What Do You Mean by Computer Networks? What Are The Uses Computer Networks? and Applications of Computer Networks ?
What Do You Mean by Computer Networks? What Are The Uses Computer Networks? and Applications of Computer Networks ?
Two computers are said to be interconnected if they are able to exchange information.
Autonomous means that these computers are capable of working independently. It
means that there is no master and slave relationship and all computers are equal and
free to act independently.
• Resource sharing
• High reliability
• Saving money
People may personally use computer network for home shopping, e-banking, e-
mailing, online gaming, social media, video-conferencing or even posting a message
to the worldwide newsgroups. Computer networking is also used for participation in
live TV programmes, communication and entertainment.
• Resource sharing
• Interactive entertainment
• Exchanging information
1 Communication Medium
3. Sharing
4. Access to Remote Database
5. Information Services
6. Financial Services
7. Entertainment
8. Marketing and Sales
9. Tele Conferencing
10. Business Applications
1. Communication Medium
The most widely used network application is its use as a communication medium. It is
possible for everyone to send and receive e-mails.
Network Topology
Network Topology refers to the physical or logical layout of the network. It can be
determined by the configuration of connections between nodes. A node is an active
device connected to the network like a computer or a printer.
Network topology means the geometrical arrangement and connection of nodes in the
network. The path taken by data from sender to receiver computer mainly depends
upon the topology of the network. The way how thecomputer is linked to the network
is different in different topologies.
1. Bus Topology
2. Star Topology
3. Ring Topology
4. Tree Topology
5. Mesh Topology
1. Bus Topology
In bus topology, all devices on network are connected to a single continuous cable
called a bus. This long cable acts as a backbone to link all the devices in a network.
This cable has terminator at each end. Bus topology uses multipoint cabling i.e.
multiple devices are connected by means of connectors or drop cables. The following
figure shows bus topology:-
A bus topology is the simplest network configuration. Bus is passive topology because
it requires termination. Since the bus is passive topology, the electrical signal from a
transmitting computer is free to travel the entire length of the cable. Network
nodes have unique addresses. Transmission from any station travels the length of the
bus in both directions and can be received by all other stations. The destination
device, on identifying the address on the data packet copies the data onto its disk and
frees the line.
• A wide range of equipment can be attached to the LAN without any problem.
• A new node can be added to the LAN without disturbing the network and other
nodes.
• Low cabling cost because of short cable length to be used. Thus it is cheaper than
other topologies.
Disadvantages of Bus topology
• Failure of backbone / main cable affects failure of all devices on the network.
• Low reliability. A break or short circuit in the cable can halt the whole network.
2.Star Topology:-In a star topology, a device known as hub is placed in the center of
network and all nodes are connected to the central hub and communicate through it
as shown in the figure.
Thus:-
• In some networks when communication goes through a center point, then star
topology is preferred.
• Any communication between the stations must pass through the central node.
• In this topology, there is minimum data traffic along the cable and thus it provides
the optimum performance.
• A broken connection between a node and a hub does not affect the rest of the
network.
• The system depends on HUB / central node. If it breaks down, the whole network
would break down.
• The ring topology has advantage over bus topology as there is no danger of data
collision.
• Link failure can be easily found as each device is connected to its immediate
neighbours only.
• Ring network offers reliable performance for small and larger distances.
•Each node on the ring must handle the data being transferred by other nodes.
• If one node fails to handle the transfer of data then whole of network fails.
3.Tree Topology:-A tree topology combines characteristics of bus and star topologies.
It consists of groups of star-configured workstations connected to a linear bus
backbone cable. In a tree network, each device is connected to its own port on a HUB
in the same way as in a star topology. However HUBs are connected together in a
hierarchical way, ie, a HUB will connect to a port on another HUB.
• A tree structure facilitates functional grouping. For example, one branch may
contain all the general ledger terminals, another branch may have all the accounts
receivable terminals and so on.
