[go: up one dir, main page]

0% found this document useful (0 votes)
22 views85 pages

XII CS Introduction To Computer Networks 2021-22

Uploaded by

killshotxd69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views85 pages

XII CS Introduction To Computer Networks 2021-22

Uploaded by

killshotxd69
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 85

CONTENTS ( Learning Outcomes ) 

XII CS 2021-22
10.
Marks -
WHAT IS A NETWORK ?
Network, a group of computers and associated devices that are
connected by communication facilities.
Network is an inter connected collection of autonomous computers.
When two or more computers are joined together so that they are
capable of exchanging information , they form a network.
What is the need for Networking?
• Resource sharing - Through a network , data , s/w and h/w
resources can be shared irrespective of the physical location of the
resources and the user.
• Reliability – A file can have its copies on two or more computers
of the network.
• Reduced Cost – Sharing resources reduces the cost
• Fast Communication – Information can be exchanged at a very fast
speed
WHAT are the Components of a Network?
I. Workstation or Nodes
II. Server
III. Client
IV. Network hardware
V. Communication Channel
VI. Software
VII.Network Services
Components of Networks contd..
I. Workstation or Nodes
It refers to a computer that are attached to a network
II. Server
The master computer is called Server. It facilitates the sharing of data, software
(s/w) and hardware (h/w) .
Servers can be of two types ---
i) Dedicated Servers
• Master-Slave Network. (Clients are dependent on the server)
• On bigger network, there is a computer reserved for server’s job and its only job is to
help workstations access data, software and hardware resources. It does not require to
double-up as a workstation /server.
• Data is backed up in the main server.
• Main server controls the security of the network.
ii) Non- Dedicated Servers
• Peer to Peer Network (Clients are not dependent on a central server)
• Workstation can double up as a Server. One computer works as a workstation as well as
server.
• Each computer has to be backed up. Data can easily be deleted by the users.
Components of Networks contd..
III. Client
It is a host computer that sends request to the server for some services.
IV. Network Hardware/ Devices
Specialized hardware is required to carry out various roles in a network
For eg. Establishing connections, controlling network traffic and many
more.
 NIC (Network Interface unit)
 Hub
 Switch
 Router
 Repeater
 Bridge
 Gateway
 Modem etc.
Network Interface Unit (NIU)
• It is a device attached to each workstation and server.

• Helps to make connections within the network.

• Each NIU has a unique number identifying it called node address.

• NIU is also called terminal access point (TAP).

• Also called Network Interface Card (NIC)

• Each NIC is given a unique Physical address called MAC address.

Manufacturer’s Unique ID Unique ID of the NIC Card

Fig. Gigabit Ethernet NIC


Components of Networks contd..
V. Communication Channel / Medium
Nodes on a network interacts with each other through various
communication channel.
It can be :
WIRED: twisted pair cable,coaxial cable, optical fiber
WIRELESS: Microwave,Radiowave,Satellite,Infrared,Laser etc.
VI. SOFTWARE:
Software comprises of the Network protocols (set of rules
governing the Network) and Network OS etc.
Eg. Of Network Protocols- http,ftp,SMTP, TCP/IP etc.
VII. Network Services
These are the other software applications required in a network for
different functionalities for g. VOIP, DNS etc.
EVOLUTION OF NETWORKING
ARPANET(Advanced Research Projects Agency NETwork):- Started in
1969,its goal was to connect computers at different universities and U.S
Defence. Engineers,Scientists,students and reseachers used to exchange data
and messages. It was limited to certain people only.

In 1980’s NSFnet(National Science Foundation Network) was started to


make a high capacity network which was more capable then ARPANET. It
allowed only the academic research and not any kind of private business on it.

Later in 1990’s the inter networking of ARPANET, NSFnet and other private
Networks resulted into INTERNET (INTERNETworking- A Network of
Networks)
What is INTERNET and INTRANET?
The Internet is a globally-connected network of computers that enables people
to share information and communicate with each other.
Internet is a public network. Internet contains various source of information.

An Intranet is a local or restricted network that enables people to store,


organize, and share information within an organization.
Intranet is a private network. Intranet only contains group-specific information.
How INTERNET works? TCP/IP Protocol
INTERNET works on the basis of some protocols.
Protocols are the set of rules required for Communication.
TCP/IP[ Transmission Control protocol / Internet Protocol ] are the set of
communication protocols used by the Internet.
It is responsible for dividing the file/message into packets on the source
computer. Sending and routing them and again reassembling the packets into
Destination computer.

