chapter1 computer networking

27
COMPUTER NETWORKING Introduction The advent of computer and communication technology have changed our daily life. Observe the following daily life examples- Watching Cable TV Cash Withdrawal from ATM Sending and receiving E-mails Booking Railway or Air-lines Tickets. Sending and receiving SMS through Mobile. What is a Network – A computer network is a collection of interconnected computers and other devices which are able to communicate with each other and share hardware and software resources. Advantages/Why we build a Network? 1. Sharing Resources: To share data and peripherals among users irrespective of their physical location. Ex. Sharing database, program files, printer and scanners etc. 2. Improved Communication: Enables reliable, secure and faster communication between users. It saves our time. 3 Reduced Communication cost: Using today’s public network we can send a large quantity of data at very low cost. Internet and Mobile network playing a very important role in sending and receiving text, image, audio and video data. 4. Offers easy communication methods: Example - E-mail, SMS etc. Components of a Network Sender: A device or a computer that sends the data. Receiver: A device or a computer that receives the data. Message: Information to be communicated. It may be text, images, sound or video. Medium: A transmission medium is a physical path through which the data flows from sender to receiver. A cable, fiber-optics or radio waves can be the medium. Protocol: A set of rules that manage data communication. It represents an agreement between the communicating devices.

Upload: kvafs-utarlai-barmer-rajasthan

Post on 18-Aug-2015

10 views

Category:

Technology


1 download

TRANSCRIPT

COMPUTER NETWORKING Introduction The advent of computer and communication technology have changed our daily life. Observe the following daily life examples-

Watching Cable TV

Cash Withdrawal from ATM

Sending and receiving E-mails

Booking Railway or Air-lines Tickets.

Sending and receiving SMS through Mobile.

What is a Network – A computer network is a collection of interconnected

computers and other devices which are able to communicate with each other

and share hardware and software resources.

Advantages/Why we build a Network?

1. Sharing Resources:

To share data and peripherals among users irrespective of their physical

location. Ex. Sharing database, program files, printer and scanners etc.

2. Improved Communication:

Enables reliable, secure and faster communication between users. It saves our time.

3 Reduced Communication cost:

Using today’s public network we can send a large quantity of data at very low

cost. Internet and Mobile network playing a very important role in sending and

receiving text, image, audio and video data.

4. Offers easy communication methods: Example - E-mail, SMS etc. Components of a Network

Sender: A device or a computer that sends the data.

Receiver: A device or a computer that receives the data.

Message: Information to be communicated. It may be text, images, sound

or video.

Medium: A transmission medium is a physical path through which the data

flows from sender to receiver. A cable, fiber-optics or radio waves can be the

medium.

Protocol: A set of rules that manage data communication. It represents an

agreement between the communicating devices.

Networking Hardware- To form a computer network a lot of hardware

devices are required. Some of these devices along with their functionalities are

mentioned below :

Transmission Media-

Def- A transmission medium is a medium of data transfer over a network. It

can be wired or wireless.

Wired Media – A number of various types of cables are used to transfer data

over computer networks. These are twisted pair cable, co-axial cable, and

optical fiber cable.

1. Twisted pair cable – Most widely used cable for creating small computer

networks. It contains four twisted pairs covered in an outer shield. An

RJ-45 connecter is used to connect this cable to a computer. It is of two

types:

1. UTP (Unshielded (unprotected) Twisted Pair): As the name suggest

in UTP cables individual pairs are not shielded (protected).

UTP Cable UTP Cable with

RJ-45 Connector

(Registered Jack)

Characteristics –

1. Low-cost cable available for setting up small networks.

2. Thin and flexible cable and therefore it offers ease of installation.

3. Carry data upto a length of 100m.

2. STP (Shielded Twisted Pair) –

It is the same cable as the UTP, but

with each pair shielded individually.

An outer shield then covers all the

pairs like in UTP.

Characteristics –

1. As compared to UTP, STP offers better immunity (resistance) against

internal and external electromagnetic interferences.

2. Expensive than UTP cable.

3. As compared to UTP cable, STP cable is difficult to install.

2. Coaxial Cable ( or coax) – Coaxial cables are group of specially wrapped &

insulated wire lines. They consist of a central copper wire surrounded by a PVC

insulation over which there is a sleeve (cover) mesh. The copper wire sleeve is

shielded again by an outer shield. Signal is transmitted by inner copper wire. It

is most common in cable TV network.

Characteristics :

1. It can carry data for a large distance ( 185m to

500m) .

