Summary of LAN hardware for the network design: LAN network To connect two computers To connect two computers over long distances To connect more than two computers To connect more than two computers in small network which can filter traffic. For large network . LAN hardware NIC Repeater Description Problem Network interface card for connecting two computers on LAN Extends the distance limitations of Ethernet cable by boosting the signal Cannot connect over long distances Hub hub is a multiport device for building starconfigured topologies with twisted-pair cable Bridge Provides repeater functions along with selective filtering of traffic to reduce congestion and contention Switches Basically a multiport bridge that segments a network into many smaller collision domains while maintaining the broadcast characteristics. Greatly improves the performance of LANs Only two computers can be connected if you want to connect more computers then it is a problem It cannot filter traffic It is confined to small network maximum nodes can be 30 Bridges have limited ports It introduce latency for large networks. Here network traffic travels to all LAN segments without knowing the exact IP address of the destination segment. It controls collision domains but not broadcast domains. For Router internetworks ( connecting more than one LAN network with high speed and flexibility) Routers make forwarding decisions based on network layer addresses. …………………………. In addition to controlling collision domains, routers control broadcast domains Switching: Circuit-switching networks In this technique, first the complete physical connection between two computers is established and then data are transmitted from the source computer to the destination computer Dedicated paths are used between source and destination. no queuing Example: telephone systems. Message Switching In this technique, the source computer sends data or the message to the switching office first, which stores the data in its buffer. It then looks for a free link to another switching office and then sends the data to this office. This process is continued until the data are delivered to the destination computers. Owing to its working principle, it is also known as store and forward. That is, store first (in switching office), forward later, one jump at a time. The network receives the entire messages, stores them in a Secondary storage and transmit them. It provides long term storage even after the message has been delivered. Example: Hop-by-hop Telex forwarding and UUCP are examples of message switching systems. E-mail is another example of a message switching system Packet Switching . In packet switching no fixed path is created between devices that communicate; it is broken into packets, each of which may take a separate path from sender to recipient. The message is divided into a number of slices called Packets of certain fixed size. Each packet has its destination address. Queuing involved Routing is needed errors involved Example: when you connect to the Internet using a dial-up modem. Network topologies: In Computer Networking “topology” refers to the layout or design of the connected devices. Topology can be classified into two : 1-D (bus) 2-D (tree, stars, rings, mesh, etc.) 13.8.1 Point to Point Topology Point to Point topologies are simplest and most straightforward. Point-to-point (PTP) topology connects two nodes directly together You can think of as a chain of devices and another name for this type of connectivity is called daisy chaining. Most computers can 'daisy chain' a series of serial devices from one of its serial ports. Networks of routers are often configured as point-to-point topologies. The following examples are pure point to point links: Two computers communicating via modems. A mainframe terminal communicating with a front end processor. A workstation communicating along a parallel cable to a printer. Advantage: It is easy to set up Installation Cost is low Fault identification is easy Allows flexibility in communication hardware, packet formats, etc. Provides security and privacy because communication channel is not shared Disadvantages Number of wires grows as square of number of computers Connections between buildings can be prohibitive Adding a new computer requires N - 1 new connections 13.8.2 Linear Bus A linear bus topology consists of a main run of cable with a terminator at each end . All nodes (file server, workstations, and peripherals) are connected to the linear cable. Access and control of bus networks are typically maintained by a method called contention, whereby if a line is unused, a terminal or device can transmit its message at will, but if two or more terminals initiate messages simultaneously, they must stop and transmit again at different intervals Fig. 1. Linear Bus topology Advantages of a Linear Bus Topology The advantage of the Bus network is that if one computer fails in the network the others are still not affected and they continue to work. Bus network is very simple and easy to set up. If there is an urgent need to set up a network and perhaps be used on a short term basis then the Bus network is the best possibility. Bus networks use the least amount of cable to set up making it cost effective. Disadvantages of a Linear Bus Topology Entire network shuts down if there is a break in the main cable. Terminators are required at both ends of the backbone cable. Difficult to identify the problem if the entire network shuts down. Not meant to be used as a stand-alone solution in a large building. 13.8.3 Star Topology A star topology consists of a central connection hub to which devices are connected with UTP (Unshielded Twisted Pair) Ethernet. Contrary to the bus topology, a star topology utilizes a point-to-point connection to connect each node to the central hub. The hub acts as a signal booster as well, and all the data traffic that transverses the network passes through this hub. The entire network is dependent upon the central hub in a star topology, so if the entire network is not working, it means that there is problem in the hub. This makes it easy to troubleshoot the network because of the only one point for error correction. As all the computers in star topology are independent to each other and dependent only on the central hub, network failure or other network problems are less likely to happen. The privacy of each of the computers is also maintained in this topology. In star topology, new devices and nodes can be easily added and by just extending a cable from the hub. Advantages of star topology: A star topology is simple in functionality and easy to manage. If a problem occurs in the network, it can be easily isolated and cleared. It is very easy to expand the star topology because of its simple format. Disadvantages of star topology: The entire network of the star topology is completely dependent on the hub. If the hub fails, the whole network fails. Network connection may slow down when the number of nodes increases or the cable lengthens. Star topology needs more cable length than other topologies. It is more expensive compared to bus topology. Star Topology 13.8.4 Ring Topology A ring topology consists of network of computers in which each node connects to exactly two other nodes. This forms a single continuous path for the flow of signals through each nodes of the network. Data travels from node to node, with each node along the way handling every packet. Each of the nodes in the ring topology are connected to each other through only one pathway, so the failure of only one link disrupts the whole network. To overcome this fallacy, the data in a ring topology is transmitted both clockwise and counter clockwise, so that if there is single break of the cable, all the nodes on both sides can be reached. Ring Topology Advantages of Ring Topology It is an orderly network in which all the nodes in the network have equal access to all the resources. Its performance is far better compared to star topology under heavy network. It does not need network servers to manage the connections. Disadvantages of Ring Topology If one of the workstations fails to operate, it may lead to the unusability of the whole network. Addition and removal of devices in the network can affect the entire network. Ring network is slower than the Ethernet network. 13.8.5 Tree topology A tree topology consists of bus and star topologies framed in a common network. The tree like structure of this network allows the colleges, schools, universities and other institutions to maintain their own network as a branch of a bigger network through which they can maximize their area of access to the network. This type of network topology is most suitable for such networks which are widely spread and divided into many branches. On tree topology the hubs of each smaller topologies are connected to the central hub that controls the entire network. However, some nodes can be directly connected to the central hub. Tree topology Advantages of tree topology It is possible to form a point to point connection with tree topology. All the computers can access other computers which are in other larger and immediate networks. Tree topology is best suited for branched out networks. Disadvantages of tree topology In this topology, the length of the network depends on the type of cable utilized to form the network. The entire tree topology would fail if the central trunk fails as it forms the backbone of the network. The tree topology is comparatively more complex than the bus and star topologies. If it gets bigger, it would be difficult to configure and manage it. It is expensive as more hubs and cables are required to install the network. 13.8.6 Mesh Topology The mesh topology incorporates a unique network design in which each computer on the network connects to every other, creating a point-to-point connection between every device on the network. The purpose of the mesh design is to provide a high level of redundancy. If one network cable fails, the data always has an alternative path to get to its destination An example of a Mesh Network is the Mobile Adhoc Network or MANet. Mesh topology can also be called as fully connected network as each node is connected to other node via cables in the network. Mesh Topology Advantages of Mesh topology As it has multiple routes between the source and the destination, if one route fails, there would be a number of other routes through which data transfer can take place. Traffic problem is minimized in this topology. Troubleshooting is easier compared to other networks like star and ring. Heavy load of data transfer has little impact on the performance of this topology. This network can be easily expanded without affecting the existing users. Disadvantages of Mesh topology It is expensive as it requires more cable than other topologies. Installation is difficult and complicated. 13.8.7 Hybrid Topology A hybrid topology, as the name suggests, is an interconnection of two or more networks. The component networks may be ring, star, tree, mesh or any other, depending upon the requirement of a firm or institution. For example, in an institution, if there is a ring topology in one department, bus topology in the next department, star topology in another department and so on, all the departments can connect to each other through a bus topology that connects the ring, bus and star topologies of each department to each other. Such a topology that consists of more than one type of individual topologies is known as hybrid topology. Hybrid topology Advantages of hybrid topology Hybrid topologies are reliable and have increased fault tolerance than other topologies. A hybrid topology can efficiently diagnose and isolate faults. Hybrid topologies are flexible and are designed to suit a variety of network environments and needs. A hybrid topology is able to tap into the strengths of other topologies and ignore their weaknesses. This results in a complex network that is more efficient and effective than individual topologies Disadvantages of hybrid topology Comparatively expensive than other topologies. Freeware Software which is distributed free by the author. freeware is proprietary software made available free of charge. It is the programming that is offered at no cost and is a common class of small applications available for downloading and use in most operating systems. Although it is available for free, the author retains the copyright, which means that it cannot be altered or sold. Free software is distinct from freeware; Free software may be packaged and distributed for a fee; the "free" refers to the ability to reuse it, modified or unmodified, as part of another software package. As part of the ability to modify, users of free software may also have access to and study the source code. The term 'free' does not mean free of charge. It refers to a user's freedom to run, copy, distribute, study, change and improve the software without the payment of a royalty or obtaining express permission. Everyone is free to sell copies of free software, to use it commercially, and to charge for distribution and modifications. Because anyone who has a copy may distribute the software at no cost, the software generally is available at no cost. Free software business models are usually based on adding value such as support, training, customization, integration, or certification like open source softwares are free softwares. 