Uploaded by ji Shuu

computer network

advertisement
1.What is computer network,its types and importance
Computer network refers to the group of two or more computing divices connected via
form of communication technology for example bisness might use a computer network
connected via cable or internet in order to gain acces to a common service or to share
program,files and other informations
 Typs of computer network
a)
Local Area Network LAN
These types of computer networks connect network devices over a relatively short distance.
Quite often, a networked office building, home or school contains a single LAN although it is
normal to come across a building that contains a few small LANs. On a few occasions, a LAN
may also span over a group of nearby buildings. Such computer networks are usually owned
by one organisation.
b) Area Wide Network WAN
As the name suggests, a WAN spans over a large physical distance. It may be regarded as a
collection of LANs dispersed over a geographical area. The internet is a very good example of
a WAN. LANs are connected to a WAN through a device referred to as a router. In IP
networking, both the LAN and WAN addresses are maintained by the router. Most WANs
exist under distributed or collective ownership and management and unlike the LANs, are not
necessarily owned by one organisation.
c) Wireless Local Area Network WLAN
These types of computer networks refer to LANs that are based on Wi-Fi wireless network
technology.
d) Metropolitan Area Network MAN
This is a network that spans over a physical area like a city that is smaller than a WAN but
larger than a LAN. Quite often, such computer networks are owned and operated by single
entities such as government bodies or large corporations.
e) Campus Area Network CAN
This type of network spans over multiple LANs but is generally smaller than a MAN. You
could find such computer networks in universities or local business campuses.
f) Storage Area Network SAN
This type of computer network connects servers to devices for data storage using technology
such as Fibre channel.
g) System Area Network This type of computer network is also referred to as a Cluster
Area Network. It links high-performance computers in a cluster configuration with
high-speed connections.
As indicated, there are different types of computer networks and which you’ll need depends
on the physical distance that is covered by the given network as well as the technology that is
used. Contact us if you would like more information.
 Importance of computer network
Information and communication,today nearly every organization uses a substantial number
of computers and communication tools (like telephone or fax), they are often still isolated.
While managers today are able to use applications like wordprocessors or spreadsheets, not
very many of them use computer-based tools to communicate with other departments or
information program
To overcome these obstacles in an effective usage of information technology, computer
networks are necessary. They are a new kind (one might call it paradigm) of organization of
computer systems produced by the need to merge computers and communications. At the
same time they are the means to converge the two areas; the unnecessary distinction between
tools to process and store information and tools to collect and transport information can
disappear. Computer networks can manage to put down the barriers between information held
on several (not only computer) systems. Only with the help of computer networks can a
borderless communication and information environment be built.
Computer networks allow the user to access remote programs and remote databases
either of the same organization or from other enterprises or public sources. Computer
networks provide communication possibilities faster than other facilities. Because of these
optimal information and communication possibilities, computer networks may increase the
organizational learning rate, which many authors declare as the only fundamental advantage
in competition.
Besides this major reason why any organization should not fail to have a computer
network, there are other reasons as well:

cost reduction by sharing hard- and software resources

high reliability by having multiple sources of supply

cost reduction by downsizing to microcomputer-based networks instead of using
mainframes

