is called a wide-area
network (WAN).
LANs are capable of transmitting data at very fast rates, much faster than data can be
transmitted over a telephone line; but the distances are limited, and there is also a limit on
the number of computers that can be attached to a single LAN.
In addition to these types, the following characteristics are also used to categorize
different types of networks:
NETWORK ARCHITECTURE
Client/server Architecture:
NT/Server Architecture is
one in which the client
(personal computer or
workstation) is the
requesting machine and
the server is the supplying
machine, both of which
are connected via a local
area network (LAN) or wide area network (WAN). Since the early 1990s, client/server
has been the buzzword for building applications on LANs in contrast to centralized minis
and mainframes with dedicated terminals.
The client contains the user interface and may perform some or all of the application
processing. Servers can be high-speed microcomputers, minicomputers or even
mainframes. A database server maintains the databases and processes requests from the
client to extract data from or update the database. An application server provides
additional business processing for the clients.
The term client/server is sometimes used to contrast a peer-to-peer network, in which any
client can also act as a server. In that case, client/server means nothing more than having
a dedicated server.
NON-CLIENT/SERVER
In non-client/server architecture, the server is nothing more than a remote disk drive. The
user's machine does all the processing. If many users routinely perform lengthy searches,
this can bog down the network, because each client has to pass the entire database over
the net. At 1,000 bytes per record, a 10,000 record database requires 10MB of data be
transmitted.
NETWORK TOPOLOGY
A network topology describes the configuration of a network (how the network
components are connected together). There are FOUR main topology's.
A star network uses a significant amount of cable (each terminal is wired back to the
central hub, even if two terminals are side by side several hundred meters away from the
host). All routing decisions are made by the central hub, and all other workstations can be
simple.
This type of topology is frequently used to connect terminals to a large time-sharing host
computer.
Ring : The ring topology connects workstations in a closed loop. Each terminal is
connected to TWO other terminals (the next and the previous), with the last terminal
being connected to the first. Data is transmitted around the ring in one direction only,
each station passing on the data to the next station till it
reaches its destination.
Faulty workstations can be isolated from the ring.
When the workstation is powered on, it connects itself
into the ring. When power is off, it disconnects itself
from the ring and allows the information to bypass the
workstation.
Information travels around the ring from one workstation to the next. Each packet of data
sent on the ring is prefixed by the address of the station to which it is being sent to. When
a packet of data arrives, the workstation checks to see if the packet address is the same as
its own. If it is, it grabs the data in the packet. If the packet does not belong to it, it sends
the packet to the next workstation in the ring.
The common implementation of this topology is token ring. A break in the ring causes the
entire network to fail. Individual workstations can be isolated from the ring.
Bus : The bus topology connects workstations using a single cable. Each workstation is
connected to the next workstation in a point to point fashion. All workstations connect to
the same cable.
If one workstation goes faulty, all
workstations are affected.
Workstations share the same cable
for the sending and receiving of
information. The cabling costs of
bus systems are the least of all the
different topologies. Each end of
the cable is terminated using a
special terminator.
The common implementation of this topology is Ethernet. A message transmitted by one
workstation is heard by all the other workstations.
NETWORK PROTOCOLS
Protocols define a common set of rules and signals that computers on the Network
use to communicate.
The two popular protocols used are Ethernet and Token Ring.
Ethernet
Ethernet is the most widely-used LAN
access method, which is defined by the
IEEE 802.3 standard (Token Ring is the next
most popular). Ethernet is normally a shared
media LAN. All stations on the segment
share the total bandwidth, which is either 10
Mbps (Ethernet), 100 Mbps (Fast Ethernet)
or 1000 Mbps (Gigabit Ethernet). With
switched Ethernet, each sender and receiver
pair have the full bandwidth.
Ethernet was invented by Robert Metcalfe and David Boggs at Xerox PARC in 1973,
which first ran at 2.94 Mbps. Metcalfe later joined Digital where he facilitated a joint
venture between Digital, Intel and Xerox to collaborate further on Ethernet. Version 1
was finalized in 1980, and products shipped in the following year. In 1983, the IEEE
approved the Ethernet 802.3 standard.