TCP IP
TCP provides the service of providing IP handles addressing and routing
reliable and ordered exchange of data message across one or more networks.
directly between two network hosts.
IP is responsible for handling the address of
destination computer. So that the packets
are routed to correct destination computer.
IP defines addressing methods.
TCP is the protocol that major Internet IP is a connectionless protocol and does not
applications rely on, applications such as the need circuit setup prior to transmission.
World Wide Web, e-mail, and file transfer.
How INTERNET works? TCP/IP Protocol…contd..
• At the source computer, the message or the file/document to be
sent to another computer is firstly divided into very small parts
called Packets. A Packet generally contains some information.
• Each Packet is given a number serial wise e.g. 1,2,3.
• All these packets are then sent to the address of the destination
computer.
• The Destination computer receives the packets in random manner.
i.e. Packet 10 may come before packet 1.
• If a packet is erroneous or lost at the destination end, then it is
demanded again.
• The packets are reassembled in their original order.

Data Destination
Address

FIG: Sample Data Packet with Data part and destination address part
How INTERNET works? TCP/IP Protocol…contd..

SOURCE DESTINATION
A
MESSAGE Packet 1 Packet 4 Data
broken Packets are
Packet 2 B Packet 2
down into rearranged
equal Packet 3 Packet 5 in sequence
sized Data
c and then
Packet 4 Packet 1 MESSAGE is
Packets 
D Opened
Packet 5 Packet 3

TCP (Source side) IP finds the shortest TCP (Destination


breaks the route of the packets side)rearranges the Data
Packets in sequence and
message into from Source to opens the Message. If DP
Data Packets Destination. gets lost then it demands
from the source again.
What is INTERSPACE?
Interspace is a Client/Server software program that
allows multiple users to communicate online with
real-time audio, Video and text chat in dynamic 3D
environments.
It is most advanced form of communication.
DATA COMMUNICATION TERMINOLOGIES
Data Channel:- It is the medium through which information or data is
carried from one point to another.
BAUD Unit of measurement for the information carrying capacity of a communication
channel. Another unit similar to baud is bps (bits per second)
bits per It is a measurement unit which refers to the speed at which data is transferred.
Second (bps) bps- bits per second kbps- kilo bits per second mbps-mega bits per second
Bps-Bytes per second KBps-Kilo Bytes per second MBps-Mega Bytes per second
BANDWIDTH Difference between the lowest and highest frequencies of a transmission
channel OR
Width of allocated band of frequencies to a channel.

Bandwidth is the amount of information travelling through a channel at any


point of time. In Analog systems its unit is hertz. It is the unit of Frquency. Also
known as cycles per second.
More Units of frequency:-
1 KHz:-1000 cycles/sec. 1MHz:-1000KHz
1GHz:-1000 MHz. 1THz(Tera):-1000GHz.
Ex:- Voice signal uses (3 kHz) and Television uses bandwidth of 6MHz (approx.)
Data Transfer The data transfer rate is the amount of data transferred per second.
Rates bps, Bps,baud etc. are the units to measure the data transfer rate.
TYPES OF NETWORK
• Personal Area Network- PAN (smallest in size)
• Local Area Network - LAN
• Metropolitan Area Network – MAN
• Wide Area Network – WAN (Largest in size)
PAN (Smallest)
• Interconnection of Information Technology
Devices within the range of an individual
person, within a range of 10 metres.
• Eg. When you connect your Laptop, Desktop,
Mobile, ipad or printer with each other. This
makes your Personal Area Network.

LAN
• A Local Area Network (LAN) is confined to a
relatively small area. It is generally limited to a
geographic area such as a lab, school, or
building. Rarely are LAN computers more than
a 5-10 Kms apart.
• In a typical LAN configuration, one computer is
designated as the file server. It stores all of the
software that controls the network, as well as
the software that can be shared by the
computers attached to the network.
• Computers connected to the file server are
called workstations.
• On most LANs, cables are used to connect the
network interface cards in each computer.
MAN
• Spread over a city
• E.g. Cable T.V. networks
• Purpose is to share h/w and s/w
resources among its users.

WAN (Largest)
• It is spread across countries.
• It can be a group of LANs
connected together to form
a big LAN.
• Largest WAN in existence is
Internet.
Difference between LAN and WAN

LAN WAN
Diameter of not more Span entire countries
than few km
Operate at data transfer Data rate less than 1
rate of several MBPS (1 to MBPS
10 MBPS)
Complete ownership by a Owned by multiple
single organization organizations
Very low error rates Comparatively higher
error rates
Extra
knowledge
SWITCHING TECHNIQUES Extra
knowledge

• As in a n/w system, sharing or transfer of data


and information takes place.

