Professional Documents
Culture Documents
Computer Network
Computer Network
Computer Network
They are privately owned networks capable of interconnecting a large number computers, terminal and other
peripheral devices with in a limited geographical area, typically under 1 Km across such as an office building,
a small company or a campus.
The configuration of a LAN can be a star, a ring, or a bus.
In LAN, transmission channels generally uses coaxial or fiber optic cables and special interface devices rather
than telephone line and modem. Thus the transmission speed is very high than the other types of networks.
The main purpose of LAN is to link computers within an organization, a campus or company offices, so that
they may share expensive peripheral devices e.g high speed printers or magnetic disks, database and also to
exchange information.
The smallest size in the network types.
Advantages and Disadvantages of LAN.
Advantages of connecting computers in a LAN
1. Workstations can share peripheral devices like printers. This is cheaper than buying a printer for every
workstations.
2. Workstations do not necessarily need their own hard disk or CD-ROM drives which make them cheaper to buy
than stand-alone PCs.
3. User can save their work centrally on the network file server. This means that they can retrieve their work from
any workstation on the network. They do not need to go back to the same workstation all the time.
4. Users can communicate with each other and transfer data between workstations very easily.
5. One copy of each application package such as a word processor, spreadsheet etc. can be loaded onto the file and
shared by all users. When a new version comes out, it only has to be loaded onto the server instead of onto
every workstation.
Disadvantages of connecting computers in a LAN
1. Special security measures are needed to stop users from using programs and data that they should not have access.
2. Networks are difficult to set up and need to be maintained by skilled technicians.
4
3. If the file server develops a serious fault, all the users are affected, rather than just one user in the case of
a stand-alone machine.
Components of LAN :
All LANs must have at least three basic components that are:
1. Workstation which are actually PCs or terminals.
2. File servers or Disk Servers, which are special PCs or larger computers. Shared software resources are
stored on them including networking software for monitoring the entire network operations.
3. Cabling and connection hardware link the computers together. A special interface card or printed circuit
board has to be inserted into each computer on the network. This card is used to give a unique identity and
allow it to interact with other computers of the network. This card is called Network Interface Card (NIC)
or LAN card.
MAN ( Metropolitan Area Networks)
This network is basically a bigger version of a LAN and normally uses similar technology. It might cover a group of
nearly corporate offices or a city and might be either private or public.
A Metropolitan Area Network (MAN) is a large computer network that spans a metropolitan area or campus. Its
geographic scope falls between a WAN and LAN. MANs provide Internet connectivity for LANs in a metropolitan
region, and connect them to wider area networks like the Internet.
A MAN can support both data and voice, and might even be related to local cable television. A MAN just has
one or two cables and does not contain switching elements.
A key aspect of a MAN is that there is a broadcast medium to which all the computers are attached, this
greatly simplifies the design compared to other kinds of networks.
A MAN is slower than LAN but faster than WAN.
(Advantages and disadvantages of Network are advantages and disadvantages of MAN)
WAN (Wide Area Network)
Often business have offices throughout a large region. For instances, most banks have headquarters site and offices
throughout a state or nation. LANs and MANs are not the efficient networks in this case WANs fill this need.
A WAN spans a large geographical area, often a country or continent or even the world. It is a digital
communication system, which interconnects individual computers and LANs to communicate with each
other over a public transmission medium such leased telephone lines, microwave or satellite.
Data communication speed of WANs is much slower than LANs and MANs. Further it can not be used for
sharing resources. Generally it is used only to rout short message, such as e-mail etc.
Types of network (According to computer attached to them)
Networks are divided into three types.
1. Server based (Client-Server) Network: The clients and servers support this network. Basic key points are.
The server-based network is defined by the presence of servers on the network that provide security and
administration of the network.
Processing tasks are divided between clients and servers. Clients request services, such as file storage or
printing, and servers deliver or provide these services
Server computers typically are more powerful than client computers.
Only requires on password for you to access all resources on the network that you have the permission to use.
Each user is allowed access to only those resources that the user has the privilege to access.
Some one must administer centrally the security on your network.