Token Ring
Token Ring is a local area network (LAN) developed by IBM (IEEE 802.5). It uses a
token ring access method and connects up to 255 nodes in a star topology at 4 or 16
Mbps. All stations connect to a central wiring hub called the MAU (Multistation Access
Unit) using a twisted wire cable. The central hub makes it easier to troubleshoot failures
than a bus topology.
Token Ring is a data link protocol (MAC layer protocol) and functions at layers 1 and 2
of the OSI model
Once you have the network cards installed and interfaced in your computer, you need a
way to connect them to each other.
The network media used can be:
wire ( Bounded) or
wireless (Unbounded).
Bounded Media : Wires or network cables are referred to as bounded media because the
signal travels through a physical media shielded on the outside (bounded) by some
material. Bounded media are very good for LANs because they offer good speed, good
security and low cost.
Examples of bounded media CO-AXIAL,TWISTED PAIR & OPTICAL FIBER.
Twisted Pair Cable is the most common form of cable today, it is used to connect
telephone subscribers to exchanges (switching
centres) and wire buildings. Two insulated
wires are twisted around each other, and
combined with others into a cable. Twisted
pair is a favorite choice for interconnecting
PC's on a Local Area Network (LAN). In
general, each twisted pair supports a single
voice channel.
Coaxial Cable
Co-axial cable till recently, extensively used to support toll traffic and long distance links.
Today, it is being replaced by micro-wave, satellite or fiber optic links. Coaxial cable is a
Coaxial cable is used extensively in networking and data communications. It is used for
local area networking, linking PC's together. The networking protocol commonly used
with coaxial cable is ETHERNET, which describes how data is formatted and transmitted
along a shared cable system.
A strand of silicon glass fibre (thinner than a human hair), is coated with a refractive
surface. When light (provided by a laser) is show into the strand, it travels along the fibre
strand (the refractive layer prevents it from escaping). It is used for long haul
telecommunications links, high speed data communications links for computers, and
information services to homes (eg, PAY TV).
The three main types of Wireless Media are radio wave, microwave and infrared.
Microwave
Microwave is a radio system which uses very high frequencies
to send and receive data. Because of the high frequencies
involved, stations are located about 30 kilometers apart and in
line of sight (visible to each other).
Microwave systems have sufficient bandwidth capacity to
support a large number of voice channels and one or two TV
channels.
The most common network adapters are Ethernet and Token Ring. Sometimes, the Ethernet
adapter is built into the motherboard. LocalTalk, which provides the data link services of Apple's
AppleTalk network, is built into all Macintoshes.
A transmission medium, such as twisted pair, coax or fiber optic, interconnects all the adapters
in the network. A network adapter is also called a NIC, or network interface card.
Bridges
A Bridge is an electrical device which connects and passes packets between two network
segments. In general, a bridge will forward or discard an incoming frame based on the MAC
address of that frame.
Unlike routers, bridges are protocol - independent.
They simply forward packets without
analyzing and re- routing messages.
Hubs
Hub's major function is to replicate data it
receives from one device attached to it to all
others.
Characteristics :
Hubs come in many flavors. They differ in the amount of devices that can connect to them, the
length of wire that can transmit on, and the type of media they support.
Switch
With respect to Computer Networks switch is a device that filters and forwards packets between
LAN segments. Switches operate at the data link layer (layer 2) of the OSI Reference Model and
therefore support any packet protocol. LANs that use switches to join segments are called
switched LANs or, in the case of Ethernet networks, switched Ethernet LANs.
Routers
Gateways
They perform complete conversions from one protocol to another rather than simply support one
protocol from within another, such as IP tunneling. Sometimes routers can implement gateway
functions. An electronic mail, or messaging, gateway converts messages between two different
messaging protocols.
INTERNET
Internet Basics :
What is the Internet?
A loosely configured global wide-area network.
