Networking Q.1 What are the Advantage and Disadvantage of Networking? Advantage of Networking File Sharing: Networks offer a quick and easy way to share files directly. Instead of using a disk or USB key to carry files from one computer or office to another, we can share files directly using a network. Software Cost and Management: Many popular software products are available for networks at a substantial savings in comparison to buying individually licensed copied for all of our computers. We can also load software on only the file server which saves time compared to installing and tracking files on independent computers. Upgrades are also easier because changes only have to be done once on the file server instead of on individual workstations. Security: Specific directories can be password protected to limit access to authorized users. Also, files and programs on a network can be designated as "copy inhibit" so we don’t have to worry about the illegal copying of programs. Resource Sharing: All computers in the network can share resources such as printers, fax machines, modems, and scanners. Communication: Even outside of the internet, those on the network can communicate with each other via electronic mail over the network system. When connected to the internet, network users can communicate with people around the world via the network. Flexible Access: Networks allow their users to access files from computers throughout the network. This means that a user can begin work on a project on one computer and finish up on another. Multiple users can also collaborate on the same project through the network. Disadvantage of networking 1. Security Issues One of the major drawbacks of computer networks is the security issues involved. If a computer is a standalone, physical access becomes necessary for any kind of data theft. However, if a computer is on a network, a computer hacker can get unauthorized access by using different tools. In case of big organizations, various network security software’s are used to prevent the theft of any confidential and classified data. 2. Rapid Spread of Computer Viruses If any computer system in a network gets affected by computer virus, there is a possible threat of other systems getting affected too. Viruses get spread on a network easily because of the interconnectivity of workstations. Such spread can be dangerous if the computers have important database which can get corrupted by the virus. 3. Expensive Set Up: The initial set up cost of a computer network can be high depending on the number of computers to be connected. Costly devices like routers, switches, hubs, etc., can add up to the bills of a person trying to install a computer network. He will also have to buy NICs (Network Interface Cards) for each of the workstations, in case they are not inbuilt. 1|N e t w o r k i n g Compiled by K@pil Sharma 4. Dependency on the Main File Server: In case the main File Server of a computer network breaks down, the system becomes useless. In case of big networks, the File Server should be a powerful computer, which often makes it expensive. Q.2 What do we mean by transmission media? Transmission media is the means or pathway by which data is transmitted and received from one computer to another computer. There are two types of transmission media, they are:1) Guided media 2) Unguided media 1) Guided Media: - Guided media is such type of media by which data/information is sent and received through some end to end connection like wire. Example:- Twisted pair cable, coaxial cable, optical fiber cable 2) Unguided Media: - Unguided media is such media by which data/information is sent and received through some frequency or some wave like radio wave, satellite etc Wireless communication: - Communication with the help of unguided media is called wireless communication. a) Twisted pair cable:- It is one of the cheapest and most popularly used communication media in guided system. In this cable a pair of copper wires is twisted to each other in a helical path making the same structure as a DNA molecule. The reason for twisting is to reduce electrical interference. It is mostly used telephone systems. These cables are available in varieties of grade level called levels. Level 5 cables is most expensive but has bandwidth (100 mbps), level 4 cable has 20 mbps bandwidth and level 3 has 16 mbps bandwidth. Bandwidth:- Bandwidth is the span of the capacity to carry information. More the bandwidth more will be the capacity to carry information. There are two types of twisted pair cable, they are:A) Shielded twisted pair (STP) B) Unshielded twisted pair (UTP) b) Coaxial Cable: - It is the most popular cable which is being used in TV in our homes. A coaxial cable consists of a thick copper wire in the core, surrounded by an insulating plastic with a net of thin copper wires used as earthing and in the outermost part it is insulated by a thick plastic cover. Generally it comes in two categories. -thin coaxial cable -thick coaxial cable Thick coaxial cable has 100base5 bandwidth which means 10-100mbps bandwidth with distance 500 m. thin coaxial cable has 10base2 bandwidth which means 10-100 bandwidth with distance 100200m. It is better than twisted pair cable and has high bandwidth but expensive in comparison to twisted pair cable. 