Professional Documents
Culture Documents
Applications of Network
Applications of Network
Communication Media
Communication media of a network refer to the connecting media, through which
different computers in a network are interconnected together. The communication
media can also be referred as communication channels. The communication media
can be grouped into two categories:
Wired Technologies (Guided Media)
When the computers in a network are interconnected through a wire or cable, then
such a medium is categorised under wired technologies. Among wired
technologies, ethernet cable, co-axial cable, optical fiber, etc., are included.
1. Ethernet Cable It is also known as twisted pair cable. There are two identical
wires wrapped together and twisted around each other.
Advantages of Ethernet Cable
2. Co-axial Cable It consists of a solid core wire surrounded by foil shield, each
separated by some insulator. The inner solid core wire carries the signal through
the network and the shield is used to provide earthing or ground. Co-axial cable is
commonly used in transporting multi-channel television signals in cities.
Advantages of Co-axial Cable
The data transmission quality in co-axial cable is better than twisted pair
cable, yet it is affordable.
Co-axial cables can be used successfully in shared cable network.
It can be used effectively for broadband transmission.
1. It allows you to stay cord or cable free. So, you do not have to worry about
finding the correct place to connect that extra long cord.
2. Even though you are able to exchange data across your cell phones, you still
have the ability to keep your information private.
3. As it is already, but most likely it will be more dominant. You can use
bluetooth on laptops, cell phones, music players, headsets, printers and many
more other products.
Disadvantages of Bluetooth
1. You are using up more battery power, when you leave your bluetooth
enabled on your phone all day.
2. Throughout all devices, when using bluetooth Internet, the connection can
sometimes run very slow, so bluetooth Internet is not highly suggested for that
cases
2. Infrared In this type of transmission, infrared light signals are used. Infrared
signal are used in TV remotes, infrared wireless speakers, etc., as a mode of
transmission.
In infrared transmission, signals are transmitted through the air but these signals
cannot penetrate the walls.
Advantages of Infrared
Disadvantages of Infrared
3. Microwave In this type of transmission, signals are transmitted in the same way
as the radio and television transmission. The requirement for microwave
transmission is transmitter, receiver and the atmosphere. Under this mode of
transmission parabolic antennas are mounted on the towers. These antennas send
the signals in the atmospheric air. These signals are received by the receiver.
Advantages of Microwave
Using microwave, signals can be transmitted in the air without using cables.
Using microwave, communication is possible even in difficult terrain or over
oceans.
Disadvantages of Microwave
It is not a secured mode of communication.
Microwave communication is affected by weather conditions such as rain,
thunderstorms, etc.
4. Radio Link When two terminals are connected by using radio frequencies, then
such type of communication is referred as radiowave transmission or radio link.
Any radio transmission set-up has two parts viz., the transmitter and the receiver.
Both the transmitter and the receiver use antennas to send and receive the radio
signals.
Advantages of Radio Link
Disadvantages of Satellite
Types of Network
On the basis of coverage or geographical spread, a network can be divided into
following types:
1. Local Area Network (LAN) When the network of computer is confined to a
small or localised area such as school, office or building, it is known as Local Area
Network (LAN). Computers or users in a local area network can share data,
information, software and common hardware devices such as printer, modem, hard
disk, etc.
2. Metropolitan Area Network (MAN) A metropolitan area network is the
network which is spread over a city. The functions of a MAN is similar to LAN.
Like a LAN, computers in a MAN are also capable of sharing data, information,
software and hardware. The difference is only on the basis of geographical area
coverage.
3. Wide Area Network (WAN) The network of computers which is spread across
the countries probably over the entire world is known as a Wide Area Network
(WAN).
Network Topologies
The network topology refers to the arrangement or pattern of computers (i.e. nodes
or workstations), which are interconnected in a network.
Commonly used network topologies are as follows:
1. Bus Topology Bus topology is also referred as linear topology. Under this
arrangement, all nodes in the network are connected by a single length of
transmission medium, which is normally a co-axial cable. Both ends of the cable
are terminated by terminators. Data transmission from any workstation can travel
in both directions.
Advantages of Bus Topology
1. In bus topology, all nodes are connected through a single length of cable, so
very short cable length is used.
2. Extension of network is very easy in bus topology. We can connect new
nodes along its length.
1. When there is any problem in data communication with any node, whole
network stops functioning.
2. In case of any fault in data transmission, fault isolation is very difficult. We
have to check the entire network to find the fault.
2. Ring Toplogy In ring or circular topology, the nodes are connected in a circular
way. In such arrangement, each node is connected to exactly with its two
neighbouring nodes. In other words, when the last node in a bus network is
connected with first node and the entire network becomes circular network is
known as a network using ring topology.
Advantages of Ring Topology
1. In ring topology, each node is connected in a circular way with its two
neighbouring nodes, so when there is transmission problem anywhere in the
network, entire network stops functioning.
2. Fault diagnosis is very difficult in a network formed using ring topology.
1. The star topology is the most reliable as there is a direct connection of every
node in the network with the central node or server.
2. If there is any problem in connection with any node, other nodes in the
network are not affected.
1. Since, every node is directly connected with the central node or the server,
so a large quantity of the cable is required.
2. There is dependency on the central node. If there are some problems with
the central node, entire network stops functioning.
4. Mesh Topology A network set-up where each computer and network device is
interconnected with one another to provide an alternative route in case of the host
is down or busy.