Mesh topology is a network in which every node has a dedicated point-to-point link to
all the nodes within network. There is no chance of data failure, i.e., if one connection
goes down, there are other ways to route the data to its destination.
• It is very reliable because breakdown in any one of the lines will not affect other
links.
• Privacy or security is maintained because when every message sent travels along
dedicated line, only the intended recipient sees it.
• To add a new node will increase the cost multiple times depending upon the total
existing nodes in the network.
• Each node having physical links to every other node in the network makes it very
costly.
Q.What are analog and digital signals? Also discuss analog and digital transmission.
Write two ways in which they differ ❔
An Analog signal is any continuous signal for which the time varying feature (variable)
of the signal is a representation of some other time varying quantity, i.e., analogous to
another time varying signal. It differs from a digital signal in terms of small
fluctuations in the signal which are meaningful.
The analog signals are represented by a sine wave. The signal from a point A to a point
B can have many values. This means, the amplitude of the wave can take many values.
Value
Time
Sine Wave
For example, human voice produces analog signals. Analog signals are affected by the
noise signals Amplifiers are used to boost up the signals. However, amplifiers do not
only boost up the signals but also amplify the noise which deteriorates the signal
quality.
Digital Signals
Analog Transmission
#Digital Transmission
Digital transmission is a literal transfer of data over a point to point (or point to
multipoint) transmission medium-such as copper wires, optical fibres, wireless
communications media, or storage media. The data that is to be transferred is often
represented as an electro- magnetic signal (such as a microwave).
Following are the main differences between anaog and digital transmission:-
Analog Transmission
Digital Transmission
1. In case of digital communication, at the receiving end this additive noise can be
eliminated to great extent easily resulting in better recovery of actual signal.
2. Digital communication provides better security to messages than the analog
communication. It can be achieved through the various coding available
techniques in digital communication.
3. There are various digital communication techniques that use the available
bandwidth much efficiently than analog communication techniques.
4. Digital signal transmission requires a low-pass channel.
5. To retransmit the signal REPEATERS are used every 5 to 6 Kms apart. So,
definitely digital communication is cheaper.
Q.How does digital transmission work? How this transmission is superior to the analog
data transmission ❔
Digital transmission is a literal transfer of data over a point to point (or point to
multipoint) transmission medium such as copper wires, optical fibres, wireless
communications media, or storage media. The data that is to be transferred is often
represented as an electro- magnetic signal (such as a microwave).
Digital signals can be used to propagate both analog and digital data. The process at
the sending and receiving end nodes for digital signal transmission is explained below:
• Analog or digital data is first converted into a digital binary bit stream through the
process of encoding. If it is analog data, then the encoding process involves an A/D
(analog to digital conversion) process, using devices known as codecs. If data is
already in digital form, then the encoding process just converts the digital data into a
binary stream of Os and 1s (e.g ascii encoding used to encode a text file or an
electronic mail into a binary stream.
• The stream of binary digits is then converted back to either analog or digital data, by
using a decoder, that does the reverse operation as that of the encoder used at the
sender.
Following points explain why digital transmission is superior to the analog data
transmission:-
• The main advantage of the digital signals over analog signals is that the precise
signal level of the digital signal is not vital. This means that digital signals are fairly
immune to the imperfections of real electronic systems which tend to spoil analog
signals.
• Digital signals can be encrypted so that only the intended receiver can decode it (like
pay per view video, secure telephone etc.)
• It is also easier to translate human audio and video signals and other messages into
machine language.
Discuss LAN, WAN and MAN on the basis of architecture and geography
On the basis of the size of geographical area a network can be divided into three
categories. These three types of networks are:
For example, local network area in the University Campus, Industry, Small Town,
Building etc. are local area networks.
The software controlling the network is called the network operating system. LAN
allows access to various resources like printers, scanners, storage capacity and
expensive softwares without actually owning them. It is very economical as a set of
resources can satisfy the needs of many users.
Characteristics of LANs
LANs are not rigidly defined but they share all of the following characteristics:
3.Reliability and Stability:-There are permanent links via wires, cables, fiber optics
that transmit data rapidly and give good reliability and stability.