13.13.4 Shareware Software distributed freely, but with certain conditions applying to it. It is distributed free on a trial basis with the understanding that the user may need or want to pay for it later. Either the software is released on a trial basis only, and must be registered after a certain period of time, or in other cases no support can be offered with the software without registering it. In some cases direct payment to the author is required. Some software developers offer a shareware version of their program with a built-in expiration date (after 30 days, the user can no longer get access to the program). Other shareware (sometimes called liteware) is offered with certain capabilities disabled as an enticement to buy the complete version of the program. 13.13.5 FLOSS/FOSS FLOSS is common and combined term of Free/Libre/Open Source Software. Actually this term for free software and open source where free means it was cost free software Libre means liberty : to make changes Open source means code or patch files are available openly to fix bugs, and for further development. 13.13.6 GNU GNU is a computer operating system composed entirely of free software. Its name is a recursive acronym for GNU's Not Unix, which was chosen because its design is Unix like, but differs from Unix by being free software and by not containing any Unix code.GNU was founded by Richard Stallman and was the original focus of the Free Software Foundation GNU Public License (GPL) Most new open source software around these days uses this license, as does Moodle. In a nutshell, the GPL says: Anyone can download, use, modify and distribute this software All modified versions must ALSO be under the GPL license All copyright notices must be maintained, and all modifications must be clearly marked All distributions must include the full source code There is no warranty on the software 13.13.7 FSF The Free Software Foundation (FSF)was established in 1985 to promote the development of free software with full rights to use, study, copy, modify, and redistribute computer programs. particularly the GNU operating system, used widely in its GNU/Linux variant. Its a non profit, non political and international organization provides standards for developing free softwares. 13.13.8 OSI Open Source Initiative (OSI) is a non-profit corporation dedicated to managing and promoting the Open Source Definition for the good of the community, specifically through the OSI Certified Open Source Software certification mark and program. The basic idea behind open source is to read, redistribute, and modify the source code for a piece of software, the software evolves. People improve it, people adapt it, people fix bugs. We in the open source community have learned that this rapid evolutionary process produces better software than the traditional closed model, in which only a very few programmers can see the source and everybody else must blindly use an opaque block of bits. 13.13.9 Linux : Examples of Open source software Like Windows and Unix ,Linux is also an operating system developed Linus Torvalds but this operating system was freely distributed as Open Source i.e code is freely available to read ,edit and fix bugs. Apart from the fact that it's freely distributed, Linux's functionality, adaptability and robustness, has made it the main alternative for proprietary Unix and Microsoft operating systems. IBM, HewlettPackard atre the top companies which has embraced Linux and support its ongoing development. It was primarily adapted as a server platform. Mozilla An open-source XML/HTML browser have with dynamic image and table resizing, quick insert and delete of table cells, improved CSS support. It is a free web browser descended from the Mozilla Application Suite, managed by the Mozilla Corporation. It is the second-most popular browser currently worldwide, after Internet Explorer. Firefox includes tabbed browsing, a spell checker, incremental find, live bookmarking, a download manager, and an integrated search system that uses the user's desired search engine. Functions can be added through around 2,000 add-ons created by third-party developers, the most popular of which include NoScript (script blocker), Stumble Upon (website discovery), Tab Mix Plus (adds many customizable options to tabs), FoxyTunes (controls music players), Adblock Plus (ad blocker), DownThemAll! (download functions) and Web Developer (web tools). Apache HTTP Server The Apache HTTP Server is to develop and maintain an open-source web server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards.Apache has been the most popular web server on the Internet since April 1996. Uses of apache are: Serves both static content and dynamic Web pages on the World Wide Web. Apache provides environment to run web applications like java based and XML MYSQL MySQL is the world's most popular open source database software. It is a structured query language like SQL used for managing database systems.Many of the world's largest and fastest-growing organizations use MySQL to save time and money powering their high-volume Web sites, business-critical systems and packaged software -- including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia. POSTGRES PostgreSQL is an object-relational database management system (ORDBMS). It is released under as a free software. And like other open-source programs, PostgreSQL is not controlled by any single company, but relies on a global community of developers and companies to develop it. PANGO Pango is a free and open source computing library for rendering internationalized texts in high quality. Pango has been integrated into most Linux distributions. It most notably provides the rendering for text in the Mozilla Firefox web browser Different font backends can be used, allowing cross-platform support. PHP: Hypertext Pre Processor (PHP) is a server side technology introduced to design dynamic and interactive web pages. PHP is the widely-used, free, and efficient alternative to competitors such as Microsoft's ASP. PHP is perfectly suited for Web development and can be embedded directly into the HTML code. The PHP syntax is very similar to Perl and C. PHP is often used together with Apache (web server) on various operating systems. It is based on open source technology under PHP license to develop graphic and web applications. It was written as a set of Common Gateway Interface (CGI) binaries in the C programming language by the Danish/Greenlandic programmer Rasmus Lerdorf in 1994, to replace a small set of Perl scripts he had been using to maintain his personal homepage. PYTHON Python is a multi-paradigm programming language (functional, object oriented and imperative) which has a fully dynamic type system and uses automatic memory management; it is thus similar to Perl, Ruby, Scheme, and Tcl. The language has an open, community-based development model managed by the nonprofit Python Software Foundation. TOMCAT Tomcat is an application server developed at the Apache Software Foundation (ASF). To run java applications on web server It has its own internal HTTP server and implements the Java Servlet and the JavaServer Pages (JSP) specifications from Sun Microsystems, providing an environment for Java code to run in cooperation with a web server. OPENOFFICE The OpenOffice.org project aims "To create, as a community, the leading international office suite that will run on all major platforms and provide access to all functionality and data through open-component based APIs and an XML-based file format like Microsoft Office”. It is free and open source office suit, including Writer : A word Processor Calc : Spread sheet software similar to Micrpsofyt Excel Quick Review: Definitions: Network: Internet A network is an interconnected collection of autonomous computers It is the network of networks that transmit data by packet switching using a standardised Internet Protocol (IP) and many other protocols. Interspace Interspace is the networked virtual reality system on the Internet. Bandwidth: The range of transmission frequencies that can be carried on a communication line is referred to as the bandwidth of the line device, which converts digital signal into analog, and the reverse, is known as modem. Modem: Modulation: The technique by which a digital signal is converted to analogform is known as modulation. Topology refers to the layout or design of the connected devices Protocol A protocol is a set of rules that governs the communications between computers on a network. is a protocol for remote computing on the Internet. It allows a computer to act as a remote terminal on another machine, anywhere on the Internet Wireless local loop (WLL) technology simply means that the subscriber is connected to the nearest exchange through a radio link instead of through these copper wires. is the text communication service component of phone, web or mobile communication systems, using standardized communications protocols that allow the exchange of short text messages between fixed line or mobile phone devices Telnet Wireless local loop Short Message Service (SMS) Voice Mail : The electronic transmission of voice messages over the Internet. The messages are stored on a computer until the recipient accesses and listens to them Email, also sometimes written as e-mail, is simply the shortened form of electronic mail, a protocol for receiving, sending, and storing electronic messages chatting: On line talk in the form of text is known is chatting. video conferencing: A videoconferencing or video conference (also known as a videoteleconference) is a set of interactive telecommunication technologies which allow two or more locations to interact via two-way video and audio transmissions simultaneously Viruses : Cookies Firewall Cyber Law Computer programs written by devious programmers and designed to replicate themselves and infect computers when triggered by a specific event. are small bits of information that get stored on your hard drive (persistent cookies) or in memory (non-persistent cookies) of your computer. They are placed on your computer by the websites you are visiting. stands between the company’s network and a public network, effectively shielding your computers from malicious hacker activity, and controlling the flow of data is the law governing cyber space.It is a very wide term and includes computers, networks, software, data storage devices (such as hard disks, USB disks etc), the Internet, websites, emails and even electronic devices such as cell phones, ATM machines etc. World Wide Web It is a repository of information containing a set of programs , standards and protocols that allows the multimedia and hypertext files to be created , displayed and linked on the internet. W3C The organization responsible for managing standards for the WWW. Browser A browser is an application which provides a window to the Web. For example : Internet explorer ,Mozilla Firefox. Web Page A document formatted for