2|N e t w o r k i n g Compiled by K@pil Sharma c) Fiber optics cable/ Optical fiber: - It is the most advanced media in communication. It has the highest bandwidth 100baseFX (which means 100 mbps with distance 2000m) and 1000baseLX (which means 1000mbps with distance 3000m) and has highest speed and is most expensive media in comparison to any other media. It uses light rather than electricity to transmit information. It is very thin media which is measured in microns and is very hard to identify with our necked eye. It has two layers-clad and core. Both the clad and core are made up of same material (glass and plastic). The light is passed through an optical fiber by the process of total internal reflection. Light source for it is ‘Laser’ or ‘Led’ and detector id ‘Pin’. At the source, electrical pulses generated by computer or electronic devices, is converted into light by ‘Laser’ or ‘Led’ which flows from fiber optics in the form of light. At the destination, the light rays are again converted into electrical pulses by ‘Pin’. It doesn’t have any danger of leakage and electrical interference. So it can be used in any environments like under big factories, grounds or airports .It has the highest bandwidth and the highest speed in comparison to any other media and is most expensive than other media. Satellite: - Satellite acts as relay station for communication signals. The satellite accept data and signals transmitted from an earth station, amplifies them and then retransmit them to another earth station. History of Internet The US department of defense laid the foundation of the internet roughly 30 years ago with a network called ARPNET (Advance Research Projects Agency Net). During the 1970’s work an ARPANET consisted of connecting the various networks and developing the necessary internet software. During the early 1980’s the network became known as the internet and it was during that period that business firms began using it but the general public started using internet after the development of world wide web in the early 1990’s. In 1993 there were only 130 websites all over the world now there are millions of websites all over the world. Q.3 what is Internet? What are the uses of internet? Internet is not just like one network, it is a coordinated union of a multitude of networks all over the world or we can say internet is the world largest computer networking, the network of networks. Internet is global LAN where millions of computers are connected to each other. any computer user on internet can contact another user on the internet anywhere in the world, very much like telephone user communicates with another user anywhere in the world. Internet is an information superhighway and has seemingly compressed the world into a cyber colony. Internet is available to anyone who wants to use it. A majority of internet users are college students, businessmen, professionals etc and accessing internet has become a way of life. Uses of Internet 1. We can exchange e-mail with millions of people with e-mail address in the internet. 2. We can get information about people, products, organizations and many other things from the internet. 3. We can get search facilities in the internet (such as- google.com) by the help of which we can search lots of information regarding any topic within a second. 4. We can send or receive data files, programs, images, sound, and animation through the internet from very distant places. 3|N e t w o r k i n g Compiled by K@pil Sharma 5. We can sell or buy products and services through the interent( Such as Ecommerce, E-business) 6. We can give information about our organization and institution by launching homepage and keeping in the internet which let the other people around the world to know. 7. We can conduct surveys; get opinions of people around the world on particular topics through the internet. 8. We can learn or we can do courses through the internet, we can give online exam through the internet such as MCSE(Microsoft Certified System Engineering), OCP (Oracle Certified Professional) etc The important thing to realize is that the internet permits almost anything but our imagination is the only limit. Q.4 What are the different types of Networking Networking is categorized according to the size of network, speed of data transmission, distance covered, technology used, architecture used, structure of the network etc. There are three types of Networking, they are:a) LAN (Local area Network):- A LAN connects network devices over a relatively short distance. A networked office building, school, or home usually contains a single LAN, though sometimes one building will contain a few small LANs (perhaps one per room), and occasionally a LAN will span a group of nearby buildings. The media (e.g., wire) used in LAN must be of the same type and the protocol used in it is generally same. It is simpler and cheaper than any other networking system. Major advantage of this system is the security provided because no any outsider’s can’t access the resources of a private network. Major disadvantage of this system is that it can’t cover more than few kilometers b) Metropolitan Area Network - a network spanning a physical area larger than