greater flexibility because of possibility to connect devices from various vendors
2.define internet and email and its significance
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to link several billion devices worldwide. It is a
network of networks that consists of millions of private, public, academic, business, and
government networks of local to global scope, linked by a broad array of electronic, wireless,
and optical networking technologies. The Internet carries an extensive range of information
resources and services, such as the inter-linked hypertext documents and applications of the
World Wide Web (WWW), the infrastructure to support email, and peer-to-peer networks for
file sharing and telephony.
Advantages:
1) Information on almost every subject imaginable.
2) Powerful search engines
3) Ability to do research from your home versus research libraries.
4) Information at various levels of study. Everything from scholarly articles to
ones directed at children.
5) Message boards where people can discuss ideas on any topic. Ability to get
wide range of opinions. People can find others that have a similar interest in
whatever they are interested in.
6) The internet provides the ability of emails. Free mail service to anyone in
the country.
7) Platform for products like SKYPE, which allow for holding a video
conference with anyone in the world who also has access.
8) Friendships and love connections have been made over the internet by people
involved in love/passion over similar interests.
9) Things such as Yahoo Answers and other sites where kids can have readily
available help for homework.
10) News, of all kinds is available almost instantaneously. Commentary, on that
news, from every conceivable viewpoint is also available.
 Email
electronic mail, e-mail or email is a message that may contain text, files, images, or other
attachments sent through a network to a specified individual or group of individuals. The first
e-mail was sent by Ray Tomlinson in 1971. By 1996, more electronic mail was being sent
than postal mail.
 Importance and valid of email
a.
Importance of internetAs mentioned earlier, an e-mail must have a username followed
by an @ (at sign) which is followed by the domain name with a domain suffix.
b.
The username cannot be longer than 64 characters long and the domain name should
have no more than 254 characters.
c.
There should be only one @ sign in an e-mail address.
d.
The space and special characters: ( ) , : ; < > \ [ ] are allowed. Occasionally, a space,
backslash, and quotation mark work but must be preceded with a forward slash.
Although valid some e-mail providers do not allow these characters.
e.
The username and e-mail addresses as a whole cannot begin or end with a period.
f.
The e-mail must not have two or more consecutive periods.
3.what are computer network protocal
A set of rules or procedures for transmitting data between electronic devices, such as
computers. In order for computers to exchange information, there must be a preexisting
agreement as to how the information will be structured and how each side will send and
receive it. Without a protocol, a transmitting computer, for example, could be sending its data
in 8-bit packets while the receiving computer might expect the data in 16-bit packets.
Protocols are established by international or industrywide organizations. Perhaps the most
important computer protocol is OSI (Open Systems Interconnection), a set of guidelines for
implementing networking communications between computers. The most important sets of
Internet protocols are TCP/IP, HTTP, and FTP.
4.What is network topologies
Is the arrangement of the various elements (links, nodes, etc.) of a computer network.
Essentially, it is the topological structure of a network and may be depicted physically or
logically. Physical topology is the placement of the various components of a network,
including device location and cable installation, while logical topology illustrates how data
flows within a network, regardless of its physical design. Distances between nodes, physical
interconnections, transmission rates, or signal types may differ between two networks, yet
their topologies may be identical.
5. Advantages and disadvantages of each network topology
In Ring Topology, all the nodes are connected to each-other in such a way that they
make a closed loop. Each workstation is connected to two other components on either side,
and it communicates with these two adjacent neighbors. Data travels around the network, in
one direction. Sending and receiving of data takes place by the help of TOKEN.
Token Passing (in brief) : Token contains a piece of information which along with data is sent
by the source computer. This token then passes to next node, which checks if the signal is
intended to it. If yes, it receives it and passes the empty to into the network, otherwise passes
token along with the data to next node. This process continues until the signal reaches its
intended
destination.
The nodes with token are the ones only allowed to send data. Other nodes have to wait for an
empty token to reach them. This network is usually found in offices, schools and small
buildings.
Ring Topology & token
Advantages of Ring Topology
a) This type of network topology is very organized. Each node gets to send the data when
it receives an empty token. This helps to reduces chances of collision. Also in ring
topology all the traffic flows in only one direction at very high speed.
b) Even when the load on the network increases, its performance is better than that of
Bus topology.
c) There is no need for network server to control the connectivity between workstations.
d) Additional components do not affect the performance of network.
e) Each computer has equal access to resources.
Disadvantages of Ring Topology
 packet of data must pass through all the computers between source and destination.
This makes it slower than Star topology.
 If one workstation or port goes down, the entire network gets affected.
 Network is highly dependent on the wire which connects different components.
 MAU’s and network cards are expensive as compared to Ethernet cards and hubs.
Types of network media
(i)
Twisted pair cables
(ii)
Coaxial cables
(iii)
Fiber optic cables.
6.Advantages of network media
 Advantages of Social Networking
Social networking offers many benefits. It is now easier than ever to keep in contact with
old friends and colleagues. The professional networking site LinkedIn even allows users to
request introductions to business people who are known to their contacts. The potential of this
enhanced connectivity is huge; whereas once you would be left sifting through business cards