5.Low Cost Data Transmission:-Due to the inexpensive cable media there are low cost
data transfers at high bandwidth.
Advantages of LANS
2.Requires security system:-As data is shared, there is greater need for security
Special security measures are needed to stop users from using programs and data
that they should not have access to. Thus some type of security system is must to
protect private data
4.Lacks one’s hold:-Some control on the part of the user is lost. One may have to share
a printer with other users. One may face a situation like entire network suddenly
locked because one user has made a mistake.
5.Requires technical and administrative skills:-Networks are difficult to set up. Also
networks can be complicated to maintain. Thus installing and managing a LAN
requires technical and administrative skills.
Wide area networks connect computers and smaller networks to large networks over
greater geographic areas, including different continents. These computers may be
linked by means of cables, optical fibres or satellites. WANs are broadband usually
public access networks. WAN came into existence in late 1960s.
3.Remote access:-WAN allows users to engage in real time communication with other
users and provides full time remote resources connected to local services.
4.Permanent wiring not necessary:-Another characteristic of the WAN is that a
connection to it may not be permanently wired, as with a cabled LAN.
Functions of WAN
1.Remote Data:-The data of sales and transactions at the point-of-sale terminal can
be sent using WANs. The data can be centralized in a computer for processing or
reporting purpose. For example, Super markets in advanced countries connected
through WANs can send all sale data from their remote centers and the central
purchase and distribution center can monitor daily sale figures.
2.Research Project Entry:-Students at remote colleges and Universities may write and
execute their own programs on a central computer. For example, in all IITs connected
through WANs the research projects can be implemented easily because a program
developed at one of IIT’s can be used online by the students of other Its and
duplication of efforts can be avoided.
In between the LAN and the WAN is the MAN. A MAN is a netwon that covers an entire
city, but uses LAN technology tes at a higher speed and it is smaller than WAN
2.High speed network:-A MAN often acts as a high speed network to allow sharing of
regional resources.
Q.Draw and explain the TCP/IP protocol architecture and compare it with OSI model ❔
The TCP/IP, i.e., Transmission Control Protocol / Internet Protocol is the protocol that
makes possible the communication between different types of machines on different
types of networks.
•The connection should withstand till the source and destination machines are
functioning.
• The architecture should be so flexible that it should be able to transfer data among
different hardware and/or software platforms.
It is the most widely used protocol for interconnect computers and it is the protocol of
the Internet. The operation of the Internet can be described in terms of a number of
layers and protocols. The particular collection of layers and protocols that describe
the operation of Internet is formally known as the TCP / IP Reference Model. TCP / IP
model is normally considered to be a four layer system. Layers of TCP/IP are:
• Application layer
•Transport Layer
•Internet Layer
Application Layer
Transport Layer
Internet Layer
Application layer contains all the useful application protocols. This layer in TCP/IP can
be equated with the combination of session, presentation and application layer of the
OSI reference model.
The transport layer Is primarily concerned with how to transfer the information from
application onto the internet.
Use, purpose and functions of various layers, in detail. Are given below:
1.Application Layer:- This is the highest-level layer in the TCP IP model which is on the
top of the transport layer. This layer includes all processes and services that use the
transport layer to deliver data. The protocols contained in this layer are:
• TELNET: It is the Network Terminal Protocol which allows a user on one machine to
log onto a distant machine and work there.
• FTP: File Transfer Protocol provides a way to transfer files efficiently from one
machine to another
• DNS: Domain Name System for mapping host names onto their network addresses.
Many other protocols have been added to these, over the years such as NNTP, HTTP
etc. NNTP is the protocol for moving USENET news articles around and HTTP for
fetching pages on the World Wide Web.
• TCP: TCP provides a reliable flow of data between two communicating machines. It
is a connection oriented protocol. It divides the data passed to it from application
layer into suitable sized messages (data blocks), which are passed down one by one to
the internet layer for transmission. At the destination side, the receiving TCP
reassembles the received data or messages into the output format. TCP also handles
flow control. It synchronizes between fast sender and slow receiver.