a LAN but smaller than a WAN, such as a city. When LAN grows and spreads in area then it becomes MAN. It is called metropolitan network because it is extended up to a city or a larger geographical area. MAN is typically owned and operated by a single entity such as a government body or large corporation. In this system different communication media can be adopted and different types of protocols can be used. Instead of using guided media (e.g. wire), it can use unguided media (e.g. wireless media). It has more flexibility than the LAN has many advantages over LAN but has very high chances of data leakage or security break. c) WAN:-It is the network that is extended to a large area (e.g. throughout the world or even more) and the communication is done through satellite. A WAN is a geographically-dispersed collection of LANs. A network device called a router connects LANs to a WAN. In IP networking, the router maintains both a LAN address and a WAN address. A WAN differs from a LAN in several important ways. Most WANs (like the Internet) are not owned by any one organization but rather exist under collective or distributed ownership and management. It is the combination of many different types of LAN and MAN networks, so it has massive amount of heterogeneous systems(e.g. operating systems, devices, hardware, topologies, protocols, transmission media etc). Instead of centralizing the transmitting devices in a particular location such devices are distributed in different parts of the world. The largest WAN in existence is internet. 4|N e t w o r k i n g Compiled by K@pil Sharma Other types of networking are: Wireless Local Area Network - a LAN based on WiFi wireless network technology Campus Area Network - a network spanning multiple LANs but smaller than a MAN, such as on a university or local business campus. Storage Area Network - connects servers to data storage devices through a technology like Fibre Channel. System Area Network - links high-performance computers with high-speed connections in a cluster configuration. Also known as Cluster Area Network. Q.5 Difference between LAN and WAN 1. 2. 3. 4. 5. 6. 7. LAN ( Local Area Network LAN are smaller networks, usually within an office base The distance between the nodes is limited in LAN, there upper limit of 3 km or less and lower limit of 2m. The data rate speed of LAN normally operate at 1to 100 mbps In LAN error rate are much lower in comparison to WAN Transmission media used in LAN are generally wired media (wireless LAN also exists such WiFi) using coaxial cable, fiber optic cable. LANs are owned by single organization. LAN is operated at low cost 1. 2. 3. 4. 5. 6. 7. WAN(Wide Area Network) WAN, or wide area networks, are broader geographic networks WAN can spread throughout the world covering 1000s of kms WAN normally operate at the speed of 1 to 4 mbps In WAN error rate is higher than LAN WAN uses satellite and wireless media for transmission media. WAN is owned by multiple organizations. WAN is operated at high cost Q.6 Explain different types of Networking Architecture There are two types of networking architecture, they are 1) Peer-to –Peer architecture (Point-to Point) 2) Client-Server architecture (Broadcasting) Peer-to –Peer architecture (Point-to Point):In peer-to-peer architecture, computers are connected individually in pair (one-to-one connection). When the computer A wants to send message to computer C then it must be passed through B, when packet reaches to computer B it first of all matches the receiver address attached with the message to its own address. If it matches, then only accepts the message otherwise it discards it and forwards to the computer C. When the communication is being done between any two computers, then other channels remain free. So, there is not so much problem of traffic. As we have seen that each of the computers get equal priority and each behave like a server on one time and the same becomes client in other time. 5|N e t w o r k i n g Compiled by K@pil Sharma Client- server architecture:It is also called broadcasting architecture, in this architecture computers are connected to a central device and communication is done through it. When computer A wants to send message to computer C then message is sent to the central device. The message is first of all received by the server and the message is broadcasted by the server. All the computers attached to the network receive such packet; each of them read the receiver’s address and compares their own address with the address written on the packet. If it matches, then only the computer accepts it otherwise the packet is discarded or rejected. So in this case, computer C address matches with the packet address, so computer C accepts, other computer discard it. In this architecture server is always fixed which control all other computers and the communication is done through server. All other computers are called clients. The big disadvantage of this architecture is high traffic problem created by broadcasting, because at the time of broadcasting, all the computers remain busy. Its big advantage is its speed. Q7. Explain about ISO /OSI layer of networking? Ans: - ISO is the organization which certified and standardizes the product provided by different