• This transfer of data can be done by using


different switching methods as:-

 Circuit Switching.

 Message Switching.

 Packet Switching.
Circuit Switching Extra
knowledge
• Physical connection between the two computers is established and
then data is transmitted from source to destination computer.
• When a computer places a telephone call , the switching equipment
within the telephone system seeks out a physical copper path from
sender’s to receiver’s telephone. Ex:-Telephone Lines.
• It sets up end-to-end connection between computers before any
data can be sent.
Message Switching Extra
knowledge
• The source comp sends the data
to the switching office first
which stores the data in its Switching
buffer. Office1 Switching
Office3

• It then looks for a free link to


another switching office and
then sends the data to this
office.
• Process is continued till the data
is delivered to the destination Sender
Receiver
computer.
Message
• It is also known as store and
forward technique.
• Eg. Mails forwarded through
Message switching technique Switching
Office2
Packet Switching Extra
knowledge
• There is a tight upper limit on
the block size. In message
switching there was no upper
limit.
• A fixed size of packet is
specified.
• All the packets are stored in
main memory in switching
office. In message switching
packets are stored on disk.
• This increases the performance
as access time is reduced.
TRANSMISSION MEDIA
Transmission Media “connecting media” is the medium through
which two nodes get connected on a Network.

These are of two types-


I) Guided Media. (Cables)
• Twisted Pair
• Co-axial Cable
• Fiber Optics
II) Unguided Media. (Waves – without the use of cable)
• Radio Waves
• Microwave
• Satellite Waves
• Infrared
• Laser
TWISTED PAIR - (Guided Media)
 It consist of two insulated copper wires twisted together in a helical form(like DNA)
to reduce interference from closer by similar pair.
Twisted pairs requires repeaters for longer distances.
Ex:- Used in telephone lines.
Types of Twisted pairs:-
1) Shielded Twisted Pair (STP)
2) Unshielded Twisted Pair (UTP)

Advantages of TWISTED PAIR Disadvantages of TWISTED PAIR


Inexpensive. •Requires repeaters over long distances.
Easy to Install and maintain •Low bandwidth makes it unsuitable for broadband
It can be easily connected •Can easily pick up Noise signals
It has a low weight. •Maximum data rate is just 1 Mbps.
Flexible -can be bent easily. •Easy to Trap - to penetrate (Unsecure).
CO-AXIAL CABLE -- (Guided Media)
• Due to structure of Co-Axial cable, it is resistant to interference and signal
weakening that other cables may experience.
• It supports high data rates. Used for TV Signals. For Ex:-cable TV

Advantages of CO-AXIAL CABLE:-


Disadvantages of CO-AXIAL CABLE:-
• Widely available.
• Good noise immunity. • More expensive than twisted-pair wiring.
• Higher bandwidth. • They are not compatible with twisted Pair.
• Higher Speed(Data transfer) up to 10 Mbps. • Inflexible  can’t be bent sharply.
• Can be used for Broadband transmission.
OPTICAL FIBRES -- (Guided Media)
• It is used to carry digital data signals in the form of modulated pulses of light.
• It consist of extremely thin cylinder of glass called core, surrounded by a
concentric layer of glass known as cladding.

Advantages of OPTICAL FIBER :- Disadvantages of OPTICAL FIBER:-


 Fast transmission(~100 Mbps)  More Expensive.
 Not subject to interference.  Required skilled installation and
maintenance.
 Difficult to tap i.e penetrate(Secure).  Cabling is inflexible i.e can’t be bent easily.
 Lowest transmission lost over long
distances. Despite its disadvantages, it is the future of
 High transmission capacity. industry.
RADIOWAVE – (Unguided media)
It makes use of Radio frequencies for radio wave
transmission. For Ex:- We are well known of Radios
which receives signals from broadcasting station
using radio waves.
The setup has two parts:-
1)Transmitter
2)Receiver
Both the transmitter and receiver uses antennas to
radiate and capture the radio signals.
Advantages of RADIOWAVE:-
 It offers mobility.(You can use radios while moving).
 Cheaper then guided media as no cables or digging
is required.
They can also be used for communication over
oceans, mountains or other difficult areas where
cabling is not easy or possible at all.
No need of Land acquisition rights required for laying
or repairing cables.

Disadvantages of RADIOWAVE:-
 Insecure.
 Signals are affected by weather effects like rains,
thunder storms etc.
MICROWAVE – (Unguided media)
• These signals are used for long distance communication.
• This type of transmission consist of transmitter(source), receiver(destination) and
atmosphere.
• The signals are transmitted by using parabolic antennas mounted over towers.