distribution over the web. Most often a web document is formatted in a markup language like HTML or XML. Web Document A document formatted for distribution over the web. Most often a web document is formatted in a markup language like HTML or XML. Website A collection of related web pages belonging to a company or an individual. URL (Uniform A URL refers to an address in the special format on the internet. Resource Locator) It is a standard way to address web documents (pages) on the Internet (like: http://www.microsoft.com/). URL are of two types: absolute URL ,relative URL Web Host A web server that "hosts" web services like providing web site space to companies or individuals. Web Hosting The action of providing web host services. Domain name A domain name is a unique name for a web site, like ntchosting.com .Domain names must be registered An Internet Protocol address (IP address) is a numerical label that is assigned to any device participating in a computer network that uses the Internet Protocol for communication between its nodes In 1969 by the development of first network called ARPANET , led to the development of internet . ARPANET ( Advanced Research Projects Agency NETwork) was the project for connecting computers at different Universities and U.S. defense. network architecture: peer to peer network ,client server networking. peer to peer networks : All computers are of equal importance. Software and data are stored on each computer. client/server network: Software and data are held on a file server and may be used by other computers on the network. Security is controlled centrally. Local-Area Networks (LANs) The computers are geographically close together (that is, in the same building). Wide-Area Networks (WANs) The computers are farther apart and are connected by telephone lines or radio waves. MAN - Metropolitan Area Network : It covers large span of physical area than LAN but smaller than WAN, such as a city. Personal area network (PAN) is a computer network designed for communication between computer devices(including telephones and personal digital assistants close to one person) The Internet, or simply the Net, is the information superhighway. The end devices that wish to communicate with each other are called stations. The switching devices are called nodes there are three types of switching: Circuit Switching ,Packet Switching and Message Switching In circuit switching, a circuit is first established and then used to carry all data between devices. example: telephone system In packet switching no fixed path is created between devices that communicate; it is broken into packets, each of which may take a separate path from sender to recipient. example : connecting internet using dial up modem. message switching: In this technique, the source computer sends data or the message to the switching office first, which stores the data in its buffer.example : email Frequency is measured in hertz(Hz). 1 MHz = 1million Hz Baud: It describes the rate of change of the signal on the line i.e.how many times (per second) the signal changes its pattern. Data Transfer rate : A data transfer rate is the amount of digital data that is moved from one place to another in a given time usually in seconds. In general, the greater the bandwidth of a given path ,higher the transfer rate. Bit rate : A data transfer rate expressed in bits per second . Kbps= 1000 bits per second Mbps=1000 kbps=1,000,000bps Gbps=1000 mbps Tbps=1000gbps Twisted pair cable : two type shielded and unshielded Twisted Pair(UTP) o Advantages: Reasonable cost ,High Speed ,Easy to add additional network devices ,Supports large number of network devices, Easy to install, because of physical flexibility, low weight & easy connectivity. o Disadvantages of twisted pair: Signals loose energy due to attenuation, so repeaters are required, Bandwidth is low, High attenuation (signal loss) limits individual runs to 100 meters Cat-5Short for Category 5, network cabling that consists of four twisted pairs of copper wire terminated by RJ45 connectors. Cat-5 cabling supports frequencies up to 100 MHz and speeds up to 1000 Mbps. It can be used for ATM, token ring, 1000Base-T, 100BaseT, and 10Base-T networking. Computers hooked up to LAN s are connected using Cat-5 cables, so if you're on a LAN, most likely the cable running out of the back of your PC is Category 5. Coaxial cable : Coaxial cable, in its simplest form, is a single wire wrapped in a foam insulation,surrounded by a braided metal shield, then covered in a plastic jacket o advantages: greater bandwidth ,greater channel capacity and low error rates. o disadvantage: Problems with the deployment architecture, Bidirectional upgrade required, Great noise, High installation costs, Susceptible to damage from lightning strikes. Infrared ,radiowave ,microwave and satellite are wireless technology for communication. NIC known as network interface card : network device required to access the network . Hub: a network device to connect more than two computer on network .it is preferred for small network where number of nodes are less than 30. Switch: Basically a multiport bridge that segments a network into many smaller collision domains while maintaining the broadcast characteristics. Greatly improves the performance of LANs A Router is responsible for connecting two physical and logically different networks. A repeater connects two segments of your network cable. A bridge is a product that connects a local area network (LAN) to another local area network that uses the same protocol (for example, Ethernet or Token Ring). Topology can be classified into two : o 1-D (bus) o 2-D (tree, stars, rings, mesh, etc.) Protocol can be classified into two groups : network and communication protocol. Network protocol : Ethernet ,FDDI,ATM, Local talk ,token ring. Communication protocols : HTTP,FTP,TCP/IP,SMTP,SLIP,PPP,POP3 SMTP and POP3 are email protocols. Wireless and mobile communication technology: o FDMA o GSM o TDMA o CDMA o 3G o 4G EDGE and Wimax are 3G technologies . CDMA(Code Division Multiple Access) : It is a digital cellular technology which uses spread spectrum techniques means the data is sent in small pieces over a number of discrete frequencies available for use in the specified range .All the users will transmit in the same wide spectrum. Each user‘s signal is spread over the entire bandwidth by a unique spreading code . At the receiver’s end same unique code is used to recover the signal. CDMA has been used in many military applications, such as: Anti-jamming (because of the spread signal, it is difficult to jam or interfere with a CDMA signal). Ranging (measuring the distance of the transmission to know when it will be received). Secure communications (the spread spectrum signal is very hard to detect). Time Division Multiplexing:TDMA works by dividing a radio frequency into time slots and then allocating slots to multiple calls . In this way ,a single frequency an support multiple, simultaneous data channels Frequency Division Multiple Access (FDMA): allocates users with different carrier frequencies of the radio spectrum.The radio spectrum is available to the users where communications signals are pass through that spectrum. Multiple access enables allows more than one communications signal to pass within a particular band Enhanced Data rates for GSM Evolution (EDGE) or Enhanced GPRS(EGPRS), It is an Advanced technology over GSM which is widely used in digital mobile phone technology which allows increased data transmission rate .This technology was developed in North America and used extensively in packet switched applications such as Internet Connection, VDO services ,multimedia services . Protocols for chat and video conferencing : VoIP. Network security : protection from threats to network. In 1981 - First virus Elk Cloner was transmitted by floppy disk. Voice over Internet Protocol (VoIP), is a technology that allows you to make voice calls using a broadband Internet connection instead of a regular (or analog) phone line. Threats to network security are viruses ,worms ,Trojan horse In a computer, a worm is a self-replicating virus that does not alter files but resides in active memory and duplicates itself. Worms use parts of an operating system that are automatic and usually invisible to the user. Spam is flooding the Internet with many copies of the same message, in an attempt to force the message on people who would not otherwise choose to receive it. There are various ways to protect from network threats some are : o Authentication Definition o Authorization Definition o Identity Management o Firewall o Identification methods o Antiviruses The Information Technology Act 2000 (ITA-2000)(IT ACT) is an Act of the Indian Parliament for cyber related issues. hackers are intelligent people who breaks into a system for gaining knowledge ,freely share what they have discovered, and never, ever intentionally damage data. crackers are “ evil hackers “who breaks into or otherwise violates the system integrity of remote machines, with malicious intent. HTML :Hypertext markup language for designing web sites. XML( EXtensible Markup Language) is a standard, simple, self-describing way of encoding both text and data so that content can be processed with relatively little human intervention and exchanged across diverse hardware, operating systems, and applications server side scripting languages:The code which is executed at server end is called server side script and computer languages used to write this script are called server side scripting languages Examples of server side scripting languages are CGI, ASP and PHP,JSP Client side scripting:The response or output of web server is send to requesting client. This response consists of HTML and some other script. The HTML is rendered by browser. Browser also executes the script received from server. This script or small program embedded in HTML is called client side script and languages used to write this script are client side scripting languages .Forex: JavaScript and VB Script. The term ‘Web 2.0’ refers to the idea of the “New Internet”, or the second wave of the World Wide Web. Web 2.0 is not a specific application or technology, but explains two paradigm shifts within Information Technology, ‘user-generated content’ and ‘thin client computing’. Major difference between bridge ,router and gateway is bridges are used to connect same network and having same network protocols while router is used to connect same LAN network with different set of protocols while gateway is used to connect different networks. To connect very high range of network use satellite communication where range of signals is very high. Thick Coaxial cables support up to 500ms for greater than that range use optical fibers for better .data transmission. Switch manages the data required for larger network approximately 50 and above . High level connectivity could be provided by radio transmission using satellite channels . Wireless networking known as WLL speed comes in 54mbps,108mbps. HTML is used for designing web pages has predefined tags to be used while in XML you can define your own tags. A newsgroup is online community bulletin board where users can post messages , respond to posted messages or just read them. ARCHIE is a software tool that help you search for the files stored on FTP server. Cyber law means a wide variety of political and legal issues related to the Internet and other communications technology, including intellectual property, privacy, freedom of expression, and jurisdiction. Important Definitions : 1. DHTML -- (Dynamic Hypertext Markup Language) : DHTML refers to web pages that use a combination of HTML, JavaScript, and CSS to create features such as letting the user drag items around on the web page, some simple kinds of animation, and many more. 2. Extranet : An intranet that is accessible to computers that are not physically part of a company’s' own private network, but that is not accessible to the general public, for example to allow vendors and business partners to access a company web site. Often an intranet will make use of a Virtual Private Network. (VPN.) 3. Fire Wall : A combination of hardware and software that separates a Network into two or more parts for security purposes. 