companies or organization. The need for worldwide standardization of technologies led to the creation of ISO. ISO (International Standard organization) created a model for network communication called OSI (Open System Interconnect) reference model in 1982 which become the primary architectural model for inter-computer communication. The OSI model describes how information from a software application in one computer moves through a network medium to a software application in another computer. OSI is the system adopted for data communication through internet because there are different sets of technologies, protocols, devices and software used for transmitting data and there is a need of a common language which they can understand, OSI provides such types of facility by which all the devices attached in the network speak same language. OSI model divides network communication into seven layers. Each layer carries out specific function in transmitting data on the network. The seven layer of OSI reference model can be divided into two categories: Upper layer and Lower layer. The upper layer of the OSI model deal with application issues and the lower layers of the OSI model deal with data transport issue. The seven layers of OSI model are as follows:a) Physical layer ( layer 1) b) Data link layer( layer 2) c) Network layer ( layer 3) d) Transport layer ( layer 4) e) Session layer ( layer 5) f) Presentation layer ( layer 6) g) Application layer ( layer 7) a) Physical Layer: - The main responsibility of this layer is to define voltage levels, timings of voltage changer, physical data rates, maximum transmission distances and physical connectors. The main function of this layer is to put data on the physical medium. b) Data link Layer: - The main responsibility of this layer is to decide which computer to send data, where the data is meant to go and what is the validity of the data frames. In other word these layers define access method for the physical medium. 6|N e t w o r k i n g Compiled by K@pil Sharma c) Network Layer: - The main responsibility of this layer is to make possible to connect heterogeneous networking systems. It also looks at the media path and helps router to find the short and the best path. d) Transport Layer: - The main responsibility of this layer is to ensure error-free delivery of data. It also makes possible for a faster host to communicate with a slower host or vice versa. e) Session Layer: - The main responsibility of these layers is to establish and maintains communication channel. This layer helps to establish a session/meeting/conference between different people in the network. It also provides synchronization between the systems with different speeds. Practical function like security authentication, Identification, connects and release of connection is done in this layer. f) Presentation Layer: - The main responsibility of this layer is to convert general data formats (ASCII) into network data representation (NDR). This layer is concerned with the syntax and semantics of the information transmitted. g) Application Layer: - The main responsibility of this layer is to define how application interacts with each other. It is totally user-oriented layer. Some of the major responsibility of this layer is file transfer, accessing remote files, accessing remote database, accessing email etc. Protocol: Protocols are the rules of transmission. As we know that for a transmission of data/information to be successful, each of the devices/computers attached to both ends must speak the same set of languages, must have same set of devices and same types of software. But practically it is impossible in this distributed world. To overcome this limitation, certain set of rules which are common and acceptable by both the parties are developed which play a role of interpreter between the sender and the receiver, which is known as protocols. For example: - TCP/IP, SMTP, HTTP etc Intranet: Intranet is also network of networks. But it is not public it is private network group and owned by a particular organization, only those persons who are authorized and authenticated users of that organization can only use this net. Intranet is based on internet technology to build information system with an organization or enterprise. It also uses the same protocols as used by the internet (HTTP, TCP/IP). It inherits all the features of Internet. It is useful for promoting business, education etc. If permission is given to access intranet from remote location then it is termed as extranet. Q.8 What is network topology? What are the different types of LAN topology? Explain (2060, 2061) ANS: - The physical layer of local area network is called network topology. In other word network topology is the logical way of explaining how computer are connected to each other and shows physically how they are linked. The major goal of network topology is to find out the most economical and efficient way to connect all the users to the network. There are all together six types of LAN topology, they are as follows:a) Bus Topology b) Star Topology c) Ring Topology d) Tree Topology e) Mesh Topology f) Hybrid Topology 7|N e t w o r k i n g Compiled by K@pil Sharma a) Bus Topology: - This is the most popular topology. In this