Advantages of Server-based Network:
Strong central security, because a server keeps a file or a resource secure from accessing by the unauthorized
user.
Central file storage, which allows all users to work from the same set of data and provides easy backup of
important data.
Ability of servers to share available hardware and software, lowering overall costs.
Optimized dedicated server, which are faster than peers at sharing network resources.
Freezing of users from the task of managing the sharing resources.
Easy manageability of a large number of users.
5
Central organization, which keeps data from getting lost among computers.
Disadvantages of Server-based network
Disadvantages of server based network are mostly related to the cost of server equipment
Expensive dedicated hardware.
Expensive network operating system and licenses.
A dedicated network administrator is required.
Hybrid Network
Hybrid networks are supported by all three types of computers, i.e server, clients and peers.
Hybrid network is the combination of both server based and peer to peer network.
In Hybrid networks most shared resources are located on servers, but network user still have access to any
resources being shared by peers in your work group.
Network users do not have to log on to the domain controller to access workgroup resources being shared by
peers.
Advantages of Hybrid Network
The advantages of server based networking
Many of the advantages of Peer to Peer networking
Ability of users and network administrator to control security based on the importance of the shared resources.
Disadvantages of Hybrid Network
Disadvantages of Server-based networking.
6
Server types
A server based network may have one server to perform the tasks of a server or separate servers dedicated to specified
tasks. Generally a server in a server based network is dedicated to perform specific tasks in support of other computers
on the network. For example, a file server is dedicated to the task of serving files. A print server is dedicated to the task
to provide print services to client computers on the network. Some common server types are given below.
1. File Server
2. Print Server
3. Application Server
4. Message Server
5. Database Server
Functions of all these servers are supported by Windows NT server operating system. One Windows NT Server can
perform all functions of different servers simultaneously on a small network. But on larger network, you need to divide
these functions among multiple servers.
File Server
File servers are designed specifically to support the file services for a network.
File servers are:
1. To allow network users to share files.
2. To provide the users network applications that store, retrieve and move file and data.
3. To provide user the facility of exchanging, reading and managing shared files and the data contained in them.
4. To keep track of different versions of the same file when used by more than one client.
Print Servers
Print servers provide print services to client computers.
Print servers are:
1. To allow user to share printers.
2. To allow users to place printers where convenient, not just near individual computer.
3. To achieve better workstation performance by using high speed network data transfer print queues and
spooling.
4. To allow to share network fax services.
Application Servers :
Application servers provide users with different types of application programs they need to use. They are almost
opposite of file and print servers. The application the client runs is stored on the client. Requests are then sent to the
server to be processed and the processed information is sent back to the client. This way the client processes little
information and the server does everything. The application server allow client to access and use extra computing
power and expensive software applications that resides on a shared computer.
Message Server:
Message servers provides in a wide variety of communication methods that has a good efficiency than simple file
services. With file services, data can pass between users only in text form. But message services are
1. Data can take the form graphics, digitized video, or audio, as well as text and binary data.
2. You can send an electronic note, attached to a voice-mail message, to a fellow user on a network.
Database Servers:
Database servers provide database services to client PCs. Most database systems are client-server based. This means
that the database applications run on two separate components.
1. The client-end portion of the applications run on the client, providing an interfae and handling less
intensive functions such as data requests.
2. The server-end portion of the application handles the intensive performance of database operations. It runs
on the database server managing the database, processing queries and replaying to clients.
Thus database servers means that.
1. In a client-server database the database server provide a network with powerful database capabilities that
are available for use on relatively weak PCs.
2. Provide security database optimization (to achieve greater possible efficiency) and data distribution.
7
Network Topologies.
The topology is the geometric representation of the relationship of the links and the linking devices (Nodes) in a
Network. OR
The topology of a network may be defined as its physical layout i.e the way in which computers and other
equipments are connected. There are different basic layouts or topologies for networks. Following are the most
commonly used topologies.