Advantages of MICROWAVE Communication:- Disadvantages of MICROWAVE Comm:-


 Cheaper then guided media as no cables or
digging is required. Insecure and could be trapped easily.
 They can also be used for communication Signals are affected by weather effects like
over oceans, mountains or other difficult rains, thunder storms etc.
areas where cabling is not easy or possible Implementation and maintenance requires
at all. high skills.
 No need of Land acquisition rights required Bandwidth allocation is extremely limited.
for laying or repairing cables.
SATELLITE COMMUNICATION – (Unguided media)
It uses satellites for transmission. The
earth station consist of a satellite dish
and communication equipment to
send and receive data from satellites.
Satellite communication is one of the
applications of Microwave
communication.
Process of communication:-
The Satellite receives data/signals from
earth station,amplify them and
retransmit them to other side of earth
in only one step.
Advantages of SATELLITE :- Disadvantages of SATELLITE:-
 Its coverage area is quite large.  High investment cost as satellite is
 Cheaper. required to be placed over earth’s
 Can easily handle heavy traffic. surface.
 Reliable communication and used  Technology limitations prevents
as a emergency backup facility from placing high aperture antennas
when guided media fails due to on satellite platform which results into
disaster. over crowding of bandwidth.
INFRARED – (Unguided media)
Infrared :-
• Uses infrared lights for communication.
• Ex:- TV Remotes, Car Remote,
Wireless Speakers, Infrared Thermometers
Advantage of INFRARED:-
Secured transmission
Disadvantage of INFRARED:-
Infrared cannot penetrate walls.

LASER – (Unguided media)


Laser:-
• It requires direct Line Of Sight (LOS).
• It is unidirectional like microwave .
• It requires a laser transmitter and a photo
sensitive receiver at each end.
Ex:- Medial Sciences, Treatments, Industries
Advantage of LASER:-
Laser is faster than microwave.
Disadvantage of LASER:-
It can be adversely affected by weather.
NETWORK TOPOLOGY
The pattern of interconnection of nodes on a network is
called the topology.
FACTORS for choosing a Topology or a network are:-

Cost:- which offers minimum installation cost based on the


network under consideration.

Flexibility:- Can offer easy move of existing nodes and adding new ones.

Reliability:- Offers least failure.

TYPES OF TOPOLOGIES
 STAR Topology  TREE Topology
 BUS Topology  GRAPH Topology
 RING/CIRCULAR Topology  MESH Topology
 FULLY CONNECTED Topology
STAR TOPOLOGY
A star topology is designed with each node (file server,
workstations, and peripherals) connected directly to a
central network hub or concentrator
Data on a star network passes through the hub or
concentrator before continuing to its destination.
The hub or concentrator manages and controls all
functions of the network. It also acts as a repeater for
the data flow.
Advantages of a STAR Topology
• Easy to install and wire.
• No disruptions to the network when connecting or
removing devices.
• Easy to detect faults and to remove parts.
Disadvantages of a STAR Topology
• Requires more cable length than a linear topology.
• If the hub or concentrator fails, nodes attached are
disabled.
• More expensive than linear bus topologies because of the
cost of the concentrators.
BUS TOPOLOGY
• A linear bus topology consists of a main run of cable with a terminator at
each end .
• All nodes (file server, workstations, and peripherals) are connected to the
linear cable.