topology a single cable is connected with each computer. The single cable at the middle of all the computers is called ‘Bus’ from which other nodes are connected by some connectors and that node is connected on the LAN port of each computer. In this topology server is located on either side and a terminator is located on other side of the bus. It is based on broadcasting architecture Advantage of Bus Topology It is relatively easy to install and extend the network If any of the computers in network is down, then other computers can continue their work It is more flexible because we can connect any number of computers by using a connector in the bus It is not expensive to install Disadvantage of Bus Topology Data traffic is high in this topology because it is based on client/ server Data collision is high If the backbone cable fails the entire network is unusuable. Finding out fault and troubleshooting is hard architecture b) Star Topology:In this topology a central connecting device known as ‘Hub’ connects all the computers in the network to each other, which is connected to a powerful central computer known as server. It is based on client/server architecture. Advantage of Star Topology: It is flexible because in this topology it is easy to add computer and remove existing one. In this topology it is easy to diagnose fault because of the use of ‘Hub’ In this topology if any of the computers in the network is down, then other computers can carry out their functions as usual Disadvantages of Star Topology In this topology if the server or hubs fail it makes the whole system unavailable. In this topology cost of cable is more because all the cable from all the clients must be connected to the server through hub It is based on client/server architecture so in this topology data traffic is high c) Ring Topology:In this topology each computer is connected in a circular structure. Each computer is connected to other two computers in either side. It is based on point to point or peer to peer architecture Advantage of Ring topology There is no dependence on the central server. So, each computer is capable of acting as server as well as client. Since data travels in one direction, there is less chance of collision and there is less chance of data- traffic. Every computer has equal access facility to the resources. 8|N e t w o r k i n g Compiled by K@pil Sharma Disadvantage of Ring topology Failure of any one of the computer on the network makes the whole network down Very hard to find out the errors and troubleshooting Non- flexible because adding new computer on the network and removing existing computer is very hard d) Tree Topology: The tree topology arranges computers and links into distinct hierarchical structure in order to allow greater control and easier troubleshooting. A computer acting as a server in upper level can act as client in lower lever. It minimizes traffic drastically because broadcasting is done only within one level. Data and traffic can flow from up to down or vice versa. If any of the computers is down, then it affects only those computers which are under its control. Advantage of Tree topology The tree topology is flexible to extend and reduce. The failure of the leaf node does not affect the whole network. Disadvantage of Tree topology Failure to any of the hierarchical node will cause the failure to the network on that node. The performance of the root node and other hierarchical nodes will affect the performance of the network. It is not easy to install. It is not easy to troubleshoot the network problem. e) Mesh topology: Mesh topology arranges all the computers where each of the computers is connected to all computers .If any of the computer is down then other computer can still continue to work. It is very much complex and troubleshooting much harder. Advantage of Mesh topology Because of the multiple paths to reach the nodes the failure of any node will not affect the operation of the entire network. There is no traffic problem as it has multiple paths. Disadvantages of Mesh topology It is very complex network and is difficult to find the faults and troubleshoot problems. A lot of network cable is needed, so it is costly. It is difficult to install and extend the network. f) Hybrid topology: Hybrid topology is the combination of two or more topologies together. It has advantages of more than one topologies as well as disadvantages, too Q.9 what are the different networking devices? Explain each of then in brief. ANS:The different networking devices are Hub Bridge Repeater Router Modem 9|N e t w o r k i n g Compiled by K@pil Sharma Hub: Hub is a device with multiple ports for connecting different computers on the network. Usually, each file servers has only one NIC. Therefore, it would be impossible to connect every workstation directly to the file server. To solve this problem, LANs use hubs, which are very common networking devices. So, it has the following properties: It operates on Physical layer of OSI model It accepts data, amplify them and then transmit It is used to split network segments and propagate signals through it. It does not need path determination and switching Its big disadvantage is that it can’t filter network traffic and it imposes limitation to