2. Bulkier and less flexible than twisted pair.

3.Due to its thickness and less flexibility, it is

difficult to install as compared to twisted pair

cable.

4. Data transmission is better than twisted pair.

5. Much higher noise immunity.

3. Optical Fiber Cable – Optical fibers are hair-thin threads of glass or plastic.

Optical fiber can transmit data at much higher speed than copper wires or

coaxial cables with no significant loss over long distances.

An optical fiber has following parts:

Core - It is the thin glass rod at the center through which the light travels

Cladding (covering) - It is the outer optical material surrounding the core that

reflects the light back into the core

Buffer coating - It is the plastic coating that protects the cable from damage and moisture

Characteristics :

1. Can carry data for a very large distance.

2. Most efficient cable available for network.

3. Especially skilled people are required to install optical fiber cable.

4. Most expensive.

5. less susceptible to noise

Wireless Media (Unguided media):

1.No physical link established between two or more devices, communicating

wirelessly. Wireless signals are spread over in the air and are received and

interpreted by appropriate antennas.

2.Electromagnetic waves are used for wireless communication over computer

networks.

3.No physical medium is necessary for wireless signals, making them a

versatile way to build a network.

Radio wave – Radio waves are used for communication over distances

ranging from a few meters upto covering an entire city and can penetrate

(go through) buildings easily.

Examples of Radio Waves transmission: - Cordless phones, AM AND

FM radio broadcast, Garage door openers.

Characteristics :

1. These waves are Omni-directional, so the

transmitting and receiving antennas need not be

aligned.

2. Ease of communication over difficult terrain

(Area of land).

3. Relatively inexpensive than wired media.

4. Permission from concerned authorities is

required for use of radio wave transmission.

5. Less secure mode of transmission

Microwave – Microwave signals travel in straight lines and cannot penetrate

any solid object. Therefore for long distance microwave communication, high

towers are built and microwave antennas are put on their tops.

An example of usage of microwaves for communication is as follows:

In the big cities where land is very costly and a lot of formalities have to be

completed to get permission to dig land for cabling, microwave antennas can

be put on top of high rise buildings and communication can be started in a

short time.

Characteristics :

1. Faster than radio communication.

2. Ease of communication over difficult

terrain.

3. The transmission is in straight line so

the transmitting and receiving antennas

need to be properly aligned.

4. Relatively inexpensive than wired

media.

5. Free from land acquisition rights.

1. Satellite Link - Satellite links are used for very long distance wireless

communication which may range from intercity to worldwide.

Transmission from the earth to a satellite is known as uplink.

Transmission from a satellite to the earth is known as downlink.

Characteristics :

1. Area coverage very large.

2. Fast communication.

3. Very expensive.

4. Requires legal permission.

5. Normally owned by governments or by government approved

organizations of various countries

4. Bluetooth – Bluetooth technology uses radio waves. This technology is

used for short range wireless communication (approx. 10m).

Characteristics:

1. Slow data transfer rate.

2. Used for short range communication.

3. Line of sight between communicating devices is not required.

5. Infrared Waves – These waves are used for short range communication

(approx. 5m). It is inexpensive compared to other mechanisms.

Examples – Home-entertainment remote-control devices, Cordless mouse.

Characteristics:

1. No government permission is required.

2. The waves do not cross any solid object in between.

3. Does not require an antenna.

4. Transmission is safe.

Node – A node is a device which is directly connected to a computer network.

It can be a computer or any other device like scanner, printer etc.

Network Devices –

Other than transmission media many other devices are required to form

computer networks. Some of these devices are :

1. NIC - Any computer which has to be part of a computer network must have

an NIC (Network Interface Card) installed in it. A computer communicates with

other computer on a network with the help of NIC only.

2. Hub – A hub is an electronic device that connects several nodes to build a

network and redirects the received information to all the connected nodes in

broadcast mode. Hubs can be passive or active.

Active hubs – Electrically amplify the signals as it

moves from one connected device to another.

Passive hub – Allow the signals to pass from one

computer to another without any change.

http://www.youtube.com/watch?v=NxEyelY8R0s&list=PLC57B37876E

E50A15

3. Switch – A switch is an intelligent device that connects several nodes to

build a network and redirect the received information only to the intended

node. Switch can be considered advance from of hub.

4. Repeater – A repeater is a device that is used to regenerate a signal which

is on the way through a communication channel. A repeater regenerates the

received signal and re-transmits it to its destination.

5. Gateway – A gateway is a device, which is used to connect different types

of network and perform the necessary translation so that the connected

networks can communicate properly.