1. Star topology 2. Bus topology 3. Ring topology 4. Mesh topology 5. Hybrid topology.
Star topology
In star topology each node (computer) is connected to a central computer, which controls the network, signals
travel from server to the stations along each individual station’s cable. Star topology may also use a central
platform in the form of a Hub where cables from different computers are plugged and thus providing a mean of
signal transmission.
The diagrammatic representation of a star network is as under.
HUB
This topology has the following advantages over its other counterparts.
1. Less cabling
2. Less expensive than Mesh as each device needs only one link and one I/O port.
3. Easy to install and reconfigure.
4. Robust, if a link fails, only that link fails.
5. Easy fault detection.
Disadvantages.
This topology has the following disadvantages.
1. Entire network is badly suffered when the central server fails.
2. Cable cost increases due to large number of cables from individual station to the central server or hub.
3. Entire network fails if Hub fails.
Bus topology
Bus topology is used, when the network installation is small, simple or temporary. A bus topology is that in which all
the devices or computers share a single cable. Information can be transmitted in either direction from any PC to any
other. When a single computer sends a message up or down the wire, all the computers in the networks receive the
message, but only one computer (the one which has a matching address) accepts the message and the rest of computers
neglect the message. In bus network only one computer can send a message at a time and the remaining computers set
idle. The computer waits until the bus become free. Another important issue in the bus network is termination. The
data in bus can be moved freely in both directions. So without termination, when a message reaches at the end of the
cable, it bounces back and moves in the opposite direction. This problem is called ringing. To solve this problem we
use a terminator at the end, which can absorb the signal and stop the reflection. Following diagram represents bus
topology.
8
Repeater
computers “n” is 6 then there will be total 15 links among them as shown in the following diagram.
In this diagrammatic representation there is a two way communication of data across each link.
Hybrid Mesh
In hybrid mesh total links are less than n(n-1)/2 for “n” computers. Each computer is not directly connected with each
other computer in the network. If for example the total number of computers “n” is 6 then there are 9 links instead of
15 then such network will be a hybrid mesh.
Sender Receiver
Application Layer Application Layer
Presentation Layer Presentation Layer
Networking Hardware
Session Layer Session Layer
Transport Layer Transport Layer
Network Layer Network Layer
Data Link Layer Data Link Layer
Physical Layer Physical Layer
There are several advantages of OSI reference model few of which are
1. OSI reference model gives a clear understanding about the working of communication software and
equipments.
2. OSI reference model when followed make different networking software capable to transmit their data
with each other.
3. This model provides a standard for the quality of communication between similar or different networking
equipments.
11
Transmission Media (Cable)
Transmission media is very important component of data communication system. It provides channels for the
transmission of various types of data. It is a source of inter-connecting the computers in the form of a network.
Media is the plural of medium and thus communication media is a collection of different medium. Media are used
for the exchange of data among computers. A network is established with the help of communication media. The
media is composed of communication channel that are links between computers and are followed by the data
signals during their flow from one computer to another one. There are tow broad categories of communication or
transmission media. These are described as.
Disadvantages (Demerits)
UTP is very much susceptible to Electro-Magnetic Interference i.e (EMI), however STP is less susceptible to EMI
due to its shielding effect. Anyhow more or less the EMI may have its susceptibility on both UTP and STP cables.
The standards categories:
Cat 1: Previously used for POTS telephone communications, ISDN and doorbell wiring.
Cat 2: Previously was frequently used on 4 Mbit/s token ring networks.
TIA-568 only recognized cables of Category 3 ratings or above.
Cat 3 UTP
Category 3 UTP is rated to carry data up to 10Mbit/s.
Cat 3 UTP was the standard cable for use with Ethernet 10Base-T.
Cat 4 UTP:
Category 4 UTP no longer common or used in new installations was frequently used on 16 Mbit/s token ring networks.
Cat 5 UTP
Category 5 UTP is rated to carry Ethernet up to 100Mbit/s and ATM up to 155Mbit/s.
Cat 5 UTP was the standard cable for use with Ethernet 100Base-TX.
Cat 5e UTP
Category 5e UTP is an enhanced version of Cat 5 UTP.
Cat 5e UTP is rated to carry data up to 1000Mbit/s.