Advantages of a Linear BUS Topology


• Easy to connect a computer or peripheral to a linear bus.
• Requires less cable length than a star topology.
Disadvantages of a Linear BUS Topology
•Entire network shuts down if there is a break in the main cable.
•Terminators are required at both ends of the backbone cable.
•Difficult to identify the problem if the entire network shuts down.
•Nodes must be intelligent . Each node is directly connected to the central bus.
RING / CIRCULAR TOPOLOGY
• In it each node have two and only two neighbouring nodes.
Data packet is received from one neighbour and is
transmitted to the next.
•After passing through each node it is received at the sending
node and then the packet is removed from the n/w.
• Data travels in one direction in the ring like structure.
Advantages of a RING Topology
• Short cable length
• No wiring spaces required in the building
• High speed network using Optical fiber
Disadvantages of a RING Topology
• One node causes network failure
• It is very difficult to diagnose faults
• Network reconfiguration is difficult as
shutting down one section of the network
causes the network to be shutdown as a
whole.
TREE TOPOLOGY
• A tree topology combines characteristics of linear BUS
and STAR topologies.
• Inverted tree like structure, with the central root
branching and sub-branching to the extremities.
• It consists of groups of star-configured workstations
connected to a linear bus backbone cable.
• Tree topologies allow for the expansion of an existing
network, and enable schools to configure a network to
meet their needs
Advantages of a TREE Topology
• Point-to-point wiring for individual segments
• It is highly flexible
• Centralized monitoring
Disadvantages of a TREE Topology
• Overall length of each segment is limited by the type of cabling used.
• If the backbone line breaks, the entire segment goes down.
• It is difficult to configure the network, if there is a single point of failure.
• More wire is required than other topologies
MESH TOPOLOGY
In it each node is connected to more
than one node to provide an alternative
route (If in case, the host is either busy
or down).
Advantages of MESH Topology
 Good for long distance networking
 Extensive alternative back up support MESH Network
 Rerouting and pass through capabilities
 Ideal for distributed Networking
Disadvantages of MESH Topology
• The cost to implement is higher than
other network topologies
• Building and maintaining the topology is
difficult and time consuming.
FULLY CONNECTED –
MESH NETWORK
Considerations When Choosing a
Topology:
• Money. A linear bus network may be the least expensive
way to install a network; you do not have to purchase
concentrators.
• Length of cable needed. The linear bus network uses
shorter lengths of cable.
• Future growth. With a star topology, expanding a
network is easily done by adding another concentrator.
• Cable type. The most common cable in schools is
unshielded twisted pair, which is most often used with
star topologies.
NETWORK DEVICE: MODEM
MODEM (Modulator-Demodulator)
 It is a device that allows to
connect and communicate
computers via telephone lines.

 As telephone lines uses Analog


signals and computers uses Digital
Signals, so for communication these
needs to be interchanged.
 So, Modulator converts a digital
signal into Analog and Demodulator
does vice versa.

 It can be of two types:- Internal


Modem and External Modem
NETWORK DEVICE: RJ45
RJ-45 (Registered Jack-45)
 It is an 8 wire connector used to connect
computers on LAN.
 All registered jack is a standardized
telecommunication network interface for
connecting voice and data equipment to a service
provided by a local exchange carrier or long distance
carrier. (wikipedia)

NETWORK DEVICE: ETHERNET CARD


ETHERNET CARD:-
 Ethernet is a LAN architecture and computers
that are part of this architecture have to install a
special card called Ethernet card.
 It contains connections for coaxial or twisted
pair or both and also slot for Fiber optics cable.
 Ethernet Card is an example of NIC
NETWORK DEVICE: WIFI-CARD
For LAPTOP
WIFI-CARD:-
A device that adds wireless connectivity to a
laptop or desktop computer.
A Wi-Fi card connects to your laptop either in
your USB port or a wider card slot.
 In this way, the Wi-Fi card acts as both a
receiver and transmitter. It receives For DESKTOP
the wireless signal and communicates with
the wireless network, enabling you to access
the Web with your laptop.

NETWORK DEVICE: WAP


ACCESS POINT / WIRELESS ACCESS POINT (WAP)
This device allows other Wi-Fi devices, other wired
network to connect to a wired network. It is
configured in LAN and is also known as hotspot.
This is used to provide network connectivity in office
allowing employees to work from anywhere.
NETWORK DEVICE: HUB
 A common connection point for devices in a network which are
mainly used to connect segments of a LAN.
 A hub contains multiple ports.
 A Passive hub serves simply as a conduit for the data, enabling it to
go from one device (or segment) to another.
 Active hub electrically amplify the signal as it moves from one
connected device to another.
 Support 8, 12 or 24 RJ-45 ports
 Mostly used in Star or Ring topology.
NETWORK DEVICE: SWITCH
 A switch (switching hub) in the context of
networking refers to a device which filters and
forwards data packets across a network.
 A Switch keeps a record of the MAC addresses
of the devices attached to it.
 When the switch receives a data packet, it
forwards the packet directly to the recipient
device by looking up the MAC address.
We need a SWITCH or a HUB to connect
computers on a Network.
 A network switch can utilize the full
throughput potential of a networks
connection for each device .
 For example, a network of 5 PCs and a server
all connected with 10Mbps UTP cable, with a
HUB the throughput(10Mbps) would be shared
between each device, with a SWITCH each
device could utilize the full 10Mbps connection.
NETWORK DEVICE: REPEATER
 A REPEATER is an electronic device that receives a weak or low-level signal and
retransmits it at a higher level or higher power, so that the signal can cover longer
distances without degradation.
 Repeaters are installed along the way between sender and receiver, in case of
longer distance transmission to ensure that the data packets reach their
destination.
Repeaters are of two kinds:
 AMPLIFIER : Amplifies all the incoming signal transmitted over the network along
with concurrent noises.
 SIGNAL REPEATER : amplifies only the signal and discard the noise. It collects the
inbound packet on the network and then retransmits as if it were starting from
the source station.
WEAK STRONG
SIGNAL SIGNAL
NETWORK DEVICE: ROUTER
 Router is a specialized network device used to
interconnect different types of computer
network that uses different protocols and
forward data packets between computer Front side of the Router
networks. Back side of the Router
Routers perform the traffic directing functions on
the Internet. Data sent through the internet, such
as a web page or email, is in the form of data
packets. A packet is typically forwarded from one
router to another router through the networks
that constitute an Internetwork (Internet) until it
reaches its destination node.
 Most routers have multiple Ethernet ports on
the back of the device. This allows you to connect
multiple devices to the router in order to “share”
the Internet connection. A router without a built-
in modem will also need to be connected to an
ADSL modem in order to translate analogue signal
to digital information.
 Router can be wired or wireless.
NETWORK DEVICE: BRIDGE
 In telecommunication networks, a
bridge is a product that connects a local
area network (LAN) to another local area
network that uses the same protocol (for
example, Ethernet or Token Ring).
Bridge acts on MAC/Physical Address
 You can envision a bridge as being a
device that decides whether a message
from you to someone else is going to the
local area network in your building or to
someone on the local area network in the
building across the street.
 A bridge examines each message on a
LAN, "passing" those known to be within
the same LAN, and forwarding those
known to be on the other interconnected
LAN (or LANs).
NETWORK DEVICE: GATEWAY
 Gateway is a device that connects dissimilar networks.
 Establishes intelligent connection between a local network and external networks with
completely different structures.
 Gateway is the ISP(Internet Service Provider) that connects the user to the internet.
 Gateway can also act as Firewall, API Gateways etc.