Advantages of Mesh Topology
Network Devices
Network devices are the components used to connect computer and other
electronic devices together, so that they can share files or resources like printers or
fax machines. The most common type of network devices used by the public to set-
up a Local Area Network (LAN) are hub, switch, repeater and if online access is
desired, a high-speed modem.
1. Modem (Modulator/Demodulator) Modem is a device that converts digital
signal to analog signal (modulator) at the sender’s site and converts back analog
signal to digital signal (demodulator) at the receiver’s end, in order to make
communication possible via telephone lines.
Functions of Modem The essential function of a modem is to create an easily
transmitted and decode signal. Modem divides the information into packets called
frames. They minimise the error that occur while the transmission of signals.
Modems are of two types:
Internal Modem It refers to the modem that is fixed within a computer, e.g.
dial-up and wireless.
External Modem A modem that resides in a self-contained box outside
the computer system, e.g. USB modem, Cable modem.
Active Hub It amplifies the signals and passes from one connected device to
another. These hubs are working as repeaters to boost up the signals.
Passive Hub It simply passes signals from one connected device to another
without making any changes.
Inactive or active.
Where subscriber is in roaming.
If the response is ‘inactive’, then the SMSC will hold on to the message for a
period of time. When the subscriber access his device, the HLR sends a SMS
notification to the SMSC and the SMSC will attempt delivery. The system pages
the device and if it responds, the message gets delivered. The SMSC receives a
verification, that the message was received by the end user, then it is categorised
as, send message and will not attempt to send again.
3. Video Conferencing
By the name itself it is clear that it is the process of conferencing through video
talk. Basically, video conferencing is a type of conference, which takes place
between two or more participants by using computer networks to transmit audio
and video data. For such type of video conferencing each participants should have
a video camera, microphone and speakers in his computer set-up.
There are two types of video conferencing:
Point to Point
Multipoint.
3. Authentication
It provides a way of identify a user. It also known as the term of password
protection. The user is provided with an legal login-id and password by which
he/she is considered to be an authentic user and is allowed to see the password
protected data.
Network Security Concepts
Network security refers to the security of the network resources which are used and
guided by Internet as they are very much unwanted viruses and many other
problems which can damage the active files over the network. Some of the network
security concepts are described below:
1. Cookies
It is also known as browser cookies or tracking cookies. Cookies are small, often
encrypted text files, located in browser directories. They are used by web
developers to help users navigate their websites efficiently and perform certain
functions. Due to their core role of enhancing enabling usability or site processes,
disabling cookies may prevent users from using certain websites. Cookies are
created when a user’s browser loads a particular website. The website sends
information to the browser which then creates a text file. Computer cookies are
created not just by the website the user is browsing, but also by other websites that
run ads, widgets and other elements on the page being loaded. These cookies
regulate how the ads appear or how the widgets and other elements function on the
page.
2. Firewall
A system based on software or hardware designed to prevent unauthorised access
to or from a private network. Firewalls may be combination of hardware and
software. A firewall establishes a barrier between a trusted, secure internal network
(private network) and another network that is not assumed to be secure and’
trusted. All messages entering or leaving the Intranet (internal network) pass
through the firewall, which examines each message and blocks those that do not
meet the specified security criteria.
There are several types of firewall techniques:
1. Packet filter Looks at each packet entering or leaving the network and
accepts or rejects it based on user defined rules. Packets filtering is fairly
effective and transparent to users, but it is difficult to configure. In addition, it
is susceptible to IP spoofing.
2. Application gateway Applies security mechanism to specific applications,
such as FTP and Telnet servers. This is very effective, but can impose a
performance degradation.
3. Circuit-level gateway Applies security mechanism when a TCP or UDP
connection is established. Once the connection has been made, packets can
flow between the hosts without further checking.
4. Proxy server Intercepts all messages entering and leaving the network. The
proxy server effectively hides the true network addresses.
3. Cyber Law
Cyber law is a term that encapsulates legal issues related to the use of Internet. It is
less a distinct field of law than intellectual property or contract law, as it is a
domain covering many areas of rules and regulations. Some leading topics include
Internet access and usage, privacy, freedom of expression and jurisdiction.
4. Hacker
A hacker is someone who seeks and exploits weaknesses in a computer system or
computer network. Hacking is the practices of modifying the features of a system,
in order to accomplish a goal outside of the creator’s original purpose. Hackers
obtain advanced knowledge of operating systems and programming languages.
Hackers are most commonly associated with malicious programming attacks on
the Internet and other networks.
5. Cracker
A cracker is also called black hat hacker. A cracker is an individual with extensive
computer knowledge whose purpose is to breach or bypass Internet security or gain
access to the software without paying royalties. The general view is that, while
hackers build things, crackers break things. Cracker is the name given to hackers
who break into computers for criminal gain. Crackers’ motivations can range from
profit, a cause they believe in, general maliciousness or just because they like the
challenge. They may steal credit card numbers, leave viruses, destroy files, etc.
6. Trojan
A Trojan, or Trojan Horse, is a non-self-replicating type of malware which appears
to performs a desirable function but instead facilitates unauthorised access to the
user’s computer system. Trojans do not attempt to inject themselves into other files
like a computer virus. It may steal information, or harm their host computer
systems. Trojans may use drive-by downloads or install via online games or
Internet-driven applications in order to reach target computers. Unlike viruses,
Trojan horses, do not replicate themselves.
e.g. Beast, Sub7.Zeus, Zero Access Rootkit, etc.
W