Millions of people visit and contribute to the Internet, through e-mail and the World Wide Web.
Began as a Department of Defence project.
1. Dial-up Access
In this type of connection a modem and regular telephone lines are required to connect to internet.
Advantages
i. Less expensive
ii. Better option for individuals
iii. Requires simple hardware and software recourses.
Disadvantages
i. Slow speed
ii. Low reliability i.e. connection to internet is break with little disturbance
TCP/IP
HTTP :
Hypertext Transfer Protocol (HTTP) is an application-level protocol for distributed,
collaborative, hypermedia information systems. Its use for retrieving inter-linked resources led to
the establishment of the World Wide Web
HTTP is a request/response standard of a client and a server. A client is the end-user, the server
is the web site. The client making an HTTP request—using a web browser, spider, or other end-
user tool—is referred to as the user agent. The responding server—which stores or creates
resources such as HTML files and images—is called the origin server. In between the user agent
and origin server may be several intermediaries, such as proxies, gateways, and tunnels. HTTP is
not constrained to using TCP/IP and its supporting layers, although this is its most popular
application on the Internet. Indeed HTTP can be "implemented on top of any other protocol on
the Internet, or on other networks." HTTP only presumes a reliable transport; any protocol that
provides such guarantees can be used
FTP :
File Transfer Protocol (FTP) is a standard network protocol used to exchange and manipulate
files over an Internet Protocol computer network, such as the Internet. FTP is built on a client-
server architecture and utilizes separate control and data connections between the client and
server applications. FTP is also often used as an application component to automatically transfer
files for program internal functions. FTP can be used with user-based password authentication or
with anonymous user access.
COMPONENTS OF URL
http://facweb.cs.depaul.edu/asettle/ect250/section602/hw
E-Mail
• In its simplest form, e-mail is an electronic message sent from one computer to another. You
can send or receive personal and business-related messages with attachments, such as
pictures or formatted documents. You can even send computer programs.
HOME PAGE :
The homepage (often written as home page) is the URL or local file that automatically loads
when a web browser starts or when the browser's "home" button is pressed. One can turn this
feature off and on, as well as specify a URL for the page to be loaded.
The term is also used to refer to the front page, webserver directory index, or main web page of a
website of a group, company, organization, or individual. In some countries, such as Germany,
SEARCH ENGINE
A Web search engine is a tool designed to search for information on the World Wide Web. The
search results are usually presented in a list and are commonly called hits. The information may
consist of web pages, images, information and other types of files. Some search engines also
mine data available in databases or open directories. Unlike Web directories, which are
maintained by human editors, search engines operate algorithmically or are a mixture of
algorithmic and human input.
Web search engines work by storing information about many web pages, which they retrieve
from the WWW itself. These pages are retrieved by a Web crawler (sometimes also known as a
spider) — an automated Web browser which follows every link it sees. The contents of each
page are then analyzed to determine how it should be indexed (for example, words are extracted
from the titles, headings, or special fields called meta tags). Data about web pages are stored in
an index database for use in later queries. Some search engines, such as Google, store all or part
of the source page (referred to as a cache) as well as information about the web pages, whereas
others, such as AltaVista, store every word of every page they find. This cached page always
holds the actual search text since it is the one that was actually indexed, so it can be very useful
when the content of the current page has been updated and the search terms are no longer in it.
This satisfies the principle of least astonishment since the user normally expects the search terms
to be on the returned pages. Increased search relevance makes these cached pages very useful,
even beyond the fact that they may contain data that may no longer be available elsewhere.
META SERCH ENGINE : A meta-search engine is a search tool that sends user requests to
several other search engines and/or databases. Its like a search engines that search other search
engines.
It simply sends the query to several other search engines and returns a summary of the results.
Therefore, the search results you receive are an aggregate result of multiple searches.
While this strategy gives your search a broader scope than searching a single search engine, the
results are not always better. This is because the meta search engine must use its own algorithm
to choose the best results from multiple search engines. Often, the results returned by a Meta
search engine are not as relevant as those returned by a standard search engine.