Network Topologies – The way in which the computers or other devices are

physically interconnected to build a network is called a Topology.

The most popular topologies are:

1. Bus topology – In this topology all nodes are connected to a main cable

called backbone. If any node has to send some information to any other

node, it sends the signal to the backbone. The signals travels through the

entire length of the backbone and is received by the node for which it is

intended.

Characteristics:

1. It is easy to install.

2. It requires less cable length and hence it is cost effective.

3. In case of cable fault, the entire network breaks down.

4. Easy to add additional node.

5. Failure of a node does not affect the network.

2. Star Topology – In this topology each node is directly connected to a

switch/hub. Each node requires a single cable. Any communication between the

node must pass through the central node.

Star topology generally requires more cable than bus topology.

Characteristics :

1. It is easy to install.

2. Failure of hub/switch leads to failure of entire

network.

3. It requires more cable than bus topology.

4. It is easy to add and remove additional node.

5. If any node other than host node fails, remaining

nodes are unaffected.

3. Tree topology - Tree topology is a combination of bus and star topology. It

is used to combine multiple star topology networks. All these stars are

connected together like a bus.

Characteristics:

1. It offers easy way of network expansion.

2. Even if one network (star) fails, the other networks remain connected and

working.

Types of Networks

A computer network may span any amount of geographical area. It can be on a

table, in a room, in a building, in a city, in a country, across continents or

around the world.

On the basis of area covered computer network are classified as :

1. Personal Area Network (PAN) - A PAN is network of communicating

devices ( Computer, Phone, Camera, MP3/MP4 Players) in the

proximity(nearness) of an individual. This range is typically upto 10

meters.

Example – Transfer songs from one cell phone to another, when files are

transferred from PC to an MP3 player.

A PAN can be set up using guided media (USB cable) or unguided media (Bluetooth, Infrared).

2. Local Area Network (LAN) – Small computer networks that are limited

to a localized area (e.g. an office, a building or a factory, home, school) are

known as Local Area Network. A LAN is managed by a single person or

organization.

It can cover an area of a few meters to a few kilometers.

A LAN can be set up using wired media (UTP cables, Co-axial cables etc.)

or wireless media (Infrared, radio waves).

3. Metropolitan Area Network (MAN) – Metropolitan Area Networks are

the networks spread over a city. For example , cable TV networks,

interconnected offices of a state government. A MAN is typically owned and

operated by a single entity such as a govt. body or a large corporation.

4. Wide Area Network (WAN) – These are the networks spread over large

distances says across countries or even continents. WANs usually contain a

number of interconnected individual computers, LANs, MANs, and may be

other WANS. Example – Internet.

Area of coverage – No upper limit.

Identification of computers and users over a network

MAC (Media Access Control) address – A MAC address is a unique 12 digit

( 6 digits for manufacturer code and 6 digits for serial number ) hexadecimal

number assigned to each NIC. MAC address of an NIC never changes.

example 00:A0:C9 : 14:C8:35

first six digit 00:A0:C9 indicates manufacturer code and the last digit

14:C8:35 are Serial number .

IP Address – An IP (Internet Protocol ) address is a unique number assigned

to each node on a network. IP address are expressed in decimal format. For

example following is an IP address :

202.27.94.137

IP address setting of a node can be changed by the user.

An IP address is a group of four bytes (or 32 bits).

IP address Vs MAC Address – The IP address is assigned by the network

administrator or the internet service provider while the MAC address is

assigned by the manufacturer. Thus if a computer is transferred from one

network to another, its IP address gets changed where as the MAC address

remains the same.

Domain Name – The system which assigns names to computers (web server)

and maintain a database of these names and corresponding IP address.

A domain generally contains following parts:

1. Top level domain name or primary domain name such as .com, .net, .org,

.edu, .in etc.

2. Sub-domain name(s)

example – cbse.nic.in

in – is the primary domain name

nic – is the sub-domain of in

cbase - is the sub-domain of nic.

Generic Domain Names :

.com - commercial business

.edu - educational institutions

.gov - gevt. Agencies

.mil - Military

.net - Network organizations

.org - Organizations (nonprofit)

Domain Name Resolution – Domain Name Resolution is the process of

getting the corresponding IP address from a domain name.

Attack on Network Security:

Some kinds of attack on network security are as follows:

Denial of service attacks: Denial of service attacks are those attacks that

prevent the legitimate (valid) users of the system, from accessing or using the

resources, information and capabilities of the system.

Examples of such attacks are:

1. Denial of Access to information: Corrupting, Encrypting or changing

the status of information so that it is not accessible (available) to its valid

user.