4. FTP -- (File Transfer Protocol) : A very common method of moving files between two Internet sites. FTP is a way to login to another Internet site for the purposes of retrieving and/or sending files. There are many Internet sites that have established publicly accessible repositories of material that can be obtained using FTP, by logging in using the account name "anonymous", thus these sites are called "anonymous ftp servers". 5. Gateway : The technical meaning is a hardware or software set-up that translates between two dissimilar protocols, for example America Online has a gateway that translates between its internal, proprietary e-mail format and Internet e-mail format. Another, sloppier meaning of gateway is to describe any mechanism for providing access to another system, e.g. AOL might be called a gateway to the Internet. 6. Email -- (Electronic Mail) : Messages, usually text, sent from one person to another via computer. E-mail can also be sent automatically to a large number of addresses. 7. GIF -- (Graphic Interchange Format) : A common format for image files, especially suitable for images containing large areas of the same color. GIF format files of simple images are often smaller than the same file would be if stored in JPEG format, but GIF format does not store photographic images as well as JPEG. 8. Gopher : Invented at the University of Minnesota in 1993 just before the Web, gopher was a widely successful method of making menus of material available over the Internet. Gopher was designed to be much easier to use than FTP, while still using a text-only interface. 9. Hypertext : Generally, any text that contains links to other documents – words or phrases in the document that can be chosen by a reader and which cause another document to be retrieved and displayed. 10. Internet (Upper case I) : The vast collection of inter-connected networks that are connected using the TCP/IP protocols and that evolved from the ARPANET of the late 60's and early 70's. The Internet connects tens of thousands of independent networks into a vast global internet and is probably the largest Wide Area Network in the world. 11. Intranet : A private network inside a company or organization that uses the same kinds of software that you would find on the public Internet, but that is only for internal use. Compare with extranet. 12. IP Number -- (Internet Protocol Number) :Sometimes called a dotted quad. A unique number consisting of 4 parts separated by dots, e.g. 165.113.245.2. Every machine that is on the Internet has a unique IP number - if a machine does not have an IP number, it is not really on the Internet. Many machines (especially servers) also have one or more Domain Names that are easier for people to remember. 13. ISDN -- (Integrated Services Digital Network) : Basically a way to move more data over existing regular phone lines. ISDN is available to much of the USA and in most markets it is priced very comparably to standard analog phone circuits. It can provide speeds of roughly 128,000 bits-per-second over regular phone lines. In practice, most people will be limited to 56,000or 64,000 bits-per second. Unlike DSL, ISDN can be used to connect to many different locations, one at a time, just like a regular telephone call, as long the other location also has ISDN. 14. ISP -- (Internet Service Provider) : An institution that provides access to the Internet in some form, usually for money. 15. JPEG -- (Joint Photographic Experts Group) : JPEG is most commonly mentioned as a format for image files. JPEG format is preferred to the GIF format for photographic images as opposed to line art or simple logo art. 16. Leased Line : Refers to line such as a telephone line or fiber-optic cable that is rented for exclusive 24-hour, 7-days-a-week use from your location to another location. The highest speed data connections require a leased line. 17. Modem -- (Modulator, Demodulator) : A device that connects a computer to a phone line. A telephone for a computer. A modem allows a computer to talk to other computers through the phone system by converting digital signals to analog and vice versa. Basically, modems do for computers , what a telephone does for humans. Modem are of two types: Internal modem : are the modem that are fixed within the system. External modem : are the modems that are connected externally to a computer as other peripheral devices are connected. 18. Mosaic : The first WWW browser that was available for the Macintosh, Windows, and UNIX all with the same interface. Mosaic really started the popularity of the Web. The source-code to Mosaic was licensed by several companies and used to create many other web browsers. 19. PDF -- (Portable Document Format) : A file format designed to enable printing and viewing of documents with all their formatting (typefaces, images, layout, etc.) appearing the same regardless of what operating system is used, so a PDF document should look the same on Windows, Macintosh, Linux, OS/ 2, etc. The PDF format is based on the widely used Postscript document description language. Both PDF and Postscript were developed by the Adobe Corporation. 20. OSS : Open source software. 21. OSI: Open Source Initiative (OSI) is a non-profit corporation dedicated to managing and promoting the Open Source Definition. 22. Berkeley Source Distribution (BSD):one of the license for open source software 23. Apache – open source web server software . 24. Mozilla is open source web browser. 25. Linux is an open source operating system. 26. PHP is an open source web scripting language 27. Tomcat is the web server supports java applications to run. 28. Python is an open source programming language like Perl etc. 29. MySQL is an open source database language. FAMILY OF PROTOCOLS 30. SMTP - Simple Mail Transfer Protocol : The SMTP protocol is used for the transmission of e-mails. 31. MIME - Multi-purpose Internet Mail Extensions : The MIME protocol lets SMTP transmit multimedia files including voice, audio, and binary data across TCP/IP networks. 32. IMAP - Internet Message Access Protocol : The IMAP protocol is used for storing and retrieving e-mails. 33. POP - Post Office Protocol : The POP protocol is used for downloading emails from an e-mail server to a personal computer. 34. FTP - File Transfer Protocol : The FTP protocol takes care of the transmission of files between computers. 35. NTP - Network Time Protocol : The NTP protocol is used for synchronizing the time (the clock) between computers. 36. SNMP - Simple Network Management Protocol : The SNMP protocol is used for the administration of computer networks. 37. ICMP - Internet Control Message Protocol : The ICMP protocol takes care of error handling in the network. 38. ARP - Address Resolution Protocol : The ARP protocol is used by IP to find the hardware address of a computer network card based on the IP address. 39. RARP - Reverse Address Resolution Protocol : The RARP protocol is used by IP to find the IP address based on the hardware address of a computer network card. 40. PPTP - Point to Point Tunneling Protocol : The PPTP protocol is used for setting up a connection (tunnel) between private networks. 41. SMTP - Simple Mail Transfer Protocol : The SMTP protocol is used for the transmission of e-mails. SMTP takes care of sending your email to another computer. Normally your email is sent to an email server (SMTP server), and then to another server or servers, and finally to its destination. SMTP can only transmit pure text. 42. POP - Post Office Protocol : The POP protocol is used by email programs (like Microsoft Outlook) to retrieve emails from an email server. If your email program uses POP, all your emails are downloaded to your email program (also called email client), each time it connects to your email server. 43. IMAP - Internet Message Access Protocol “ The IMAP protocol is used by email programs (like Microsoft Outlook) just like the POP protocol. The main difference between the IMAP protocol and the POP protocol is that the IMAP protocol will not automatically download all your emails each time your email program connects to your email server. Short Questions 1. What is networking? Ans Networking is the term used to describe connectivity between the systems with or without Cables or satellites. 2. What is website? Ans It is the collection of web pages used to link text or images with each other. Ex www.yahoo.com 3. Define the term topology. Ans It is the framework or arrangement of systems on network ex: ring ,star, bus etc 4. What are the two types of topology. Ans Star Topology Bus Topology 5. What is LAN? Ans LAN stands for Local Area Network. It is the connectivity of systems within the local organization covers around 100 ms area 6. What do you understand by protocol. Ans A set of rules or instructions govern communication on computer network are called protocols. 7. EDGE stands for… ………… Ans Enhanced Data rates for GSM Evolution 8. Which protocol is used for sending and receiving emails respectively? Ans SMTP used for sending emails and POP for receiving emails. 9. How TCP/IP works. Ans TCP/IP(Transmission Control Protocol /Internet Protocol) A collection of Internet communication protocols between two computers. The TCP protocol is responsible for an error free connection between two computers, while the IP protocol is responsible for the data packets sent over the network. TCP splits message into fixed size datagram which are then tagged with destination address and sent to receiver where the datagram are merged to form proper message. IP is the protocol controlling addressing on the network . As and when any computer gets connected to the network, it must owe a unique address with which it will be identified by other systems. IP protocol assigns address to the different system on the network. 10. FDDI is an example of ________ Ans token ring network 11. Token ring is based on ___________ Ans ethernet 12. MODEM is used for _____________ and _________________ Ans modulation demodulation 13. What is the significance of HTTP and FTP . Ans HTTP (Hyper Text Markup Protocol ) : This protocol is responsible for accessing hypertext documents on world wide web. Set of rules governing exchange of hypertext between two computers is commonly known as HTTP. It consists of 2 distinct items a set of requests from browsers to servers a set of responses from server to browsers FTP (File transfer protocol ) :It defines a method for transferring large files from one computer to another over a network. Set of rules, which enables files to be uploaded or downloaded on a network is known as FTP. It is very effective way to get a geographically dispersed group to co-ordinate on a project and share information on the internet. It serves as client server process. Downloading : refers to transfer of files from FTP server to your computer. Uploading : refers to transfer of files from your computer to FTP servers. Only authorized users can upload a file .Most common use of FTP is to download and upload a file 14. What is XML?. Ans XML (eXtensible Markup Language) : It is a meta language for describing the markup languages A simplified version of SGML especially designed for web documents, developed by the W3C.. There is no predefined tag set. It will be defined by either the application that process them or by style sheets. 15. What do you understand by the term e-commerce. Ans Ecommerce stands for electronic commerce i.e buying and selling of products or services over electronic systems such as the Internet and other computer networks. 