Cat 5e UTP is the standard cable for use with Ethernet 1000Base-T.
Cat 5e can also be used to extend the distance of 100Base-TX cable runs up to 350 meters.
Cat 6 UTP
Category 6 UTP is very similar to Cat 5 UTP, except that it is designed and manufactured to even stricter standards.
Category 6 has a minimum of 250 MHz of bandwidth. Allowing 10/100/1000 use with up to 100-meter cable length,
along with 10GbE over shorter distances.
12
Coaxial Cables:
Coaxial cables are high and well-insulated cables. They can transmit data much faster and more accurately than
twisted pair cables. The central cable shares a common axis and is therefore called coaxial or simply coax. There
are two types of coaxial cables.
1. Baseband coaxial : Baseband coaxial carries one signal at a time. A bit of 0 or 1 value is sent by the presence
or absence of voltage in the cable. Baseband signals can travel very fast but can only be sent over short
distances. Over about 1000 feet, special booster equipments are needed for baseband coaxial cables.
2. Broadband coaxial: Broadband coaxial can carry multiple signals on a fixed carrier wave, with the signals for
0s and 1s sent as variations on this wave. Data, audio and vedio transmission can take place simultaneously
using broadband coaxial cables.
Advantages (Merits)
1. Coaxial cables (also called Coax) are relatively inexpensive. Thin coax is less expensive than STP. Though
thick Coax is more expensive than STP. However it is less expensive than fiber optic cable.
2. The installation is simple and it has higher potential of bandwidth capacity.
3. The node capacity depends on the type of coaxial cable. Thick coax can connect 100 devices. Thin Coax such
as RG-58 can afford 30 computers.
4. Attenuation of RG-8 that is used in thick Ethernet is 500 meters whereas the attenuation of RG-58 that is used
in thin Ethernet is 185 meters.
Disadvantages (Demerits)
1. Though Coaxial cable offers much better resistance to EMI due to its shielding effect even then the
transmission speed is less than that of fiber optic cable.
10Base2 - Ethernet specification for thin coaxial cable, transmits signals at 10 Mbps (megabits per second) with a
distance limit of 185 meters per segment.
10Base5 - Ethernet specification for thick coaxial cable, transmits signals at 10 Mbps (megabits per second) with a
distance limit of 500 meters per segment.
10BaseF - Ethernet specification for fiber optic cable, transmits signals at 10 Mbps (megabits per second) with a
distance limit of 2000 meters per segment.
10BaseT - Ethernet specification for unshielded twisted pair cable (category 3, 4, or 5), transmits signals at 10
Mbps (megabits per second) with a distance limit of 100 meters per segment.
100BaseT - Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 100 Mbps
(megabits per second) with a distance limit of 100 meters per segment.
1000BaseX -Ethernet specification for unshielded twisted pair cabling that is used to transmit data at 1 Gbps
(gigabits per second) with a distance limitation of 220 meters per segment.
Internal Modem
They are plugged into the motherboard of computer at one side and to the telephone cable at other side.
External Modem
They are connected to the computer by a serial cable at one end and to the telephone cable at other end. The serial
cable (RS-232) must have connectors that match the modem at one end and the computer at the other end. On the
modem end, most external modems have a female DB25 (25 stand for 25 pins) connector and need a cable that has a
DB25 male connector. The other end of the cable, which connects to the computer, can have DB25 female. DB9 male
or small round PS/2 connector depending on the computer.
4. Access Point
In computer networking, a wireless access point (WAP) is a device that allows wireless devices to connect to a wired
network using Wi-Fi, Bluetooth or related standards. The WAP usually connects to a router (via a wired network), and
can relay data between the wireless devices (such as computers or printers) and wired devices on the network.
In a wireless local area network (WLAN), an access point is a station that transmits and receives data (sometimes
referred to as a transceiver). An access point connects users to other users within the network and also can serve as
the point of interconnection between the WLAN and a fixed wire network. Each access point can serve multiple
users within a defined network area; as people move beyond the range of one access point, they are automatically
handed over to the next one. A small WLAN may only require a single access point; the number required increases
as a function of the number of network users and the physical size of the network.