after a networking event, trying to remember details about each person, you can now easily
look up a connection’s credentials and business interests on their social media profile.
LinkedIn is a particularly valuable business tool; over 200 million people are members,
including hiring managers from many top companies. Your profile is designed to function as
an online resume, detailing your education, career history (with recommendations from your
colleagues), and creative portfolio. The platform encourages users to connect with people
working in their organizations, and to endorse their colleagues for the skills they display in
their daily work. You can learn how to take advantage of all that LinkedIn has to offer with
this LinkedIn Training Course.
Social networking is particularly vital for entrepreneurs. Freelancers can find contacts via
professional groups on LinkedIn and Twitter, while business owners can make use of the
large user bases of Facebook and Twitter to market their products and services. Facebook has
a range of services designed to help businesses market themselves more effectively, including
the ability to target advertising at the precise demographic groups that are likely to respond
favorably. Find out how to Create a Successful Facebook Advertising Campaign with this free
online course.
 Disadvantages of Social Networking
The primary disadvantage of social networking is that most people do not know how to
network effectively. As a result, the few benefits they get from their networking activity are
not worth the time invested. The best way to avoid being disappointed in this way is to decide
on a strategy for using social sites, and stick to it. For example, if you are going to use Twitter
to draw attention to exciting new content on your website, then resist the temptation to waste
time tweeting about unrelated topics. Stay focused on what you want to achieve and don’t let
yourself get distracted.
8.What are network OSI model and its layers
Open Systems Interconnection (OSI) Seven Layered reference model is only just a
reference model. All the problems which are related to the communications are answered by
specific protocols operating at different layers. The following image shows the seven layers
described in Open Systems Interconnection (OSI) model.
Seven Layers of Open Systems Interconnection (OSI) Model
Layer 1. Physical Layer
The first layer of the seven layers of Open Systems Interconnection (OSI) network model is
called the Physical layer. Physical circuits are created on the physical layer of Open Systems
Interconnection (OSI) model. Physical layers describe the electrical or optical signals used for
communication
Layer 2. Datalink Layer
The second layer of the seven layers of Open Systems Interconnection (OSI) network model
is called the Datalink layer. The Data Link layer resides above the Physical layer and below
the Network layer. Datalink layer is responsible for providing end-to-end validity of the data
being transmitted..
Layer 3. Network Layer
The third layer of the seven layers of Open Systems Interconnection (OSI) network model is
the Network layer. The Network layer of the OSI model is responsible for managing logical
addressing information in the packets and the delivery of those packets to the correct
destination. Routers, which are special computers used to build the network, direct the data
packet generated by Network Layer using information stored in a table known as routing
table. The routing table is a list of available destinations that are stored in memory on the
routers. The network layer is responsible for working with logical addresses. The logical
addresses are used to uniquely identify a computer on the network, but at the same time
identify the network that system resides on. The logical address is used by network layer
protocols to deliver the packets to the correct network.
Layer 4. Transport Layer
The fourth layer of the seven layers of Open Systems Interconnection (OSI) network mode is
the Transport layer. The Transport layer handles transport functions such as reliable or
unreliable delivery of the data to the destination. On the sending computer, the transport layer
is responsible for breaking the data into smaller packets, so that if any packet is lost during
transmission, the missing packets will be sent again. Missing packets are determined by
acknowledgments (ACKs) from the remote device, when the remote device receives the
original message packets. At the receiving system, the transport layer will be responsible for
opening all of the packets and reconstructing the.
Layer 5. Session Layer
The position of Session Layer of the Seven Layered Open Systems Interconnection (OSI)
model is between Transport Layer and the Presentation Layer. Session layer is the fifth layer
of seven layered Open Systems Interconnection (OSI) Model. The session layer is responsible
for establishing, managing, and terminating connections between applications at each end of
the communication.
Layer 6. Presentation Layer
The position of Presentation Layer in seven layered Open Systems Interconnection (OSI)
model is just below the Application Layer. When the presentation layer receives data from the
application layer, to be sent over the network, it makes sure that the data is in the proper
format. If it is not, the presentation layer converts the data to the proper format. On the other
side of communication, when the presentation layer receives network data from the session
layer, it makes sure that the data is in the proper format and once again converts it if it is not.
Layer 7. Application Layer
The Application Layer the seventh layer in OSI network model. Application Layer is the topmost layer of the seven layered Open Systems Interconnection (OSI) network model. Real
traffic data will be often generated from the Application Layer. This may be a web request
generated from HTTP protocol, a command from telnet protocol, a file download request frm
FTP protocol etc
9.What is web browser and website and its examples
 web browser
(commonly referred to as a browser) is a software application for retrieving,
presenting and traversing information resources on the World Wide Web. An information
resource is identified by a Uniform Resource Identifier (URI/URL) and may be a web page,
image, video or other piece of content.[1] Hyperlinks present in resources enable users easily
to navigate their browsers to related resources.
Although browsers are primarily intended to use the World Wide Web, they can also be used
to access information provided by web servers in private networks or files in file systems.The
major web browsers are