16. Explain the types of networks. Ans Types of networks: LAN-Local area network Privately owned networks Used to connect PC’s and workstation within a building or computers in an area upto 100mts of range. Speed of data transmission is not very high MAN-Metropolitan Area Network Bigger version of LAN May be private or public Covers a group of nearby offices or city WAN-Wide area network Spans a large geographical area like countries Public Network Speed very high 17. What is search engine .Name any four search engines. Ans A search engine is program or an information retrieval system designed to help find information stored on a computer system. Search engines help to minimize the time required to find information and the amount of information on any topic . Ex: www. google.com, www.yahoo.com, www.khoj.com, www.altavista.com 18. What is web browser .Name any two commonly used web browsers.. Ans A web browser is a program which is used to visit web pages . The two most well known are Netscape Navigator and Microsoft Internet Explorer which are used by vast majority .Some other browsers are MOSAIC , LYNX , OPERA etc. 19. What is the syntax of URL?. Ans A Uniform Resource Locator refers to an address in the special format on the internet .It is a standard way to address web documents (pages) on the Internet (like: http://www.microsoft.com/) 20. What is bandwidth and baud rate. Ans The range of transmission frequencies that can be carried on a communication line is referred to as the bandwidth of the line .In digital systems bandwidth is data speed in bits per second (bps). Baud rate: It describes the rate of change of the signal on the line i.e.how many times (per second) the signal changes its pattern. The baud rate is the measure of the modulation rate ,the number of discrete signaling events per second. In low speed modem the baud is same as bit rate. 21. Explain the following terms: a. Email b. Chatting c. Videoconferencing d. Domain Name System e. GSM f. Telnet g. Veronica h. Usenet i. WAIS j. Mosaic Ans a. Email : Electronic mail is the way of sending and receiving messages electronically. Major advantage is easy record maintenance, Low cost and fast delivery. b. Chatting: On line talk in the form of text is known is chatting. In chatting as you type a message on the screen which is immediately received by the recipient then the recipient can type a message in response to your message which is received by you instantly. Sites which provide this facility are http:/ chat .yahoo.com , chat.123india.com , chat.sify.com c. Videoconferencing: is a set of interactive telecommunication technology which allow two or more locations to interact via two-way video and audio transmissions simultaneously. d. Domain Name System : A domain name is a unique name for a web site, like yahoo.com .Domain names must be registered. When domain names are registered they are added to a large domain name register, and information about your site - including your internet IP address - is stored on a DNS server. e. DNS stands for Domain Name System. A DNS server is responsible for informing all other computers on the Internet about your domain name and your site address f. GSM(Global system for Mobile): It is one of the leading digital cellular system for mobile communication .The digital nature of GSM allows data, both synchronous and synchronous data, to be transported as a bearer service to or from an ISDN terminal. The data rates supported by GSM are 300 bps, 600 bps, 1200 bps, 2400 bps, and 9600 bps. The most basic teleservice supported by GSM is telephony. A unique feature of GSM compared to older analog systems is the Short Message Service (SMS). Supplementary services are provided on top of teleservices or bearer services, and include features such as international roaming, caller identification, call forwarding, call waiting, multiparty conversations, and barring of outgoing (international) calls, among others. g. Telnet : It is an internet facility that supports remote login. This facility allows users to access files and execute programs on a remote computer without being physically present at the actual site of working. h. Veronica: ‘Veronica’ actually stands for “Very Easy Rodent-Oriented Netwide Index to Computerized Archives.” It’s a program that allows you to search the files of the internet’s Gopher servers using keywords. It is a search engine system for the Gopher protocol. After entering a particular keyword for searching, Veronica displays a list of gopher menus and articles containing the keyword you searched for. The more recent versions of Veronica can also search certain Web pages, newsgroups, and FTP sites. i. Usenet : It is the public bulletin board of the internet and used as a means to share news and other information among users . It is many to many conversation. j. WAIS : Wide area information Network ) : is the facility on the internet that can search for a given item in the database which may be on the different sites on the internet . Searching can be possible by specifying the search string or a topic. k. MOSAIC : It is a graphical WWW browser created by (NCSA) National center for super Computing applications. It can display hyper text documents that include digital video , audio , graphic images and text in a variety of formats. 22. Expand the following terms: a. TCP/IP b. HTTP c. FTP e. DNS f. IP address g. SMTP i. IMAP j. SLIP k.WLL m. TDMA n. FDMA o. XML q. NFS r. CSMA/CD s. NNTP u. PSTN v. ISDN w. W3C y. MODEM Ans a) TCP/IP b) HTTP c) FTP d) URL e) DNS f) IP address g) SMTP h) POP i) IMAP j) SLIP d. URL h. POP l.CDMA p.WDM t. GSM x. WLL : Transmission Control Protocol/Internet Protocol : Hyper Text Transfer Protocol : File Transfer Protocol : Uniform Resource Locator : Domain Name System : Internet Protocol address. : Simple Mail Transfer Protocol. : Post Office Protocol. : Internet Message Access Protocol. : Serial Line Internet Protocol (SLIP) k) WLL l) CDMA m) TDMA n) FDMA o) XML p) WDM q) NFS r) CSMA/CD s) t) u) v) w) x) y) NNTP GSM PSTN ISDN W3C WLL MODEM : Wireless Local Loop : Code division multiple access (CDMA) : Time division multiple access (TDMA) : FDMA (frequency division multiple access) : Extensible Markup Language (XML) : wavelength-division multiplexing (WDM) : Network File System (NFS) : Carrier Sense Multiple Access / Collision Detection : Network News Transfer Protocol : Global system for Mobile. : Public Switched Telephone Network : Integrated Services Digital Network : World wide web Consortium : Wireless in Local Loop : Modulation Demodulation 23. What is web hosting? Ans Web hosting means storing your web site on a public server. It normally includes email services and often includes domain name registration. 24. What is WAN? Ans WAN-Wide area network Spans a large geographical area covering countries Public Network Speed very high 25. What is the significant of ARPANET in the network? Ans ARPANET ( Advance Research Projects Agency NETwork) was the project for connecting computers at different Universities and U.S. defense . Soon the engineers ,scientists ,students and researchers who were part of this system began exchanging information and messages on it .ARPANET started with a handful of computers but it expanded rapidly. 26. What do you understand by peer to peer network Ans It is also known as non dedicated server . where in small networks work station that can be doubled up as a server is known as non-dedicated server , since it is not completely dedicated to the cause of serving. It is a slower and requires more memory. The small networks using such servers are known as peer to peer network. 27. What is client server model. Ans It is a network in which a workstation (client ) can request information from a computer that can share resources (server) and fulfills request. The client/server model provides a convenient way to interconnect programs that are distributed efficiently across different locations. Computer transactions using the client/server model are very common. Advantage : Distribution of work between the client and the server . Server is available to many clients. 28. Give the usage of the following network devices. a. Hub b. Repeater c. Switch d. Bridge e. Router f. Gateway Ans a. Hub : It is a hardware device used to connect several computers together. Hubs act as junction boxes ,permitting new computers to be connected to the network as easily as plugging a power cord into an electrical socket, and provide an easy way to connect network cables .It also act as a repeater or amplifier .Hubs are sometimes also called concentrators, multistation access units or transceivers. b. Repeater: It is a simple device that amplifies all incoming signals on a communication channel and transmits them back the regenerated signal. It connects two segments of your network cable. It retimes and regenerates the signals to proper amplitudes and sends them to the other segments. c. Switches : A switch is a device that is used to divide network into different subnetworks called LAN segments.It typically provides 10/100Mbps network access speed for each device connected to it. This is different to a hub which typically operates at 10/100 Mbps but this is the maximum throughput for all devices attached to it. Hubs cannot cope with the increased demands of today’s high bandwidth applications, e.g. video conferencing and therefore should be phased out in favour of switches. d. Bridge : It is a device that links two networks together which are physically separate but logically same i.e.the networks that follow the same protocols but different type of cables. e. Router :It is a device that works likes a bridge but can handle different types of protocols . It is also used to balance the traffic on various parts of the network. It uses logical address whereas the bridge uses physical address . f. Gateway : It is a system that joins two dissimilar networks together. A network gateway can be implemented completely in software, completely in hardware, or as a combination of the two. It expands the functionality by performing data translation and protocol conversion before transmission. It provides flexibility in communication. 29. Explain the following topologies diagrammatically for five workgropus connected with the server: a. Star topology b. Ring topology c. Bus topology d. Tree topology. Give two advantages and disadvantages for all of the above topologies. Ans a: Star Topology- Most common type of topology used in homes and offices and well suited for smaller networks. In a star topology, various nodes are connected to a central connection point called hub which can be computer hub or sometimes switch alone. The drop cables are extended in all directions and each device is connected to the hub via these cables. . It is inherently fault tolerant . Advantages If a node goes down, network keeps on working without interruption, only one computer might get affected and not the entire network. Network management is easy because of its simplicity in functionality Fault detection is easy , the problems can be easily located logically in a Star Topology Disadvantages The Star Topology is fully dependant on the hub and the entire working of the network depends on the hub or the switch. More cabling is required If there are many nodes and the cable is long then the network may slow down The Star Network Topology typically needs more cable to be networked than the usual Bus topology Example : Archnet , Ordinary telephone conversation b. Ring Topology- Also known as daisy chain topology, is large circular cable and each node is connected to two of its adjacent nodes, thus forming a ring Advantages One node can transmit at a time and collisions do not occur Need for repeaters is reduced Disadvantages Each node must handle data transmitted by other nodes. If one node fails whole network goes down. Example : Mitrenet c. Bus Topology( Multi-drop topology) - It is a method of transmission on networks that uses a common vehicle (backbone cable) for transmissions and thus it is categorized as shared communication. Bus topology only one device is allowed to transmit at a given point of time. A bus structure uses a main trunk called backbone. The two ends of the backbone are terminated by absorbers, which absorb the signals passed by all the devices. On the backbone that is a twisted pair co-axial cable, peripherals and PCs connected with the help of short cables called drop cables. Advantages Wide range of equipments are attached to such networks. A new node can be attached to network without disrupting the network Low cabling cost, very easy to set up , Use least amount o cable Disadvantages One message can travel at a time When a message from two nodes comes, a collision can occur. If the data transfer rate is high then the Bus network does not perform very well because the data travels in a stream and cannot be overloaded Reliability is low because a single break in backbone can bring the whole network down Fault detection & isolation is difficult Example : Ethernet d. Tree Topology: The shape of network is an inverted tree with central root branching and then sub-branching till extremes of network. . It is a modification of pure topologies ( combination of star and bus topology ) so is also called hybrid topology. It is best suited where when the network is widely spread and vastly divided into many branches & hierarchical flow of data is required. Advantages Data communication is very fast as there is a direct link between nodes. A point to point connection is possible with Tree Networks Best topology for branched out networks Disadvantages Cabling and setup is quite complex.For big networks it is difficult to configure and get complicated . The Tree Topology network is entirely dependant on the trunk which is the main backbone of the network. If that has to fail then the entire network would fail. 30. What is multiplexing. Ans A term used to refer to a process where multiple analog message signals or digital data streams are combined into one signal. Ex. Time division mutiplexing, Frequency Division Multiplexing . 