INTERNET BACKBONE
(The WORLD WIDE WEB)

WAN(Wide Area Network)


A QUICK RECAP OF NETWORK DEVICES
RJ-45 connector with Ethernet Card
Modem

Hub Gateway Router

Repeater Bridge Switch


80-20 Network Rule
80 percent of the traffic on a given network segment is
local to LAN (destined for the target in the same
workgroup), and not more than 20 percent of the network
traffic should need to move across a backbone(the spine
that connects various sub networks)-WAN.

LAN traffic INTERNET


BACKBONE
WAN
80 % 20 %
(The WORLD
WIDE WEB)
From where the term ‘WEB’
has come?

‘COBWEB’

A system that supports links to other


documents, as well as graphics, audio,
and video files.
BUILDING BLOCKS OF WORLD WIDE WEB

• A Web Client is any machine that requests


information to the Server.

Web Server is basically a PC that is designed to


accept requests from remote computers and send on the
information requested by the client through the internet
(web browser).
A client can request
information to
several
servers at a time
• A Web Browser (commonly
referred to as a browser) is
a software application for
retrieving, presenting and
traversing information
resources on the World Wide
Web(WWW).
WEB BROWSER Settings

Web browsers can typically be configured with a built-in menu.


Depending on the browser, the menu may be named Settings, Options,
or Preferences. The menu has different types of settings.
For example, users can change their home page and default search
engine. They also can change default web page colors and fonts. Various
network connectivity and privacy settings are also usually available.
WEB BROWSERS
(ADD-ONS, PLUG-INS,COOKIES)
ADD-ONS are tools which integrate into your browser. They're similar to regular
apps or programs, but only run when the browser runs. Add-ons can allow
the viewing of certain types of Web content, such as Microsoft's Silverlight or
Adobe Flash Player, necessary for Netflix movies and YouTube videos,
respectively.

PLUG-IN (or plugin, add-in, addin, add-on, or addon) is a software


component that adds a specific feature to an existing computer program. When a
program supports plug-ins, it enables customization.
Eg. Graphics software use plug-ins to support file formats and process images.
(c.f. Photoshop plugin)
BROWSER COOKIES:- Cookies are files created by sites you visit. They
make your online experience easier by saving browsing information.
With cookies, sites can:
i. Keep you signed in.
ii. Remember your site preferences.
iii. Give you locally relevant content.
WEBSITE AND WEB PAGES
• A location on a web / net server is a
website.
• The documents residing on web sites are
known as web pages.
URL and DOMAIN NAMES
• WWW is built on a set of rules called Hypertext Transfer protocol
(HTTP) and to define the web page the language used is Hypertext
Markup Language (HTML).
• URL is the Uniform Resource Locator who uses IP address of a website in order to
access it.
• URL is actually the domain name of the website
• Domain name (DNS) is the unique name given to the website.