3.Internet Layer:-The internet layer provides the means through which a host can send
packets onto a network and then have them travel independently to their destination.
The internet network level protocols IP (Internet Protocol), ICMP (Internet Control
Management Protocol) handle machine to machine communications. These protocols
provide for transmission and reception of transport requests and handle network level
control.
The primary protocol used to move data is the Internet Protocol (IP), which provides
the following services:
4.Host to Network Layer:-This layer is also called network interface layer. The tasks
performed by this layer are matched with the tasks performed by physical layer and
data link layer of OSI
Model. Host to Network layer cannot define any protocol. It is responsible for
accepting and transmitting IP datagrams. It may consist device driver in operating
system and corresponding network interface card in the computer.
Following points explain the similarity between the OSI reference model and TCP/IP
model:
• Both the models share the similar or equal architecture and it can be defined by the
fact that both of them are constructed with layers.
• Both models share a common ‘application layer’. However, this layer contains
different services, which depends upon each model.
• Both the models have comparable ‘transport’ & ‘network’ layers. Whatever functions
are performed between the presentation and network layer of OSI.
Protocol
The term protocol is used to refer to a well-known set of rules and formats to be used
for communication between processes in order to perform a given task.
A protocol Is a standard way that specifies a common language which two computers
use to exchange messages. For example, a protocol specifies the exact format and
meaning of each message that a computer can send.
A .Communication Protocols
B .Service Protocols
A.Communication Protocol:-
Communication protocols are the formal descriptions of digital message formats and
rules. They are required to exchange messages in or between computing systems and
are required in telecommunications.
3.Simple Mail Transfer Protocol (SMTP):-The Simple Mail Transfer Protocol is the
standard e-mail protocol of the Internet. SMTP is the standard protocol for sending
emails across the Internet.
It Is a set of communication guidelines that allow software to transmit email over the
Internet. Most email software are designed to use SMTP for communication purposes
when sending email and it only works for outgoing messages.
6.Post Office Protocol (POP):-Post Office Protocol (POP) is responsible for obtaining e-
mail from the mail server. To send to or collect mail from a remote server, another
protocol called Post Office Protocol (POP) is used. POP requires that the mail server
undertakes one of the following actions:
A)Retrieve mail from the mail server and subsequently delete it from the server.
c) Not retrieve mail, by simply ask whether new mail has arrived.
C.Service Protocol
These protocols provide services to other computers They can be of the following
types:
5.Telnet
Ans. Cryptography
Cryptography refers to the tools and techniques used to make messages secure for
communication between the participants and make messages immune to attacks by
hackers.
The word cryptography has come from a Greek word which means secret writing. For
private communication through public network, cryptography plays a very crucial role.
The role of cryptography can be illustrated with the help of a simple model of
cryptography as shown below:
Plaintext
Encryption
Medium
Decryption
Plaintext
Ciphertext
(Cryptography Model)
• Privacy / Confidentiality: Ensuring that no one can read the message except the
intended receiver.
• Integrity: Assuring the receiver that the received message has not been altered in any
way from the original.
• Non-repudiation: A mechanism to prove that the sender really sent this message.
Objectives of Cryptography :-
• Confidentiality: It means that the information can not be understood by anyone for
whom it was unintended.
• Integrity: The information cannot be altered in storage or transit between sender and
intended receiver without the alternation being detected.
• Non-repudiation: The creator / sender of information Cannot deny at a later stage his
or her intentions in the creation or transmission of the information.
• Authentication: The sender and receiver can confirm each other’s identity and the
origin / destination of the information.
1.Secret key Cryptography (SKC): Uses a single key for both encryption and
decryption.
2.Public Key Cryptography (PKC): Uses one key for encryption and another for
decryption.
Public key cryptography involves a pair of keys known as a public key and a private key
(a public key pair) which are associated with an entity that needs to authenticate it’s
identity electronically or to sign or encrypt data.