31. Explain FDM and TDM. Ans FDM(Frequency Division Multiplexing): where multiple baseband signals are modulated on different frequency carrier waves and added together to create a composite signal. In analog transmission, signals are commonly multiplexed using frequencydivision multiplexing (FDM), in which the carrier bandwidth is divided into subchannels of different frequency widths, each carrying a signal at the same time in parallel. TDM (Time division Multiplexing): a type of multiplexing that combines data streams by assigning each stream a different time slot in a set .It works by dividing a radio frequency into time slots and then allocating slots to multiple calls . In this way ,a single frequency an support multiple, simultaneous data channels. TDM repeatedly transmits a fixed sequence of time slots over a single transmission channel. Within T-Carrier systems, such as T-1 and T-3, TDM combines Pulse Code Modulated (PCM) streams created for each conversation or data stream. 32. How CDMA is different from all other channel allocation techniques. A It is a digital cellular technology which uses spread spectrum techniques means the data is sent in small pieces over a number of discrete frequencies available for use in the specified range. 33. What do understand by 3G system. Ans 3G is short for third-generation mobile telephone technology. The services associated with 3G provide the ability to transfer both voice data (a telephone call) and non-voice data (such as downloading information, exchanging email, and instant messaging. 34. What provisions will you take to make your network secure. A Providing Firewall and antivirus solutions. 35. What is the importance of cookies. Ans A cookie is a small file that web server can store on your machine . It is the temporary file that stores information at the client side by the server and thus reduce the overhead of the server. 36. How firewall acts as security solution. Ans It is a combination of specialized hardware and software set up to monitor traffic between an internal network and an external network (ie the Internet). Its primary purpose if for security and is designed to keep unauthorized outsiders from tampering with or accessing information on a networked computer system. 37. Write any two components of openoffice. Ans OpenOffice has these components: writer ,calc and draw. 38. How will you explain the concept of WLL. Ans WLL is a system that connects subscribers to the public switched telephone network (PSTN) using radio signals as a substitute for copper for all or part of the connection between the subscriber and the switch. This includes cordless access systems, proprietary fixed radio access, and fixed cellular systems. 39. What are the following software use for ? a. PHP b. Linux Ans PHP : Short of Hypertext Preprocessor. It a server side side technology introduced to design dynamic web pages like ASP,It is based on open source technology under PHP license to develop graphic and web applications Linux is an open source operating system. 40. What is token ring? What type of cables are used for token ring? Ans Token ring is the IEEE 802.5 standard that connects computers together in a closed ring. Devices on the ring cannot transmit data until permission is received from the network in the form of an electronic 'token'. There are three major physical token ring cabling systems; Shielded Twisted Pair (STP), Unshielded Twisted Pair (UTP), and optic fiber. 41. What is Ethernet ? To which OSI layer does Ethernet belongs? Ans Ethernet is a Local Area Network (LAN) cabling and signaling specification for baseband networks. Ethernet uses a bus or star topology for connecting different nodes in a network. Ethernet belongs to both the Physical Layer (Layer 1) and the Data Link layer (Layer 2) in the OSI architecture. 42. What is a collision ? How is "collision" handled in Ethernet networks? Ans At any one instance, in an Ethernet network, only one device can transmit. If two devices transmit at the same instance, then the signals from both devices will collide and a "collision" will occur. When a "collision" occurs, the signals will get distorted and the frame will be lost. Collisions are very common in a Ethernet network. Ethernet uses the Carrier Sense Multiple Access with Collision Detection (CSMA/CD) media access control mechanism to detect and recover from a collision. 43. What is CSMA/CD? Ans CSMA/CD is a media access control mechanism used in Ethernet to recover from frame collision. The following steps are followed to recover from a collision. Step 1: Before an Ethernet device sends a frame on the Ethernet cable, it listens to find if another device is already transmitting a frame (Carrier Sense). Step 2: Once the device finds that other devices are not transmitting any frame, it starts transmitting the frame. If two devices detect that the Ethernet cable is free at the same time, then both will start transmitting the frames (Multiple Access). This will result in collision. Step 3: The Ethernet devices while transmitting the frames, also listen for the collision. (Collision Detect). Step 4: If they detect a collision, both the devices stop sending the frame (back off). Step 5: They retry the transmission after a logarithmic time-out period. This process is repeated till the frame is transmitted successfully, for a maximum of 16 times. The frame is discarded after the 16th retry. 44. What is protocol? How many types of protocols are there? Ans. When computers communicate each other, there needs to be a common set of rules and instructions that each computer follows. A specific set of communication rules is called a protocol. Some protocol: PPP, HTTP, SLIP, FTP, TCP/IP 45. What is the difference between Networking and Remote Networking? Ans. The main difference between Networking and Remote Networking, is the network which we use in offices or other places locally such LAN or INTERNET and remote networking is one which we use TERMINAL Services to communicate with the remote users such WAN. 46. What is point-to-point protocol? Ans. A communication protocol used to connect computer to remote networking services include Internet Service Providers. In networking, the Point-to-Point protocol is commonly used to establish a direct connection between two nodes. Its primary use has been to connect computers using a phone line. 47. How gateway is different from router? Ans. A gateway operates at the upper levels of the OSI model and translates information between two completely different network architectures. Routers allow different networks to communicate with each other. They forward packets from one network to another based on network layer information. A gateway can interpret and translate the different protocols that are used on two distinct networks. Unlike routers that successfully connect networks with protocols that are similar, a gateway perform an application layer conversion of information from one protocol stack to another. 48. What is the role of network administrator? Ans. Basic tasks for which a network administrator may be responsible: Setting up and configuring network hardware and software. Installing and configuring network media and connections. Connecting user nodes and peripherals of all kinds to the network. Adding users to and removing users from the network. Managing user account. Ensuring the security of the network. Provide training to the users to utilize the network’s resources. 49. What is the differences between POP3 and IMAP Mail Server? Ans. IMAP is a standard protocol for accessing e-mail from a local server. A simpler email protocol is Post Office Protocol 3 (POP3), which download mail to the computer and does not maintain the mail on the server. IMAP, e-mails are stored on the server, while in POP3, the messages are transferred to the client’s computer when they are read. 50. Name different layer of the ISO-OSI Model. Ans. ISO-OSI (International Standard Organization – Open Systems Interconnection) has seven layers; Physical Layer Data Link Layer Network Layer Transport Layer Session Layer Presentation Layer Application Layer 51. What is client server architecture? Ans. To designated a particular node which is well known and fixed address, to provide a service to the network as a whole. The node providing the service is known as the server and the nodes that use that services are called clients of that server. This type of network is called Client-Server Architecture. 52. What is FDM? Give example. Ans. FDM-Frequency Division Multiplexing is used in analog transmission. It is often used in short distance. It is code transparent and any terminal of the same speed can use the same sub-channel after the sub-channel is established. The best example if FDM is the way we receive various stations in a radio. 53. What is interspace? Ans The Interspace is a vision of what the Internet will become, where users crosscorrelate information in multiple ways from multiple sources. 54. Compare twisted pair cable and co-axial cable. Ans A twisted pair consists of two insulated copper wires, each with its own plastic insulation, twisted together in a helical form. Coaxial cable is an electrical cable consisting of a single round conducting wire, surrounded by an insulating spacer, surrounded by a cylindrical conducting sheath, and usually surrounded by a final insulating layer. 55. Define the following terms : Share ware , GSM , TCP/IP Ans Shareware: A method of marketing software where a program is distributed freely, and users may try it before paying for it. GSM: Global System for Mobiles, it is the international standard for wireless technology. GSM allows users to utilize one phone and one number in many countries throughout the world. TCP/IP: Transmission Control Protocol/Internet Protocol. A group of protocols that specify how computers communicate over the Internet. 56. Describe the following in brief: i) MOSAIC ii) USENET iii) WAIS Ans. i) MOSAIC: is the program for cruising the internet. The National centre wrote this program for Super Computer application at the university of Illinois. It has a simple window interface, which creates useful hypertext links that automatically perform some of the menu bar and button functions. ii) USENET: is the way to meet people and share information. Usenet newsgroup is a special group set up by people who want to share common interests ranging from current topic to cultural heritages. iii) WAIS: is a WIDE AREA INFORMATION SERVER. 57. What is FLOSS. Ans FLOSS is common and combined term of Free/Libre/Open Source Software. Actually this term for free software and open source where free means it was cost free software. Libre means liberty : to make changes Open source means code or patch files are available openly to fix bugs, and for further development. 