5. HUBs:
All networks (except those using coaxial cable – as it is broadband medium and is having the capability to perform like
a hub) require bringing down media segment together to a central point called HUB (also called a multiport-repeater or
concentrator)
A hub fills the need of connecting multiple media segments together.
Hubs range in size from four ports upto several hundred and are specific to the network types. There are three main
types of hubs: passive, active, and intelligent.
a. Passive hubs: A passive hub simply concentrates (centralized) the network. It does not regenerate the signals and in
fact absorbs some of the signal. Thus it decreases the distance between devices. A passive hub allows each computer to
receive the signals sent from a sender computer.
b. Active hubs: Active hubs add the capability of amplification and regeneration of the signals to the passive hub.
Thus using active hubs, you can increase the distance between devices. The main problem with active hub is that they
amplify both noise as well the signal. That is signals are blindly amplified because active hubs have no real
intelligence to distinguish between the noise and the signal. Active hub are mush more expensive than passive hubs.
Active hubs are also called multi-port repeater because, they act like repeater but they have multiple ports for devices
to attach.
c. Intelligent hubs (Switches): Intelligent hubs, in addition to signal regeneration, perform some network
management and intelligent path selection. An intelligent hub sends the signals to only the destination device rather
than sending it to all devices connected to the hub. Using a switch is like having a dedicated connection between the
two transmitting devices. Many switching hubs can choose which alternative path will be the quickest and send the
data that way. Intelligent hubs function like bridges but they have multiple ports that are why they are called multiports
bridges. Intelligent hubs are expensive than other types of hubs.
Switches
Definition: A network switch is a small hardware device that joins multiple computers together within one local area
network (LAN). Technically, network switches operate at layer two (Data Link Layer) of the OSI model.
Network switches appear nearly identical to network hubs, but a switch generally contains more intelligence (and a
slightly higher price tag) than a hub. Unlike hubs, network switches are capable of inspecting data packets as they are
16
received, determining the source and destination device of each packet, and forwarding them appropriately. By
delivering messages only to the connected device intended, a network switch conserves network bandwidth and offers
generally better performance than a hub.
Repeaters :
Electromagnetic waves (electric signals) attenuate (weaken) while traveling along a transmission medium. This limits
the distance any medium can carry the data. Repeaters are used to repeat (amplify and regenerate) the signal that
allows it to travel farther, increasing the size of the network.
A repeater is an electronic device that can connect two LAN segments together. They do not have the intelligence to
connect different network architectures, such Ethernet with a Token Ring.
Repeaters can convert data from one cable type to another cable type i.e they can be used with multiple cable types.
Repeaters are two types.
a. Amplifiers: They simply amplify the signal as well as the noise.
b. Signal-regenerator: They reconstruct the damaged data by reducing the noise in the desired data and retransmit
the data with its original strength.
LAN LAN
Repeater
Computer Computer Computer Computer Computer
A B C D E
Bridges :
Bridges are used to connect network segments with similar topologies.
Like repeater, bridges do not pass on all the signals they receive. Rather they read the physical address of the source
and the destination computers to determine where the two communication devices are located so that to reduce
transmission traffic. Therefore, they are often used to increase performance on high traffic network segment.
A bridge works in a somewhat the following way
1. A bridge receives all the signals for both segment A and B.
2. the bridge reads the address and discards (filters) all signals from segment A that are addressed to the
computer on the same segment A, because they don’t need cross the bridge.
3. Signals from segment A that addressed to a computer on segment B are retransmitted to segment B with
no amplification of the noise.
4. The signals from segment B are treated in the same way.
Bridges can’t connect dissimilar network types. Rather it connects two LAN segment to make one logical network, in
which computers do no know whether they are connected to a LAN or a bridged LAN. The two segments may use
different cable types. Bridges are of two types:
17
1. Transparent Bridges: They keep a table of NIC addresses to know which data to pass and which should
be filtered. They determine where to send data.