• A file’s Internet address, or URL,is determined by the following:


– The type of server or protocol
e.g. https://
– The name/address of the server on the Internet(domain name)
e.g. https://no1kanchrapara.kvs.ac.in/
– The location of the file on the server(this location may be related as a
“path” through the file hierarchy)
e.g. https://no1kanchrapara.kvs.ac.in/academics/admission-detail
HTML and XML
STATIC PAGES DYNAMIC PAGES
A Static web page is a web page (often A dynamic web page is an
HTML documents) that is delivered to the interactive web page (often Dynamic
user exactly as it is stored , which displays HTML) with web content that varies,
the same information for all users, from all based on the results of a search or
contexts any script executed .

Pre-built content is same each time the Contents is generated “on-the –fly” and
page is loaded. changes regularly
Content only changes when someone Page contains “server-side” code, allows
updates and publishes the file and sends it the server to generate unique content
to the server for uploading. when the page is loaded.
Uses HTML Codes Uses DynamicHTML, ASP,PHP,JSP
codes.
Ex. ABOUT US,MISSION,VISION,CONTACT Example : Amazon pages for buying
US information given on your school items, Facebook, upcoming events
website. A page of Tagore Poems. from a calendar and changing each
day for the different Calendar events
WWW Applications:
Web, E-mail, Chat, VoIP
WEB- A web application (or web app) is an application software that runs on
a web server, unlike computer-based software programs that are stored locally
on the Operating System (OS) of the device. Web applications are accessed by
the user through a web browser with an active internet connection.
Eg. Web applications include online forms, shopping carts, word
processors, spreadsheets, video and photo editing, file conversion, file
scanning, and email programs such as Gmail, Yahoo and AOL. Popular
applications include Google Apps and Microsoft 365.

E-Mail- Electronic mail (email or e-mail) is a method of exchanging messages


("mail") between people using electronic devices. Eg. Gmail, rediffmail
Chat- Online chat may refer to any kind of communication
over the Internet that offers a real-time transmission of text
messages from sender to receiver. Eg. Yahoo Messenger
VoIP-VoIP (Voice over Internet Protocol) is the technology
that converts your voice into a digital signal, allowing you to
make a call directly from a computer, a VoIP phone, or other
data-driven devices. ... You may also hear it referred to as IP
telephony, internet telephony, broadband telephony, or
broadband phone service. Eg. Skype
PROTOCOLS
• A protocol refers to a set of rules for two or more systems in
a network to communicate and share resources. Protocols
are used at data level, hardware level and Application level.
Rules includes
– end to end process timely
– secure network connection
– rules for initiating process
– Controlling communication between all the hardware in
the network.
Various protocols are used in the Network. Some protocols
are briefly explained in the following slides.
HTTP(Hyper Text Transfer Protocol) used on the
WWW(World Wide Web) for transferring web pages and files
contained in web pages such as images.
 HTTP is an application-level but light & fast protocol.
 It’s a generic, stateless, object oriented protocol.
 It has been in use by WWW since 1990.
 It consists of two fairly distinct items:
1. set of requests from browsers to servers
2. set of responses going the other way.
 HTTP allows an open-ended set of methods to be used to indicate the
purpose of a request.
 HTTP has different built-in methods to allow users to open a web page, to
disconnect an existing connection, to read the header of a webpage, to
append to an existing resource or to store a webpage etc.
Hypertext Transfer Protocol Secure (HTTPS) is an extension of
the Hypertext Transfer Protocol (HTTP). It is used for secure
communication over a computer network, and is widely used on the
Internet. The protocol is therefore also referred to as HTTP over
TLS, or HTTP over SSL.
• The principal motivations for HTTPS are authentication of the
accessed website, and protection of the privacy and integrity of the
exchanged data while in transit. It protects against man-in-the-
middle attacks, and the bidirectional encryption of communications
between a client and server protects the communications
against eavesdropping and tampering.
FTP(File Transfer Protocol) used for transferring files from one
machine to another. Responsible for Downloading and Uploading services on internet.

Telnet Protocol
used to open remote-
machine access(telnet )
sessions.
SLIP(Serial Line Internet Protocol)
SLIP is an encapsulation of the Internet Protocol designed to work over serial ports and
modem connections. SLIP encapsulates IP packets.IP protocol is the only protocol supported
by SLIP. SLIP has been largely replaced by the Point-to-Point Protocol (PPP), which has more
features and does not require a predefined IP address configuration.