• The sender of the data from claiming, at a later date, that the data was never sent.
1*Packet Filtering*: Firewalls examine data packets entering or leaving the network
based on a set of security rules (such as IP addresses, port numbers, and protocols).
Packets matching the rules are allowed; others are blocked.
2*Stateful Inspection: Modern firewalls keep track of the state of active connections
and make decisions based on the context of traffic (e.g., if the request is part of an
ongoing session).
3*Proxying*: A firewall can act as a proxy server, intercepting and filtering traffic
between a user and the destination network.
5*Logging and Monitoring: Firewalls log traffic activity, enabling system administrators
to monitor network events and detect suspicious behavior.
#Types of Firewalls*
1. Packet-Filtering Firewalls: -
- Operate at both the network and transport layers (Layers 3 and 4).
- Track the state of active connections to make more informed decisions.
- Incorporate traditional firewall functions with additional features like deep packet
inspection, intrusion detection/prevention, and application awareness.
6. **Cloud Firewalls**:
#Benefits of Firewalls :-
- Help mitigate risks like data breaches and attacks such as DoS/DDoS.
Firewalls are essential for maintaining network security in both personal and
enterprise environments.
- Look for download and upload speeds that meet your needs (e.g., streaming,
gaming, remote work).
- Ensure the ISP can handle your required bandwidth without significant slowdowns.
2. Type of Connection:-
- Cable: Faster than DSL but may slow during peak hours.
- Satellite: Ideal for rural areas but slower and more expensive.
3. Reliability and Uptime: - Choose an ISP with a reputation for consistent service and
minimal downtime.
5. Cost: - Compare pricing plans, including installation fees, equipment costs, and
monthly charges.
6. Customer Support:- Reliable and prompt customer service is crucial for resolving
technical issues quickly.
- Check reviews or ask others about their experience with the ISP.
7. *Security Features:- - Look for built-in features like firewalls, antivirus, or VPN
services to protect your data.
8. Contract Terms:-
- Check if the ISP requires long-term contracts or offers flexible, no-contract plans.
- Understand penalties for early termination.
9. Additional Services:-
- Many ISPs offer bundled packages with TV, phone, or cloud services.
10. Scalability(for businesses): - Ensure the ISP can accommodate your future growth
in terms of bandwidth or additional services.
A web browser Is a software application that allows users to access, retrieve, and view
information on the World Wide Web. It interprets and displays content from websites
written in HTML, CSS, JavaScript, and other web technologies. Users interact with web
browsers by entering URLs, clicking on links, or using search engines to navigate the
internet.
1. **Accessing Websites**: Web browsers are used to visit websites and view their
content, such as articles, images, videos, and more.
4. **Streaming Content**: Browsers are used to stream videos, music, and other
multimedia content.
6. **Secure Transactions**: Web browsers enable online banking, shopping, and other
secure transactions using encryption protocols.
1. **Google Chrome:-
- Developed by Google.
- Known for its speed, simplicity, and integration with Google services.
- Supports a wide range of extensions and customization.
2. **Mozilla Firefox**
3. **Microsoft Edge**
4. **Safari**
- Known for its energy efficiency and optimization for Apple hardware.
5. **Opera**
6. Brave:-
A search engine** is a web-based tool that allows users to find information on the
internet by entering keywords or phrases. It scans its database of indexed websites
and returns a list of results ranked based on relevance. Popular search engines
include Google, Bing, Yahoo, and DuckDuckGo.
Search engines rely on algorithms and web crawlers to collect, organize, and rank
information from millions of web pages. Users access search engines to locate
specific content, including websites, images, videos, or documents.
A good search engine should possess several features to ensure efficiency, user-
friendliness, and reliability. Here are the key features:
1. *Fast and Accurate Search Results: - The engine should provide relevant results
quickly after the query is entered. Accuracy is key to meeting the user’s intent.
2. Comprehensive Indexing: - A good search engine should index a vast range of web
pages to ensure users find diverse information, including lesser-known but valuable
resources.