Examples:
AND OPERATOR
Using AND narrows a search by combining terms; it will retrieve documents that use both the
search terms you specify, as in this example:
Example: BREAD AND JAM
It will retrieve documents that use both the BREAD and JAM
OR OPERATOR
Using OR broadens a search to include results that contain either of the words you type in.
NOT OPERATOR
Using NOT will narrow a search by excluding certain search terms.
Chatting
Online chat can refer to any kind of communication over the Internet, but is primarily
meant to refer to direct one-on-one chat or text-based group chat (formally also known as
synchronous conferencing), using tools such as instant messengers, Internet Relay Chat.
The expression online chat comes from the word chat which means "informal
conversation".
DOMAIN NAME SYSTEM : The DNS translates Internet domain and host names to IP
addresses. DNS automatically converts the names we type in our Web browser address bar to the
IP addresses of Web servers hosting those sites.
The DNS database resides on a hierarchy of special database servers. When clients like Web
browsers issue requests involving Internet host names, a piece of software called the DNS
resolver (usually built into the network operating system) first contacts a DNS server to
determine the server's IP address. If the DNS server does not contain the needed mapping, it will
WWW
The term WWW refers to the World Wide Web or simply the Web. The World Wide Web
consists of all the public Web sites connected to the Internet worldwide, including the client
devices (such as computers and cell phones) that access Web content. The WWW is just one of
many applications of the Internet and computer networks.
A system of Internet servers that support specially formatted documents. The documents are
formatted in a markup language called HTML (HyperText Markup Language) that supports links
to other documents, as well as graphics, audio, and video files. This means you can jump from
one document to another simply by clicking on hot spots. Not all Internet servers are part of the
World Wide Web.
There are several applications called Web browsers that make it easy to access the World Wide
Web; Two of the most popular being Firefox and Microsoft's Internet Explorer.
INTRANET is the generic term for a collection of private computer networks within an
organization. An intranet uses network technologies as a tool to facilitate communication
between people or work groups to improve the data sharing capability and overall knowledge
base of an organization's employees.
Intranets utilize standard network hardware and software technologies like Ethernet, WiFi,
TCP/IP, Web browsers and Web servers. An organization's intranet typically includes Internet
access but is firewalled so that its computers cannot be reached directly from the outside.
EXTRANET
An extranet is a private network that uses Internet technology and the public telecommunication
system to securely share part of a business's information or operations with suppliers, vendors,
partners, customers, or other businesses. An extranet can be viewed as part of a company's
intranet that is extended to users outside the company. It has also been described as a "state of
mind" in which the Internet is perceived as a way to do business with other companies as well as
to sell products to customers.
An extranet requires security and privacy. These can include firewall server management, the
issuance and use of digital certificates or similar means of user authentication, encryption of
messages, and the use of virtual private networks (VPNs) that tunnel through the public network.
WEB CRAWLERS
A Web crawler is a computer program that browses the World Wide Web in a methodical,
automated manner or in an orderly fashion
This process is called Web crawling or spidering. Many sites, in particular search engines, use
spidering as a means of providing up-to-date data. Web crawlers are mainly used to create a copy
of all the visited pages for later processing by a search engine that will index the downloaded
pages to provide fast searches. Crawlers can also be used for automating maintenance tasks on a
Web site, such as checking links or validating HTML code. Also, crawlers can be used to gather
SMTP : Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers.
Most e-mail systems that send mail over the Internet use SMTP to send messages from one
server to another; the messages can then be retrieved with an e-mail client using either POP or
IMAP. In addition, SMTP is generally used to send messages from a mail client to a mail server.
This is why you need to specify both the POP or IMAP server and the SMTP server when you
configure your e-mail
WEB PAGE: web pages containing images, videos or other digital assets to form a webpage.
WEBSITE :
A website, also written Web site,[1] web site, or simply site,[2] is a collection of related
web pages containing images, videos or other digital assets. A website is hosted on at
least one web server, accessible via a network such as the Internet or a private local area
network through an Internet address known as a Uniform Resource Locator.