PPP(Point to Point Protocol)


More developed protocol than SLIP, as it transfers additional data, better suited to data
transmission over the Internet (the addition of data in a frame is mainly due to the increase in
bandwidth). PPP encapsulates datagram.
SMTP(Simple Mail Transfer Protocol) SMTP stands for Simple
Mail Transfer Protocol. SMTP is a set of communication guidelines that allow software to
transmit an electronic mail (e-mail) over the internet is called Simple Mail Transfer Protocol. It
is a program used for sending messages to other computer users based on e-mail addresses.

POP3 Protocol (Post Office Protocol 3) is the most recent version of a standard
protocol for receiving e-mail. POP3 is a client/server protocol in which e-mail is received and
held for you by your Internet server.

IMAP Protocol Internet Message Access Protocol means that all of your email is
saved on your Internet Service Provider's servers. IMAP is better than POP3 if you are going
to be accessing your email from multiple devices, such as a work computer and a smart phone.
POP3 works better if you are only using one device, but have a very large number of emails. It
is also better if you have poor internet connection and need to access your emails offline.
WIRELESS MOBILE COMMUNICATION PROTOCOL
GSM Protocol The Global System for Mobile Communications (GSM) is a standard developed
by the European Telecommunications Standards Institute (ETSI) to describe the protocols for second-
generation (2G) digital cellular networks used by mobile devices such as mobile phones and tablets.

GPRS Protocol The General Packet Radio


Service (GPRS) is an enhancement to the existing GSM
network infrastructure and provides a connectionless
packet data service. The same cellular base-stations
that support voice calls are used to support GPRS and
as a consequence GPRS can be used wherever it is
possible to make a voice call. GPRS is the mobile
communication protocol used by second (2G) and third
generation (3G) of mobile telephony. It pledges a speed
of 56 kbps to 114 kbps, however the actual speed may
vary depending on network load.

WLL Protocol WLL stands


for Wireless in Local Loop. It is a
wireless local telephone service that
can be provided in homes or offices.
The subscribers connect to their
local exchange instead of the central
exchange wirelessly.
MOBILE
COMMUNICATION
TECHNOLOGIES
1G, 2G, 3G, 4G and 5G represent the five generations of mobile
networks where G stands for 'Generation' and the numbers 1, 2, 3, 4
and 5 represent the generation number. Since the early 1980s, almost
every ten years, we have seen a new generation of mobile networks.
WEB HOSTING
Web hosting is a means of hosting web-server
application on a computer system through
which electronic content on the internet is
readily available to any web browser client.

WEBSITE FILES which are hosted on USERS OF WEBSITE


the WEB HOST SERVER
TYPES OF WEB HOSTING
1. FREE  Free website hosting is a free non-paid web WordPress.com,
hosting service. Blogger,Wix,
HOSTING Weebly,GoDaddy
 Many web hosts who provide subdomains to
Squarespace,
anyone who want to make website can go for
Google
Free Web hosting.
Cloud Hosting,
Eg. Knowpythonbytes.blogspot.com
2 SHARED  Shared hosting is perfect for entry-level
HOSTING website hosting (beginners)
Website will be stored on the same
server as multiple other websites.
 With a shared hosting plan, all domains
share the same server resources, such as
RAM and CPU .
 As all resources are shared, the cost of
shared hosting plans are relatively low
 Efficiency is compromised in shared
hosting
3 DEDICATED Dedicated hosting gives website owners
WEB the most control over the server where
HOSTING the website is stored
Website owner has full root and admin
access, and controls the security and
operating system .
Dedicated Server is exclusively rented for
the website.(Most expensive Web hosting)
High level of technical expertise is
required for the installation and ongoing
management of the server.
4 VIRTUAL VPS hosting is unique because each website is
PRIVATE hosted within its own space on the server and
SERVER more customization, though it still shares a
physical server with other users.
(VPS)
VPS is not able to handle incredibly high traffic
HOSTING
levels and site performance can still be affected
by other sites on the server.
VPS hosting offers the cost benefits of shared
hosting with the control of dedicated hosting.
5 CLOUD  It is the current buzzword of the tech
WEB industry.
HOSTING  In cloud, many computers work together, run
applications using combined computing
resources and is scalable(can grow over time)
 It’s a hosting solution that works via a
network and enables companies to consume
the computing resource like a utility.
 Website owners do not build and maintain
their own computing infrastructure.
 The resources that are being used are spread
across several servers, reducing the chance of
any downtime due to a server malfunction.
 The website owner only pays for what they
need.
6 CO-  A Co-location host is a data-centre
LOCATION facility where organizations can rent space
HOSTING for servers and other computing
hardware. Space is typically leased by the
rack, cabinet or cage.
The co-location service provides the
building, cooling, bandwidth, power, and
physical security.
The client provides servers and storage.
 Co-location hosting saves cost and
secures data.

You might also like