2. Denial of access to application: Forced shutting of an application as

soon as the users open it.

3. Denial of access to Resources: Blocking a resource, may be a printer or

scanner or USB port, of a computer from proper working.

4. Denial of access to a website: Continuously sending bulk request to a

website so that it is not available to any other user.

Intrusion Problems: An Intrusion problem is an attempt to mischievously

steal some information from someone's computer.

Examples of Intrusion are:

Snooping (to find out private things about somebody) – refers to gaining

unauthorised access to another person's or organization's data.

This may be done in a number of ways:

a. By getting someone’s login information.

b. Reading the files in an unauthorized manner.

c. Using some software which keeps track of the activities and data

being sent or received on someone’s computer.

Eavesdropping (To listen secretly to the private conversation of others) –

Refers to gaining unauthorized access to another person’s or organization’s

data while the data is on its way on the network.

this may be done in a number of ways:

1. By setting up parallel telephone lines.

2. By installing some software in the target computer.

3. By installing some receiver which capture the data while on its

way.

Network Security: refers to all activities undertaken to protect a computer network from attacks to its security.

Various techniques used for network security are given below:

1. Login-password: By assigning login names and strong password to the

users of a system, it can be ensured that only authorized people access a

computer.

2. Firewall: A firewall is a hardware device or software that controls the

incoming and outgoing network traffic. A firewall permits only the data to

enter or leave a computer/Network for which permission have been

granted by the computer/network administrator.

3. Anti Virus Software: Anti-virus software’s work against not only the

virus but also against almost all kind kinds of malware.

4. File Permissions: by giving appropriate rights to respective users,

computer security as well as network security can be increased.

ANSWER THE FOLLOWING QUESTIONS

1. Tara Nathani wants to upload and download files from/to a remote

internet server, write the name of the relevant communication protocol,

which will let her do the same.

Ans – FTP (File Transfer Protocol).

2. Define any two threats of Network Security.

3. Which protocol is used for the transfer of hyper text documents on the

internet?

Ans – HTTP (Hyper Text Transfer Protocol)

4. Which transmission media should be used to transfer data across two

continents at very high speed?

5. Give two examples of guided media and two examples of unguided

media

Ans – Guided media - Twisted pair cable, Coaxial cable

Unguided media – Microwave, radio wave.

6. Why a switch is called an intelligent hub?

7. When is a repeater used in a computer network?

8. Two engineers in the same room have connected their Palm-top using

Bluetooth for working on a group presentation. Out of the following,

what kind of network have they formed?

LAN, MAN, PAN, WAN

9. Two neighbourhood schools, at a distance of 120 meters from each

other, decide to join their LANs using UTP cable so that they can share

their e-learning resources. But after joining their LANs they are not able

to share the resources due to loss of signal in-between. Which device

should they use so that the signal is amplified in-between ?

10. How would you extract manufacturer-id and card no. from a MAC

address ?

Ans – The first three bytes of a MAC address represent manufacturer-id

and the last three bytes of a MAC address represent card-no.

11. Sujata says that the following numbers indicate an address :

208.77.188.166

What is the above address called ? To which object/device is it

assigned?

Ans : The above address is called an IP address or Internet Protocol

Address. It is assigned to devices participating in a network.

12. Jai Khanna is confused between the terms Domain Name and URL.

Explain the difference with the help of appropriate examples of each

Ans- A URL (Uniform Resource Locator) is the complete address of a

document on the web, whereas a domain name specifies the location of

document’s web server. A domain name is a component of the URL

used to access web sites.

For example the web address

http://www.example.net/index.html is a URL.

in this URL www.example.net is the domain name.

13. Ms. Taufiq Ahmed wants to prevent unauthorized access to/form his

company’s local area network. Write the name of a system

(software/hardware) , which he should install to do the same.

14. Beauty Lines Fashion Inc. is a fashion company, with design unit and

market unit 135 meters away from each other. The company recently

connected their LANs using Ethernet cable to share the stock related

information. But after joining their LANs, they are not able to share the

resources due to loss of signal in-between. Which device out of the following

should you suggest to be installed for a smooth communication ?

(i) UPS (ii) Modem (iii) Repeater

15. Which of the following is not a feature of Networking ?

(i) Resource sharing (ii) Uninterrupted Power Supply

(iii) Reduced cost (iv) Reliability

16. Identify the type of Topology from the following:

(i) If each node is connected with the help of independent cable with the

help of a central switching (communication controller )

(ii) If each node is connected with the help of a single co-axial cabel.