2. Source routing Bridges: They require the entire route to be included in the transmission and do not route
packets intelligently. IBM Token Ring networks use this type of bridge. These bridges, instead of
depending on NIC addresses, use information in the token ring frame to determine whether to pass the data
or not.
Inter-Network Connectivity Devices:
These devices are used to connect two different networks having the same of different protocols. They are used to
expand a Local Area Network so that to make a Wide Area Network from it.
1. Routers: Routers are highly intelligent devices that connect independent networks with protocols that function
in similar ways.
Routers are the combination of hardware and software, i.e they are special computers. Hardware components
comprise the physical interface to the various networks in the inter-network. These interface are, for instance,
Ethernet, TI, Frame Relay, ATM, etc. Software component of the routers consist of Operating System and
routing protocols.
Network A Network B
Router 1
Router 3
Network C
Router 2
Network D
3. BNC connector
The BNC connector (Bayonet Neill–Concelman) is a common type of RF connector used for coaxial cable. It is
used with radio, television, and other radio-frequency electronic equipment, test instruments, video signals, and
was once a popular computer network connector. BNC connectors are made to match the characteristic impedance
of cable at either 50 ohms or 75 ohms. It is usually applied for frequencies below 3 GHz and voltages below 500
Volts. Similar connectors using the bayonet connection principle exist, and a threaded connector is also available.
What is an IP Address?
No doubt you've heard the term "IP address." Unless you're a techie, though, you may not have more than a shadowy
notion of what an IP address actually is or how it works. Let's explore the concept.
An IP address is a fascinating product of modern computer technology designed to allow one computer (or other
digital device) to communicate with another via the Internet. IP addresses allow the location of literally billions of
digital devices that are connected to the Internet to be pinpointed and differentiated from other devices. In the same
sense that someone needs your mailing address to send you a letter, a remote computer needs your IP address to
communicate with your computer.
18
"IP" stands for Internet Protocol, so an IP address is an Internet Protocol address. What does that mean? An Internet
Protocol is a set of rules that govern Internet activity and facilitate completion of a variety of actions on the World
Wide Web. Therefore an Internet Protocol address is part of the systematically laid out interconnected grid that
governs online communication by identifying both initiating devices and various Internet destinations, thereby making
two-way communication possible.
An IP address consists of four numbers, each of which contains one to three digits, with a single dot (.) separating each
number or set of digits. Each of the four numbers can range from 0 to 255. Here's an example of what an IP address
might look like: 78.125.0.209. This innocuous-looking group of four numbers is the key that empowers you and me to
send and retrieve data over our Internet connections, ensuring that our messages, as well as our requests for data and
the data we've requested, will reach their correct Internet destinations. Without this numeric protocol, sending and
receiving data over the World Wide Web would be impossible.
IP addresses can be either static or dynamic. Static IP addresses never change. They serve as a permanent Internet
address and provide a simple and reliable way for remote computers to contact you. Static IP addresses reveal such
information as the continent, country, region, and city in which a computer is located; the ISP (Internet Service
Provider) that services that particular computer; and such technical information as the precise latitude and longitude of
the country, as well as the locale, of the computer. Many websites provide IP address look-up services to their visitors,
free of charge. If you're curious about your own IP address, you can locate these websites by performing a Google
search.
Dynamic IP addresses are temporary and are assigned each time a computer accesses the Internet. They are, in effect,
borrowed from a pool of IP addresses that are shared among various computers. Since a limited number of static IP
addresses are available, many ISPs reserve a portion of their assigned addresses for sharing among their subscribers in
this way. This lowers costs and allows them to service far more subscribers than they otherwise could.
Static IP addresses are generally preferable for such uses as VOIP (Voice over Internet Protocol), online gaming, or
any other purpose where users need to make it easy for other computers to locate and connect to them. Easy access can
also be facilitated when using a dynamic IP address through the use of a dynamic DNS service, which enables other
computers to find you even though you may be using a temporary, one-time IP address. This often entails an extra
charge, however, so check with your ISP.
Static IP addresses are considered somewhat less secure than dynamic IP addresses, since they are easier to track for
data mining purposes. However, following safe Internet practices can help mitigate this potential problem and keep
your computer secure no matter what type of IP address you use.