the number of computer that can be connected Bridge: It is a device, which connects different network segments and passes data with the same communication protocols. It is the connecting device between two or more hubs. Some of the characteristics are: It operates at layer 2 ( Data Link) of OSI model It reduces unnecessary traffic problem by controlling broadcasting Bridges are more intelligent then hubs because they maintain MAC address tables in them and forward data looking on it. Bridges collect and pass packets between 2 network segments Repeater: It is another network connecting device. It increases the distance over which a network can extend. For example, using a category 5 twisted pair cable, we can send data up to maximum of 100 meters only without amplification. If data travels beyond that distance without amplification, then it becomes weaker and after some time the signal will be destroyed. A repeater provides solution for such problem. Some of the characteristics of repeaters are: It operates at layer-1 (Physical layer) of OSI model It receives signals, amplifies them and sends it. If the signals are weakened because of long wire, then repeater can amplify, clean the signal and we can increase length of cable. Router: It is also a type networking device which are used to connect separate network and to access internet. It is similar to Bridge in many ways Some of the characteristics of routers are: It operates at layer -3 (Network layer). Router finds the shortest and the best path to forward data between different paths available It use IP address for accessing and forwarding data packets It is just like bridge or hub but provides more functionality and is more intelligent Modem (modulator and demodulator): It is a device that interprets digital and analog signals enabling data to be transmitted over voice-grade telephone lines. At the source, digital signals are converted to a form suitable for transmission over analog communication facilities At the destination, these analog signals are returned to their digital form It is used in multimedia, networking and internet to transmit data(text ,data ,voice, picture etc) from copper wire because copper wire can transmit only analog signals but the signals produced by a computer is digital. 10 | N e t w o r k i n g Compiled by K@pil Sharma In other words modem is a device which has responsibility of modulating (coding) the data before transmission and demodulating (decoding) the same data with the same rule at the receiving end. Analog and digital signals A signal is called analog signal if the signal is continuously varying with respect to time. The example of analog signal are the voice signals,music signals, human voice,temperatue etc. A signal is called digital signal if the signal is discrete or discontinuous.Digital signals are the language of modern day computers. Digital signal is represented only by digits that are 1 and 0.The examples of digital signal are the digitized audio and video signals stored in media such as CD/DVD. The digital signaling has more advantages than analog signaling. The advantage of the digital signaling is that it is cheaper than analog signaling and is more tolerant to noise interference. Modulation:- Modulation is a technique used in transmission of a signal. It is the process used to describe how the digital signal is changed so it can be transmitted across the analogue link. Modulation can be either amplitude, frequency or phase modulation depending on the fact that whether the amplitude, frequency or phase has been changed. Types of modulation:Amplitude modulation:-The modulation which is suitable for low speed transmission is called amplitude modulation. Frequency modulation:-The modulation which uses two carrier signals. High frequency signal for high and low frequency signal for low is called modulation. Phase modulation:-The modulation that uses a single carrier frequency and alters the phase of the carrier is called phase modulation. Q.10 Define Direction of communication flow Depending on the direction of flow of signals during the communication, mode of communication can be divided into three types. They are:-simplex, half duplex and full duplex. Simplex communication:- when data flows in only one direction from sender to receiver, then the communication flow is know as simplex communication. For example:-radio and television broadcast. Half duplex Communication:-When data flows in both the direction from sender to receiver and receiver to sender, but the transmission is one way only at a time, then the communication flow is known as half duplex communication. When the sender is transmitting the signal, the receiver can’t transmit back to the source at the same time. For example:-Talking with friends using landline or mobile phone, sending fax etc. Full Duplex Communication:When data flows in both the direction from sender to receiver and receiver to sender simultaneously then the communication flow is known as full duplex communication. For example:-email and web chatting etc. Q.11 Define the term Amplitude, Frequency and Phase Amplitude:-It is defined as the strength of the signal .The higher the amplitude the stronger the signal. Frequency:-Frequency is the number of cycle per second and