17. Define following with reference to Threats to Network Security :

(i) Trojan Horse (ii) Worm

18. Give one advantage and one disadvantage of using Star topology over

bus topology.

Ans : Advantage - As compared to Bus topology it gives far much better

performance, signals don’t necessarily get transmitted to all the

workstations.

Disadvantage - Longer cable length.

19. Write the name of the most suitable wireless communication channels for each of the following situations. (i) (i) Communication between two offices in different countries.

(ii) To transfer the data from one mobile phone to another. 20. Expand the following term: (i) HTTP (ii) FTP 21. What do you understand by Network Security? Name two common threats to it. Ans : Network security is needed to protect data during their transmission and to guarantee that data transmissions are authentic.

1. Trojan horse programs

2. Worms 22.

17

14. ABC Pvt. Ltd. Has set up its new center at Manglore for its offices and web based activities. It

has four buildings as shown in the diagram below :

Center to center distances between various buildings Number of computers

(a) Suggest a cable layout of connections between the buildings.

(b) Suggest the most suitable place (i.e., building) to house the server of this organization with

a suitable reason.

(c) Suggest the placement of the following devices with justification : (i) Repeater (ii)

Hub/Switch

Ans :

(a) Two layouts are being suggested any of which may be considered :

Layout Option 1 :

Layout Option 2 :

A to B 50 m

B to G 150 m

G to L 25 m

A to L 170 m

B to L 125 m

A to G 90 m

A 25

B 50

G 125

L 10

A

B

G

L

A

B

G

L

A

B

G

L

(b) The most suitable place/building to house the server of this organization would be building G, as

this building contains the maximum number of computers, thus decreasing the cabling cost for most

of the computers as well as increasing the efficiency of the maximum computers in the network. Also

housing the server here will make most of the traffic local.

(c) (i) For Layout 1, since the cabling distance between A to G, and that between B to G are quite

large, so a repeater each, would ideally be needed along their path to avoid loss of signals during the

course of data flow in these routes.

For layout 2, since the distance between building A to G is large so a repeater would ideally be placed

in between this path

(ii) in both the layouts, a hub/switch each would be needed in all the buildings, to interconnect the

group of cables from the different computers in each building.

Layout 1

Repeater

Repeater

A

B

G

L

Repeater A

B

G

L

Repeater

Repeater

A

B

G

L

Hub

Hub

Hub

Hub

Bus Topology

A bus topology consists of a main run of cable with a terminator at each end. All nodes like workstations, printers, laptops servers etc., are connected to the linear cable. The terminator is used to absorb the signal when the signal reaches the end, preventing signal bounce. When using bus topology,

when a computer sends out a signal, the signal travels the cable length in both

directions from the sending computer. When the signal reaches the end of the

cable length, it bounces back and returns in the direction it came from. This is

known as signal bounce. Signal bounce will create problem in network, because

if another signal is sent on the cable length at the same time, the two signals

will collide.

Definition

Noise

Noise is unwanted electrical or electromagnetic energy that degrades the

quality of signals and data. Noise occurs in digital and analog systems, and

can affect files and communications of all types, including text, programs,

images, and audio.

In a hard-wired circuit such as a telephone-line-based Internet hookup,

external noise is picked up from appliances in the vicinity (neighborhood), from

electrical transformers, from the atmosphere, and even from outer

space. Normally this noise is of little or no consequence. However, during

severe thunderstorms, or in locations were many electrical appliances are in

use, external noise can affect communications. In an Internet hookup it slows

down the data transfer rate, because the system must adjust its speed to

match conditions on the line.

Polyvinyl Chloride

Amplitude Modulation

Frequency Modulation

What is the difference between HTTP and FTP?

- Both HTTP and FTP are file transfer protocols based on TCP, and they are published in RFC (Request

for Comments).

- HTTP is used to transfer the content of a web page from web server to a client’s web browser, while FTP

is used to both upload and download files between FTP server and FTP client. So, HTTP is referred as a

one-way system and FTP is grouped under two-way system.

- When using an URL including http, it means that the user is connecting to a web server, and when using

an URL containing ftp, it says that the user is working with a file server.

- HTTP transfer only the web page content to the web browser in order to view it, and the transferred file is

not copied to the memory, but FTP transfers the entire file to the other device, and also it is saved in the

memory space.

- FTP generally requires a user login to the server in order to exchange files, but HTTP does not need

authentication for that.

- FTP is more efficient in transferring larger files, whereas HTTP is more efficient for transferring smaller

files such as web pages.