4. Advanced Search Options: - Features like filters, Boolean operators, date range
selection, and language preferences help refine results for better precision.
6. Support for Multimedia Search: - The engine should allow users to search for
various types of content, such as images, videos, news, and maps, in addition to text.
8. Privacy and Security: - Protecting user data and avoiding the misuse of personal
information are critical. A good search engine should offer encryption and avoid
invasive tracking.
Subscribing to Newsgroups
You can find out a list of newsgroups offered by a website by visiting it. If you enjoy a
newsgroup, subscribe to it. The subscription is free. A Web site does not provide you
access to all the newsgroups.
Once you get a list of newsgroups offered by a Web site, you can read the messages
(news). Anyone can participate in a newsgroup and can quickly meet and
communicate with the people who share ideas and interests. You can just read what
others are posting with responding.
To participate in a newsgroup:
A)First you need a newsreader program. Both Internet Explorer and Netscape
Navigator have built-in newsreader program.
The example below shows you the path to participate in the newsgroups offered by
Yahoo Website:
3.Type a topic in the Search box and then click the Search button. For example, type
Computer in the Search box and then click the Search button. Accordingly the search
results page will be displayed.
4.On the Search Result page select the group, which you want to join.
5.Select an article (message) to read it. Read the message and if you want to post
(send) a follow-up message, click on the hyperlink – Post Message at the end.
Types of Newsgroups
Hierarchies of Newsgroups:-
Usenet newsgroups are divided into hierarchies. The number of newsgroups on the
Usenet is so large that they are arranged in hierarchy to make them manageable. Like
regular domain names, they also have dots separating the different parts of their
hierarchy. One example of this is the newsgroup ric.arts.books.
For example,
The purpose of a newsgroup is to create an avenue for the exchange of information and
ideas. It provides online discussions on a small business with opportunities for
networking, learning more about the competition and industry, sales possibility and
marketing.
HTTP
Computers on the World Wide Web use the Hyper Text Transfer Protocol to talk with
each other. The HTTP provides a set of instructions for accurate information exchange.
Features of HTTP
Following are the features of HTTP:
1. Request-Response Mechanism
HTTP is based on the client / server principle. It allows the client to establish a
connection to the server and make a request. A web browser is an HTTP client because
it sends requests to a web server, which then sends responses back to the client
followed by the contents of the HTML page (the requested resource). Any HTTP server
responds to the browser on request. The HTTP request / response transaction involves
the following major steps:
• Server responds
• Connection is closed
HTTP transactions are always initiated by the client and server never generates a
response without being asked for it by a client. HTTP is a simple protocol, but it can
carry quite complex data. HTTP is the protocol to exchange or transfer hypertext.
2.Stateless Protocol:-A stateless protocol does not require the HTTP server to retain
any information or status about prior transactions. Subsequent request / response
pairs are completely independent of any past or previous client requests.
Protocols of Communication
Protocols of communication are the formal descriptions of digital message formats
and rules. They are required to exchange messages in or between computing systems
and are required in telecommunications.
2.Simple Mail Transfer Protocol (SMTP):-The Simple Mail Transfer Protocol (SMTP) is
the standard e-mail protocol of the Internet. SMTP is the standard protocol for sending
emails across Internet.
It is a set of communication guidelines that allow software to transmit email over the
Internet. Most email software is designed to use SMTP for communication purposes
when sending email and it only works for outgoing messages
5.Post Office Protocol (POP):-Post Office Protocol (POP) is responsible for obtaining e-
mail from the mail server. To send to or collect.
Q.Write a note on intranet security design ❔
Following are some key considerations for designing an intranet with robust security:
1. Network Segmentation
2. Access Control
3. Firewalls and Perimeter Security
4. Strong Authentication
5. Secure Remote Access
6. Encryption
7. Regular Updates and Patching
8. Employce Awareness and Training
9. Monitoring and Logging
This includes user authentication, authorization based on user roles and privileges,
and periodic access reviews.