is measured in Hertz. Phase:-This is the rate at which the signal changes its relationship to time. Q.12 Define Switching and its types In this system when one dials a number from his home, the circuitry system in the telecommunication office automatically finds the appropriate path from the caller to the called 11 | N e t w o r k i n g Compiled by K@pil Sharma telephone switch. When such path is determined, then a dedicated line is established between them till the duration of the conversation. This system is referred to as switching system. There are three type of switching, they are as fallows:b) Circuit switching c) Message switching d) Packet switching a) circuit switching It is the switching done through the physical switching and establishing a dedicated line between the caller and receiver. As we know that there are thousands and lakhs of switches in the telephone office (thousands and lakhs of people has telephone facility in their house) and the telephone office must find out the appropriate path through the automated system to established a dedicated line between the called and receiver b) Message switching : In this system of switching the sender sends the message to the switching office, the switching office stores that message for temporary period, sets priority to the messages, checks for the availability of the receiver and then only forwards the message .In this switching the dedicated line is not established between the caller and receiver so many callers can use the same channel at the same time which makes delayed in forwarding message to the receiving end. c) Packet switching In this switching instead of transmitting the whole message at once, a bundle of multiple slices of messages (not full message , also called packet) are transmitted, so each of the message gets equal priority , it is the reason that when we open internet website , a part of the page opens first and then gradually other parts are opened in sequence. This switching has predefined upper limit for message. So the message is routed through the main memory instead of storing it in a disk in switching office Ethernet The term Ethernet refers to the family of the Local area network (LAN) products covered by the IEEE 802.3 standard. Ethernet has survived as the major LAN technology (it is currently used for approximately 85 percent of the world’s LAN connected PCs and workstations) because it has the following characteristics: Q.13 Define E-mail and its advantages It is one of the most frequently used features of the internet. Many people sigh up for internet service just so that they can send and receive e-mail message. The internet is now the world’s largest electronic mail system. More than 30 million people are directly connected to the internet and can send and receive electronic mail. Electronic mail has many advantages: Fast: Most system can relay our message to the recipient in a matter of minutes or seconds. Many system let us check to see whether the recipient has accessed our message or not Easy: - When we open our email box we see a list of the message we have received, first we read the message and then decide how to respond. We can reply to the message if we like, or just delete if it requires no reply. We can save it or print it. We can even forward the message to the other Fun:- International electronic mail system enable us to find ‘pen pals’ all over the world Cheap:- World- wide electronics mail access is available through services such as CompuServe, these services charge less than we would expect to pay for monthly telephone service. Flexible: - We can send a message to more than one person if we like. 12 | N e t w o r k i n g Compiled by K@pil Sharma Q.14 Write Short Notes on:a) Workstation:-A workstation is a computer intended for individual use that is faster and more capable than a personal computer. It's intended for business or professional use (rather than home or recreational use). Workstations and applications designed for them are used by small engineering companies, architects, graphic designers, and any organization, department, or individual that requires a faster microprocessor, a large amount of random access memory (RAM), and special features such as high-speed graphics adapters. Historically, the workstation developed technologically about the same time and for the same audience as the UNIX operating system, which is often used as the workstation operating system. Among the most successful makers of this kind of workstation are Sun Microsystems, Hewlett-Packard and IBM. b) Terminal:- A terminal is an end-user device (usually with display monitor and keyboard) with little or no software of its own that relies on a mainframe or another computer (such as a PC server) for its intelligence. c) Network Adapters (NIC Card):- Network Adapters often called as Network Interface Card (NIC) is a computer circuit board or card that is installed in a computer so that it can be connected to a network. Personal computers and workstations on a local area network (LAN) typically contain a network interface card (NIC) specifically designed for the LAN transmission technology, such as Ethernet. d) Gateway:- Gateway is a device that enables communication between different network architectures. A