58. Explain the term GPL. Ans GNU Public License (GPL) Most new open source software around these days uses this license, as does Moodle. In a nutshell, the GPL says: Anyone can download, use, modify and distribute this software All modified versions must ALSO be under the GPL license All copyright notices must be maintained, and all modifications must be clearly marked All distributions must include the full source code There is no warranty on the software 59. What is FSF. Ans The Free Software Foundation (FSF)was established in 1985 to promote the development of free software with full rights to use, study, copy, modify, and redistribute computer programs. particularly the GNU operating system, used widely in its GNU/Linux variant.Its a non profit, non political and international organization provides standards for developing free softwares. 60. What is GNU. Ans GNU is a computer operating system composed entirely of free software. Its name is a recursive acronym for GNU's Not Unix, which was chosen because its design is Unix-like, but differs from Unix by being free software and by not containing any Unix code.GNU was founded by Richard Stallman and was the original focus of the Free Software Foundation. 61. What is OSI. Ans Open Source Initiative (OSI) is a non-profit corporation dedicated to managing and promoting the Open Source Definition for the good of the community, specifically through the OSI Certified Open Source Software certification mark and program.. The basic idea behind open source is to read, redistribute, and modify the source code for a piece of software, the software evolves. People improve it, people adapt it, people fix bugs. We in the open source community have learned that this rapid evolutionary process produces better software than the traditional closed model, in which only a very few programmers can see the source and everybody else must blindly use an opaque block of bits. 62. What is W3C. Ans W3C (World Wide Web Consortium) The organization responsible for managing standards for the WWW. 63. Define the following: a. Open source software: Open Source software which simply means any software certified by the OSI and openly available with the source code.Open source software generally allows anybody to make a new version of the software, port it to new operating systems and processor architectures, share it with others or market. b. Freeware Software which is distributed free by the author. Although it is available for free, the author retains the copyright, which means that it cannot be altered or sold. c. Shareware. Software distributed freely, but with certain conditions applying to it. Either the software is released on a trial basis only, and must be registered after a certain period of time, or in other cases no support can be offered with the software without registering it. In some cases direct payment to the author is required. d. Proprietary software. Software which is privately owned or controlled is known as proprietary software. Proprietary software is not free software or open source software as end-users generally do not have the ability to: Run the software for any purpose Study and modify the software Copy the software and provide it to third parties Make and release improvements to the software e. Localization. localization is the adaptation of an object to a locality. An example is in software localization, where the messages that a program presents to a user need to be translated into various languages. Language localization refers to the process of adapting a language for a specific country or region. f. UNICODE. It’s a Character coding system which is replacing older ASCII code thesesdays due to its compatibility,size and scope .it is extensively used these days in Java,XML and other languages. 64. Why Linux is popular now a days. Ans Like Windows and Unix ,Linux is also an operating system developed Linus Torvalds but this operating system was freely distributed as Open Source i.e code is freely available to read ,edit and fix bugs. Apart from the fact that it's freely distributed, Linux's functionality, adaptability and robustness, has made it the main alternative for proprietary Unix and Microsoft operating systems. IBM, Hewlett-Packard atre the top companies which has embraced Linux and support its ongoing development. It was primarily adapted as a server platform. 65. What is Mozilla Firefox? Ans Mozilla Firefox is a free web browser , from the Mozilla Application Suite, managed by the Mozilla Corporation. It is the second-most popular browser currently worldwide, after Internet Explorer. Firefox includes tabbed browsing, a spell checker, incremental find, live bookmarking, a download manager, and an integrated search system that uses the user's desired search engine. 66. Why Mozilla is different from other web browsers. Ans An open-source XML/HTML browser have with dynamic image and table resizing, quick insert and delete of table cells, improved CSS support. 67. Explain the webserver Apache.Where it is used. Ans The Apache HTTP Server is to develop and maintain an open-source web server for modern operating systems including UNIX and Windows NT. The goal of this project is to provide a secure, efficient and extensible server that provides HTTP services in sync with the current HTTP standards.Apache has been the most popular web server on the Internet since April 1996. Uses of apache are: Serves both static content and dynamic Web pages on the World Wide Web. Apache provides environment to run web applications like java based and XML 68. Write short note on MySQL. Ans MySQL is the world's most popular open source database software. It is a structured query language like SQL used for managing database systems.Many of the world's largest and fastest-growing organizations use MySQL to save time and money powering their high-volume Web sites, business-critical systems and packaged software -- including industry leaders such as Yahoo!, Alcatel-Lucent, Google, Nokia. . 69. Write brief note on Postgres. Ans PostgreSQL is an object-relational database management system (ORDBMS). It is released under as a free software. And like other open-source programs, PostgreSQL is not controlled by any single company, but relies on a global community of developers and companies to develop it. 70. What is Pango. Ans Pango is a free and open source computing library for rendering internationalized texts in high quality. Pango has been integrated into most Linux distributions. It most notably provides the rendering for text in the Mozilla Firefox web browser Different font backends can be used, allowing crossplatform support. 71. What is Open office. Ans The OpenOffice.org project aims "To create, as a community, the leading international office suite that will run on all major platforms and provide access to all functionality and data through open-component based APIs and an XMLbased file format like Microsoft Office. 72. Explain Tomcat,PHP,Python. Ans Tomcat: Apache Tomcat is an application server developed at the Apache Software Foundation (ASF). To run java applications on web server It has its own internal HTTP server and implements the Java Servlet and the JavaServer Pages (JSP) specifications from Sun Microsystems, providing an environment for Java code to run in cooperation with a web server. PHP: short of Hypertext PreProcessor.It a server side side technolgy introduced to design dynamic web pages like ASP,It is based on open source technolgy under PHP licence to develop grahic and web applications. It was written as a set of Common Gateway Interface (CGI) binaries in the C programming language by the Danish/Greenlandic programmer Rasmus Lerdorf in 1994, to replace a small set of Perl scripts he had been using to maintain his personal homepage. Python: Python is a multi-paradigm programming language (functional, object oriented and imperative) which has a fully dynamic type system and uses automatic memory management; it is thus similar to Perl, Ruby, Scheme, and Tcl. The language has an open, community-based development model managed by the non-profit Python Software Foundation. 73. What are the merits and demerits of open source. Ans Merits : Source code is openly available. Freely distributed User is free to make changes and fix bugs without any licencing. Compatible and secured as per the application . One Common license requires to publish software i.e. GNU and gets poularity easily in the market. DeMerits: No sole authority for any sort of complaints as it is constantly developed and bugs are fixed by any third person. It can not be centrally managed and co-ordinated, and there are fewer "odd gaps" in its development as such. In case of closed source model new versions of the software are continually being introduced, with lots of new features being added. Revenue generation is very high due to target based applications. 74. Is freeware is same as free software ,If not, Why? Ans No, Free software is distinct from freeware; freeware is proprietary software made available free of charge. Everyone is free to sell copies of free software, to use it commercially, and to charge for distribution and modifications. Because anyone who has a copy may distribute the software at no cost, the software generally is available at no cost. Free software business models are usually based on adding value such as support, training, customisation, integration, or certification like open source softwares are free softwares. 75. What are the two popular open source licenses ? How they are different. Ans GNU Public License (GPL) Most new open source software around these days uses this license, as does Moodle. In a nutshell, the GPL says: Anyone can download, use, modify and distribute this software All modified versions must ALSO be under the GPL license All copyright notices must be maintained, and all modifications must be clearly marked All distributions must include the full source code There is no warranty on the software Berkely Source Distribution (BSD) The BSD license is even simpler - all it basically says is: Anyone can download, use, modify and distribute this software in any form All existing copyright and usage notices must be kept in the software There is no warranty on the software The names of the original authors can't be used in promotion without written permission from the original authors. 76. Write the difference between Adware and baitware. Ans Adware is any software program in which advertising banners are displayed while the program is running. Baitware: term is composed by bait and -ware and refers to a buggy freeware software, released to deceptively attract users and drive them to commercial products. 77. Differentiate between the following: a. LAN and MAN b. Microwave and Radiowave c. Gopher and WWW d. Star and Ring topology e. Router and Gateway f. Hub and Switch g. Client and Server h. CSMA/CD and token passing i. Circuit switching and Message Switching. j. Coaxial cables and optical fibers k. Mobile Technology and Wireless Technology l. SMS and 3G m. XML and HTML n. Hacker and Cracker. o. Baseband and Broadband transmission p. Domain and workgroup Ans a. LAN a) Local Area Network. are privately owned networks b) Used to connect PC’s and workstation within a building or computers in an area upto 10 kms of range. c) Speed of data transmission is not very high MAN MAN-Metropolitan Area Network Bigger version of LAN Extends within metropolitan area. Covers a group of nearby offices or city Speed of transmission is very high. b. Microwave Parabolic antennas are mounted on Radiowave Waves are omni directional i.e.