Firefox

Internet Explorer

Google Chrome

Opera

Safari.
 Website
A website, also written as web site,[1] or simply site,[2] is a set of related web pages
typically served from a single web domain. A website is hosted on at least one web server,
accessible via a network such as the Internet or a private local area network through an
Internet address known as a uniform resource locator (URL). All publicly accessible websites
collectively constitute the World Wide Web.
10. What are webbrowser and website with its types
web browser Is a software that is used to access the internet. A browser lets you
visit e.g. websites and do activities within them like login, view multimedia, link fro one site
to another, visit page, print send and receive email, amore many other activities.
Website is a related collection of World Wide Web (www) files that includes a
beginning file called a home page. A company or an individual tells you how to get to their
website by giving you the address of their home page.
 The following are the types of website.

Personal websites: your internet service provide or domain register may offer you
free server space for you to create own website that might include some family photos
and an online diary.

Photo sharing websites: These types of websites are cropping up like fleas on dog.
There are websites like flick r.com, photosite.com and Google’s Picasa.
Writers/Authors websites.

Mobile device websites. The use of mobile device smart phones, tablets watches’ has
become ubiquitous.

Blogging websites: people took the words web logs and shortened it to blogs – online
diaries journals, or editorials, if you will.

Information websites: a major information site is Wikipedia, thee online
encyclopedia and its unique because it allows members to contribute and edit articles.
 The following are the types of web browser:

Lynx: is a full featured World Wide Web browser for users on unix, VMS and other
plat forms running cursor addressable character – all terminals.

Opera: Is smaller and faster than most other browser, yet it is full – featured.

Safari: is a web browser developed by Apple Inc. and included in Mac OS x.

Firefox: is a new browser derived from Mozilla. It was released in 2004 and has
grown to be the second most popular browser on the internet.

Mozilla: Is an open – source web browser, designed for standards compliance,
performance and portability.
11.what is email its parts and procedures on how to creat
Electronic mail, most commonly referred to as email or e-mail since c 1993,[2] is a
method of exchanging digital messages from an author to one or more recipients. Modern
email operates across the Internet or other computer networks. Some early email systems
required that the author and the recipient both be online at the same time, in common with
instant messaging. Today's email systems are based on a store-and-forward model. Email
servers accept, forward, deliver, and store messages. Neither the users nor their computers are
required to be online simultaneously; they need connect only briefly, typically to a mail
server, for as long as it takes to send or receive messages. Historically, the term electronic
mail was used generically for any electronic document transmission. For example, several
writers in the early 1970s used the term to describe fax document transmission.[3][4] As a
result, it is difficult to find the first citation for the use of the term with the more specific
meaning it has today.
 How to make a personal email address
So, if you want to create a personal yet professional email, there are few simple steps to
follow.
 First, log into your 123-reg Control Panel, scroll down the page to the Email section
and click on “Manage email”.
 Next, click on “Create your email address”.
 Then enter the prefix you want for your email in the box on the left such as info, sales
etc. Now choose the domain name you want to set the account up for from the drop
down box to the right.
 Enter a password and type it again in the Repeat password box.
 Click “Save” and you’re all done.
12.What do you understand by E-commerce and its state
E-commerce (electronic commerce or EC) is the buying and selling of goods and
services, or the transmitting of funds or data, over an electronic network, primarily the
Internet. These business transactions occur either business-to-business, business-to-consumer,
consumer-to-consumer or consumer-to-business.
E-commerce is conducted using a variety of applications, such as email, fax, online
catalogs and shopping carts, Electronic Data Interchange (EDI), File Transfer Protocol, and
Web services. Most of this is business-to-business, with some companies attempting to use
email and fax for unsolicited ads (usually viewed as spam) to consumers and other business
prospects, as well as to send out e-newsletters to subscribers.
The benefits of e-commerce include its around-the-clock availability, the speed of access, a
wider selection of goods and services, accessibility, and international reach.

privacy

effectiveness

sequrity
13.What is network sequrity,firewall
Network security[1] consists of the provisions and policies adopted by a network
administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a
computer network and network-accessible resources. Network security involves the
authorization of access to data in a network, which is controlled by the network administrator.
Users choose or are assigned an ID and password or other authenticating information that
allows them access to information and programs within their authority. Network security
covers a variety of computer networks, both public and private, that are used in everyday jobs
conducting transactions and communications among businesses, government agencies and
individuals. Networks can be private, such as within a company, and others which might be
open to public access. Network security is involved in organizations, enterprises, and other
types of institutions. It does as its title explains: It secures the network, as well as protecting
and overseeing operations being done. The most common and simple way of protecting a
network resource is by assigning it a unique name and a corresponding password
firewall is a network security system that controls the incoming and outgoing
network traffic based on an applied rule set. A firewall establishes a barrier between a trusted,
secure internal network and another network (e.g., the Internet) that is assumed not to be
secure and trusted. Firewalls exist both as software to run on general purpose hardware and as
a hardware
REFERENCE

Cem Ersoy, Shivendra Pan War ;Topological Design of Interconnected LAN-MAN
Networks ;IEEE INFOCON 1992.
.

ST.Edward’s University; Section 4 – parts of an email address

Cherokee Regional libray; Three parts of an E –mail address.

Document from E .Lawley

Document from Shaaban
Download