IPv4
Internet Protocol version four, or IPv4, is a system of addresses used to identify devices on a network. Originally
described in 1981 in RFC791, IPv4 is the most widely used Internet layer protocol, and at this point is used by the vast
majority of users to connect to the Internet.
IPv4 addresses are actually 32-bit numbers. This means that there are 2 32, or just over four billion, possible addresses.
Over time, however, it has become clear that more addresses than this will be required to ensure ongoing growth of the
Internet. The unused pool of IPv4 addresses is predicted run out in the next two years, so an alternative is required.
IP
1. Short for Internet Protocol, IP is an address of a computer or other network device on a network using IP or TCP/IP.
For example, the number "166.70.10.23" is an example of such an address. These addresses are similar to an addresses
used on a house and is what allows data to reach the appropriate destination on a network.
There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E, while only A, B and C
are commonly used. Each class allows for a range of valid IP addresses. Below is a listing of these addresses.
IPv6
Internet Protocol version 6 (IPv6) is a version of the Internet Protocol (IP). It is designed to succeed the Internet
Protocol version 4 (IPv4). The Internet operates by transferring data between hosts in small packets that are
independently routed across networks as specified by an international communications protocol known as the Internet
Protocol.
Data Rate:
Data rate of a signal is the rate, in bits per second that data are transmitted. The duration or length of a bit is the
amount of time it takes for the transmitter to release the bit; for a Data Rate R, the bit duration is 1/R.
Baud Rate:
The baud rate of a data communications system is the number of symbols per second transferred. A symbol may have
more than two states, so it may represent more than one binary bit (a binary bit always represents exactly tow states).
Therefore the baud rate may not equal the bit, especially in the case of recent modems, which can have (for example)
up to nine bits per symbol.
Intranet
An intranet is a private network that is setup and controlled by an organization to encourage interaction among its
members, to improve efficiency and to share information, among other things. Information and resources that are
shared on an intranet might include: organizational policies and procedures, announcements, information about new
products, and confidential data of strategic value.
An intranet is a restricted-access network that works much like the Internet, but is isolated from it. As is the case with
the Internet, an intranet is based on TCP/IP protocols. Therefore, a web page in an intranet may look and act just like
any other webpage on the Internet, but access is restricted to authorized persons and devices. In some cases, access to
an intranet is restricted by not connecting it to other networks, but in other cases a firewall is used to deny access to
unauthorized entities.
The difference between an intranet and the Internet is defined in terms of accessibility, size and control. Unless content
filters are being used or the government is censoring content, all the Internet’s content is accessible to everyone. On
the other hand an intranet is owned and controlled by a single organization that decides which members are allowed
access to certain parts of the intranet. In general, an intranet is usually very small and is restricted to the premises of a
single organization.
Extranet
An extranet is an extended intranet. In addition to allowing access to members of an organization, an extranet uses
firewalls, access profiles, and privacy protocols to allow access to users from outside the organization. In essence, an
extranet is a private network that uses Internet protocols and public networks to securely share resources with
customers, suppliers, vendors, partners, or other businesses.
Both intranets and extranets are owned, operated and controlled by one organization. However, the difference between
intranets and extranets is defined in terms of who has access to the private network and the geographical reach of that
20
network. Intranets allow only members of the organization to access the network, while an extranet allows persons
from outside the organization (i.e. business partners and customers) to access the network. Usually, network access is
managed through the administration of usernames and passwords, which are also used to determine which parts of the
extranet a particular user can access.
Internet
The Internet is a global system of interconnected computer networks that use the standard Internet protocol suite
(TCP/IP) to link several billion devices worldwide. It is a network of networks that consists of millions of private,
public, academic, business, and government networks of local to global scope, linked by a broad array of electronic,
wireless, and optical networking technologies. The Internet carries an extensive range of information resources and
services, such as the inter-linked hypertext documents and applications of the World Wide Web (WWW), the
infrastructure to support email, and peer-to-peer networks for file sharing and telephony.