-travel in towers to send a beam to other antenna. all directions from source to source Higher the tower, greater is the range destination need not be physically aligned Used for outdoor communication Used for both indoor and outdoor communication Are subjected to weather easily . Subject to interference. c. Gopher A menu based browser that lets you search for and retrieve desired information on the internet WWW World wide web is a repository of information containing a set of programs , standards and protocols that allows the multimedia and hypertext files to be created , displayed and linked on the internet. Star In a star topology, various nodes are connected to a central dedicated computer called hub of the star If a node goes down, network keeps on working without interruption Ring Ring topology has a large circular cable and each node is connected to two of its adjacent nodes, thus forming a ring If one node fails whole network goes down d. e. Router is a device joins similar networks but can handle different types of protocols . A router works by looking at the IP address in the packet and decides if it is for internal use or if the packet should move outside the network (to the WAN). f. Gateway is a system that joins two dissimilar networks together gateway acts as a conversion from one protocol to another or in the case of VoIP from the VoIP network to the POTS network Hub Hub receives data and sends to all PC connected through cables resulting in collision. Switch In case of switch most of the network traffic only goes where it needs to rather than to every port. Every computer connected to the hub "sees" everything that every other machine on the hub sees Hub are less efficient and slower . .It sends data according to the address assigned and managing the network traffic. On busy networks this can make the network significantly faster g. Client Node refer to the computers attached to the network and are seeking to share the resources of the network. Server A computer that facilitates the sharing of data , software and hardware resources on the network is termed as server Every workstation is known as It is of high capacity to share clients at a client.It is of lower configuration as common resource point. compared to server. h. CSMA / CD Traffic cannot be regulated Waiting time cannot be determined TOKEN PASSING Traffic can be regulated Waiting time can be determined before a node transmits. Nodes are given access on first come Nodes can be prioritized for getting first serve basis . access privilege. Collision rate is high in high traffic. Performance is good in low traffic. No collision. Even in low traffic the nodes have to wait unnecessarily . Circuit Switching Message Switching i. Switching techniques of sending data through establishing physical connection between sender and receiver. Ex: Telephone communication It’s a techniques based on store and forward principle where data is first sent to the switching office and then further transferred accordingly. Ex: Email j. Coaxial cables Consists of a solid wire core surrounded by one or more foil or wire shield each separated by some kind of plastic insulator. Optical fibres These are then strands of glass or glass like material constructed to carry light from one source at one end fiber to a detector at other end Bandwidth and data transmission is in the form of electric signals which is less as compared to optical fire is less an Offers electrical interference . Bandwidth potentially very high. Data transmission rate is also high due to form of laser spectra. optical fibres do not experience any electrical interference. Regenerators are required at every 2- Regenerators are required at least after 3 kms 50km Used for cable T.V, telephone ,audio It can be used for high rate TV cable channels etc. channels,purposes of illumination ,in sensors k. Mobile technology It is the data communication without the use of landlines. This may involve cellular phones ,two way radio, fixed wireless , ,Laser or satellite communication. Here the computing device is continuously connected to the base network. Not all wireless technologies are Wireless Technology Mobile computing means that the computing device is not continuously connected to the base or the central network .Mobile devices includes PDA’s ,laptop computer an many cell phones . mobile. a base location with or wireless These products may communicate with connection. m. XML It is the subset of SGML where we are free to define our own tags. XML was designed to describe data and to focus on what data is. HTML It is a language where we have predefined tags . HTML was designed to display data and to focus on how data looks. It is extensively used with other It is used as basic design platform for languages like C# ,java to store and any web document and implements send information. scripting and server side technologies in it. n. Hackers Are the experts keeps on mastering the computer and related technologies Hackers constantly seek further Crackers A cracker is a person who breaks into or otherwise violates the system integrity of remote machines, with malicious intent Crackers, having gained unauthorized access, destroy vital data create viruses knowledge, freely share what they or do script attacks. have discovered, and never, ever intentionally damage data. o. Baseband Baseband is a bi-directional transmission Entire bandwidth of the cable is consumed by a single signal Broadband broadband is a unidirectional transmission. Broadband transmission, signals are sent on multiple frequencies, allowing multiple signals to be sent simultaneously. Digital signals Analog signals No Frequency division multiplexing Frequency division multiplexing possible possible Uses for short distance Uses for long distance p. Domain One or more computers are servers If you have a user account on the domain, you can logon to any computer on the domain. There can be 100+ computers The computers can be on different local network Workgroup All Computers are peers. Each computer has a set of accounts. Typically not more then 20-30 computers All computers must be on the same local netork. HOTS ( HIGH ORDER THINKING SKILLS) 78. The Netsavvy has set up a new office in the hill station Mussorie .It has 4 wings as shown in the diagram below: Wing A Wing C Wing B Wing D Center to center distance between various blocks Wing A to Wing B 75m Wing A to Wing C 150 Wing B to Wing C 25 Wing A to Wing D 50 Wing C to wing D 100 Number of computers in each wing Wing A 25 Wing B Wing C Wing D i) 50 125 10 Suggest the most suitable topology to network all the wings. Ans Most suitable topology to network all wings is star topology. A B C D Total distance ==150+100+25 = 275 ii) Suggest the most suitable place to house the server .Justify your choice. Ans C is the most suitable to house the server as it has max number of computers and located centrally iii) Where and why should repeaters be used. Ans Repeaters is required between A-------B ,A----------C and C---------D where distance is more than 50 ms (iv) The Mussorie office has to be linked with its headquarters in Mumbai .suggest the most economical way to connect it. The organization is ready to compromise on the speed of connectivity. Ans 79. LML Organization has set up its new center at Mumbai for its office and web based activities. It has 4 Blocks of buildings as shown in the diagram below: Block A Block C Block D Block B Center to center distance between various blocks Block A to Block B 50 m Block B to Block C 150 m Block C to Block D 25 m Block A to Block D 170 m Block B to Block D 125 m Block A to Block C 90 m Block A 25 Block B 50 Block C 125 Block D 10 Number of Computers a. Suggest a most suitable cable layout of connections between the Blocks. b. Suggest the most suitable places (i.e. Block) to place the server of this organization with a suitable reason. c. Suggest the placement of the following devices with justification: 1. Repeater 2. Hub/Switch d. The organization is planning to link its head office situated in City in a desert region where cable connection is not feasible, suggest an economic way to connect it with reasonably high speed? Ans: a. Block A Block C Block B Block D Cable Lyout is suggested to connect all computers on the network with minimum cable length and cost. Therefore if we connect A-B =50 m A-C=90m C-D=25m i.e total cable length comes 165m this is the best way to have cable connectivity in the above scenario. Other way is through connecting block C i.e A-C and B-C and C-D Which comes 90+ 150+25=265m So considering the first case coaxial cables CAT 6 /5 can be placed . b. Server is placed as to get connected with maximum connectors in the center location .Also Server rule 80-20 design rule also says that server should be placed to balance the network traffic and data communication in the most easy manner. In the above scenario server should be placed in Block C c. Repeater is used to amplify the signals .It can be placed in between Block A –Block C Hub/Switches :Each building should have hub/switch to connect its local machines. Block AHub Block B Hub Repeater Block C Hub Block D Hub d. In that case organization can go for radio wave communication as radiowave communication is cheaper and will serve the purpose of data communication in the best manner as it has following features : Easy to generate Travel over long distances Used for communication both indoors & outdoors Waves are Omni directional i.e.-travel in all directions from source to source destination need not be physically aligned 80. Zercon Pvt Ltd. has decided to network all its offices spread in five buildings of C.P. (Shown below). Building 2 Building 3 Building 1 Building 5 Center to center distance between various blocks Between 1 and 2 50m Between 2 and 3 50m Between 3 and 4 120 Between 4 and 5 30 Between 3 and 5 75 Between 1 and 5 60 Between 2 and 5 50 Building 4 Between 3 and 4 50 Number of Computers 1 40 2 45 3 110 4 70 5 60 a) Suggest cable layout(s) for connecting the buildings. b) Where do you think , additional repeaters would be required by networking buildings? c) Company wants to minimize traffic . Which network device is/should be used for this? d) The company also has another office in the same city but at a distant location about 25-30 kms away. How can link be established with this building (i.e. suggest the transmission medium). Ans: a). Possible cable layouts are: Building 1 Building 2 Building 5 Building 3 Building 4 Connecting Building 1-2-3-4-5 Total length =50+50+50+30=180ms Best possible layout. OR Building 5---1—2—3---4 but length comes 280 which is high as compared to that. b. Repeaters could be placed between building 2 and 3 to amplify signals . c. Bridge as it does not broadcast data but sends data direct to its destination as per machine address. d. In that case organization can go for radio wave communication as radiowave communication is cheaper and will serve the purpose of data communication in the best manner as it has following features : Easy to generate Travel over long distances Used for communication both indoors & outdoors Waves are omni directional i.e.-travel in all directions from source to source destination need not be physically aligned 81. Rai Industries has set if its new center at Tri Nagar for its office and web based activities. The company compound has 4 buildings as shown in the diagram below: R Building F Building H Building J Building Center to center distances between various buildings is as follows: H Building to R Building 50 m R Building to F Building F Building to J Building J Building to H Building H Building to F Building R Building to J Building 60 m 25 m 170 m 125 m 90 m Number of Computers in each of the building is follows: H Building R Building F Building J Building (a) (b) 15 150 15 25 Suggest a cable layout of connections between the buildings. Suggest the most suitable place (i.e., building) to house the server of this organization with a suitable reason. (c) Suggest the placement of the following devices with justification: (i) Internet Connecting Device /Modem (ii) Switch (d) The organization is planning to link its sale counter suitable in various parts of the same city. Which type of network out of LAN, MAN or WAN will be formed? Justify your answer. Ans: a) Possible cable layout is : Layout : 1 H-R-F-J 50+60+25 = 135m Layout 2 50 + 60 + 90 = 200 m Hence layout 1 is suggested. b) The most suitable place / block to house the server of this organization would be Building R, as this building contains the maximum number of computers, thus decreasing the cabling cost for most of the computers as well as increasing the efficiency of the maximum computers in the network. c) i.) Modem should be placed at building R where server is housed. ii.) Switch : Each building should have its switch to connect computers locally. d) MAN : Metro area network connectivity of computers of different types (LAN) in a city.