What are static and dynamic websites?
There are many static websites on the Internet, you won’t be able to tell immediately if it
is static, but the chances are, if the site looks basic and is for a smaller company, and
simply delivers information without any bells and whistles, it could be a static website.
Static websites can only really be updated by someone with a knowledge of website
development. Static websites are the cheapest to develop and host, and many smaller
companies still use these to get a web presence.
Dynamic sites on the other hand can be more expensive to develop initially, but the
advantages are numerous. At a basic level, a dynamic website can give the website owner
the ability to simply update and add new content to the site. For example, news and
events could be posted to the site through a simple browser interface. Dynamic features
of a site are only limited by imagination. Some examples of dynamic website features
could be: content management system, e-commerce system, bulletin / discussion boards,
intranet or extranet facilities, ability for clients or users to upload documents, ability for
administrators or users to create content or add information to a site (dynamic
publishing).
TABBED BROWSING: Tabbed browsing is a form of Internet navigation that allows a user to
browse multiple pages in a single window. This feature is for users who do want to view multiple
sites, but don't want to have multiple browser windows open. In the image to the right, you can
see that the Mozilla Firefox 1.0.7 window has two tabs open; just above the browser window
Browsers that support tabbed browsing such as Chrome, Firefox, Opera, and Internet Explorer
allow users to open a link in a new tab by clicking it with your middle-button (mouse wheel).
HTML :
HTML is a computer language devised to allow website creation. These websites can then be
viewed by anyone else connected to the Internet. It is relatively easy to learn, with the basics
being accessible to most people in one sitting; and quite powerful in what it allows you to create.
It is constantly undergoing revision and evolution to meet the demands and requirements of the
growing Internet audience. HTML is a Language, as it has code-words and syntax like any other
language
Account Details: View your bank account details, account balance, download statements
and more. Also view your Demat, Loan & Credit Card Account Details all in one place.
Fund Transfer: Transfer fund to your own accounts, other Axis Bank accounts or Other
Bank account seamlessly.
Request Services: Give a request for Cheque book, Demand Draft, Stop Cheque
Payment, Debit Card Loyalty Point Redemption etc.
Investment Services: View your complete Portfolio with the bank, Create Fixed
Deposit, Apply for IPO etc.
Value Added Services: Pay Utility bills for more than 160 billers, Recharge Mobile,
Create Virtual Cards, Pay any Visa Credit Card bills, Register for E-statement and SMS
banking etc
Mobile banking: Using mobile phone to access Internet Banking.
Recharge prepaid mobile/DTH and a lot more
Instant alert : Transaction alert is sent to the registered mobile number
THE MOBILE WALLET: THE IDEA IS TO MOVE the entire contents of your wallet to our
mobile phone. Bank cards, credit cards, loyalty cards and identification cards. Leading
example .s include google wallet and Isis (created by AT&T, T-mobile etc).
Mobile ticketing: Ticket for concerts and other events bought online can be “delivered”
directly to your cell phone. The ticket is sent through a text message or in the form of image, if it
is text message it will be a barcode or a numerical code depending on the e phone you have this
message become your virtual ticket for entry for the concert. (Indian railways is another example
of the same)
Mobile voucher and coupons: This is the traditional newspaper or magazine coupon gone
virtual no more scissor necessary. Mobile coupons can be accessed thorough text message (sent
by the service provider) smart phone application, or social networking sites.
Loyalty cards/ programs / App: Your loyalty cards ( e.g the buy 10 get one free punch cards
for your favorite cafes) are also going on mobile , a prime example is Starbucks iPhone app – an
app that has now processed 26 million mobile payments. Some other good example are punched,
the digital mobile loyalty startup that was recently acquired by google, that allows you to store
all your punch cards on our phone.
Mobile banking : more and more people are conducting their financial transaction by mobile
checking balances, payment of the bills , transferring funds and sending remittances
internationally
ABBRIVATION