gateway takes the data from one network architecture and repackages it and sends it to network architecture. Gateway is just like an interpreter between two network architectures. There can be a physical connection between two network architectures but need a gateway to translate network communication. For example if two groups of people can physically talk to each other but speak different languages, they need an interpreter to communicate. Q15. Write short notes on:a) Satellite: - a satellite is a specialized wireless receiver/transmitter that is launched by a rocket and placed in orbit around the earth. There are hundreds of satellites currently in operation. They are used for such diverse purposes as weather forecasting, television broadcast, amateur radio communications, Internet communications, and the Global Positioning System, (GPS). Satellite act as a relay station for communication signals. The satellite accepts data and signal transmitted from one earth station, amplifies them and then retransmits them to another earth station. b) IP Address and MAC Address: - An Internet Protocol (IP) address is a numerical label that is assigned to devices participating in a computer network that uses the Internet Protocol for communication between its nodes. Each of the computers attached in the networking are given some name (or address) by the network administrator in 32-bit digits in 4 octets (for example192.168.0.1) which is known as IP address. IP address has two parts network number and host number. Network number is used to identify the network to which the computer is connected and the host number is used to identify the particular machine connected to that network. MAC address is the serial number given by the manufacturer of the NIC (Networking interface card) each of the NIC produced throughout the world has different MAC serial number. So a computer having a particular MAC address is easily identified. It has the format FF-FF-FF-FF-FF-FF (for example-0213 | N e t w o r k i n g Compiled by K@pil Sharma 61-8C-01-02-04) c) Electronic mail (E-mail):- E-mail is an electronic message sent from one computer to another. E-mail systems allow us to send letters and files containing data of all types from our computer to any other computer with e-mail address and a modem, simply by typing the recipient’s name and pressing the send button. When we send mail from our computer, it goes to mail server of local ISP. It is forwarded to destination ISP’s mail server through some media and the receiver receives it. Advantage of E-mail a) A message can be sent anywhere in the world for the price of a local, without having to leave our desk. b) The same massage can be sent simultaneously to a group of people. c) The message will arrive in a few min and can be picked up the next time the recipient looks at their email. d) It is very easy to send a reply to an e-mail as soon as it is received using a reply button of forward it to someone else with our comments. d) Microwave systems:- Microwave systems transmit voice and data through the atmosphere as super-high-frequency radio waves. Microwave systems transmit microwaves. Microwaves are the electromagnetic waves that vibrate at 1 gigahertz per second or higher. These frequencies are used not only to operate microwave ovens but also to transmit messages between ground-based earth stations and satellite communication systems. Today we see dish or horn-shaped microwave antennas nearly everywhere on towers, buildings and hilltops. e) Infrared Transmission:- It operates by using an infrared light beam to carry the data between devices. There must be a clear line of sight between the transmitting and receiving devices, anything that blocks the infrared signals prevents communication. These systems must generate very strong signals because weak transmission signals are susceptible to interference from light sources Q.16 Differentiate between Distributed system and Centralized system of networking. Ans:- Difference between Distributed System and Centralized System Centralized System 1. In a Centralized system, the CPU, the storage devices, software and the data processing staff are located in one central location 2. Processing and storage take place at the central location. 3. Centralized system is expensive than distributed system. 4. Maintenance cost is high in Centralized system in comparison to distributed system 5. Response time is maximum in case of Centralized system. 6. It is very hard to extend Centralized system because a very expensive mainframe computer is needed for that which can lead to extra burden to organization. Distributed System 1. In a Distributed system, the CPU, storage devices and even some computer professionals are distributed to separate location through the organization. 2. Processing and storage take place at several locations. 3. Distributed system is expensive than Centralized system. 4. Maintenance cost is less in distributed system in comparison to centralized system. 5. Response time is minimum in case of distributed system. 6. Distributed system can be extended easily because a less expensive microcomputer is needed for that. 14 | N e t w o r k i n g Compiled by K@pil Sharma 15 | N e t w o r k i n g Compiled by K@pil Sharma