Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

UNIT-2

Internet Connectivity& Network

Internet Connectivity:-
Internet Service Providers (ISP)
Internet Service Provider (ISP) is a company offering access to internet. They offer various
services:
 Internet Access
 Domain name registration
 Dial-up access
 Leased line access
ISP Types
ISPs can broadly be classified into six categories as shown in the following diagram:

Access providers
They provide access to internet through telephone lines, cable wi-fi or fiber optics.
Mailbox Provider
Such providers offer mailbox hosting services.
Hosting ISPs
Hosting ISPs offers e-mail, and other web hosting services such as virtual machines, clouds etc.
Virtual ISPs
Such ISPs offer internet access via other ISP services.
Free ISPs
Free ISPs do not charge for internet services.
Connection Types
There exist several ways to connect to the internet. Following are these connection types
available:
1. Dial-up Connection
2. ISDN
3. DSL
4. Cable TV Internet connections
5. Satellite Internet connections
6. Wireless Internet Connections
Dial-up Connection
Dial-up connection uses telephone line to connect PC to the internet. It requires a modem to
setup dial-up connection. This modem works as an interface between PC and the telephone line.
There is also a communication program that instructs the modem to make a call to specific
number provided by an ISP.
Dial-up connection uses either of the following protocols:
1. Serial Line Internet Protocol (SLIP)
2. Point to Point Protocol (PPP)
The following diagram shows the accessing internet using modem:

ISDN
ISDN is acronym of Integrated Services Digital Network. It establishes the connection using
the phone lines which carry digital signals instead of analog signals.
There are two techniques to deliver ISDN services:
1. Basic Rate Interface (BRI)
2. Primary Rate Interface (PRI)
Key points:
 The BRI ISDN consists of three distinct channels on a single ISDN line: t1o 64kbps B
(Bearer) channel and one 16kbps D (Delta or Data) channels.
 The PRI ISDN consists of 23 B channels and one D channels with both have operating
capacity of 64kbps individually making a total transmission rate of 1.54Mbps.
The following diagram shows accessing internet using ISDN connection

DSL
DSL is acronym of Digital Subscriber Line. It is a form of broadband connection as it provides
connection over ordinary telephone lines.
Following are the several versions of DSL technique available today:
1. Asymmetric DSL (ADSL)
2. Symmetric DSL (SDSL)
3. High bit-rate DSL (HDSL)
4. Rate adaptive DSL (RDSL)
5. Very high bit-rate DSL (VDSL)
6. ISDN DSL (IDSL)
All of the above mentioned technologies differ in their upload and download speed, bit transfer
rate and level of service.
The following diagram shows that how we can connect to internet using DSL technology:
Cable TV Internet Connection
Cable TV Internet connection is provided through Cable TV lines. It uses coaxial cable which is
capable of transferring data at much higher speed than common telephone line.
Key Points:
 A cable modem is used to access this service, provided by the cable operator.
 The Cable modem comprises of two connections: one for internet service and other for
Cable TV signals.
 Since Cable TV internet connections share a set amount of bandwidth with a group of
customers, therefore, data transfer rate also depends on number of customers using the
internet at the same time.
The following diagram shows that how internet is accessed using Cable TV connection:
Satellite Internet Connection
Satellite Internet connection offers high speed connection to the internet. There are two types of
satellite internet connection: one way connection or two way connection.
In one way connection, we can only download data but if we want to upload, we need a dialup
access through ISP over telephone line.
In two way connection, we can download and upload the data by the satellite. It does not require
any dialup connection.
The following diagram shows how internet is accessed using satellite internet connection:

Wireless Internet Connection


Wireless Internet Connection makes use of radio frequency bands to connect to the internet and
offers a very high speed. The wireless internet connection can be obtained by either WiFi or
Bluetooth.

Key differences between the Network and Internet

A network is a collection of two or multiple connected computer systems that may share resources,
such as an internet connection, an app, a printer, etc. In contrast, the internet is a network of
interconnected devices that are spread around the globe.

Levels of Internet Connectivity


 Level 1 - Access through a gateway
 Level 2 - Access via modem to host connected to network
 Level 3 - Direct Internet Access

Level 1 Connectivity

 Services are limited to what gateway supports


 Examples
o Department's / University's Computer Network.
o America On-Line, Compuserve, Prodigy, etc.
o Sub-network is not really on the Internet but has access to it in
accordance with traffic allowed through gateway

Level 2 Connectivity

 Services are limited to what the connected-to host (H2) provides


 Everything is accomplished through the H2
 File transfers from Internet to H1 require two downloads: Internet
to H2 and H2 to H1
 Level 2 connectivity is the most prevalent of Internet access

Level 3 Connectivity for Consumer

 Some local companies provide Serial Line Interface Protocol


(SLIP) or Point-to-Point Protocol (PPP) Internet access
What is a modem?
A modem is a network device that both modulates and demodulates analog carrier signals (called sine
waves) for encoding and decoding digital information for processing. Modems accomplish both of these
tasks simultaneously and, for this reason, the term modem is a combination of “modulate” and
“demodulate.”

Modem stands for Modulator and Demodulator. It is a device that modulates signals to encode
digital information for transmission and demodulates signals to decode the transmitted
information.
A modem transmits data in bits per second (bps).
It is necessary for communication between digital devices and Analog devices.
Modem is necessary because it acts as a translator between the devices and rapidly transmits the
information.
It converts the digital signal to Analog and vice versa to communicate between devices.

It encodes the signal and decodes at the other end and vice versa between the devices.

Dedicated connections through the telephone system:-


The term dedicated line can be traced back to the origins of the
telephone call. In its simplest terms it means a permanent connection
between two participants. In the early days, this really meant an actual
phone cable between two callers.

Dedicated Lines:-

A dedicated line is a type of always-on connection that is established between two


communications devices (unlike a dial-up line where the connection is reestablished each time it
is used). The quality and consistency of the connection on a dedicated line are better than a dial-
up line because dedicated lines provide a constant connection.

Businesses often use dedicated lines to connect geographically distant offices. Dedicated lines
can be either analog or digital. Digital lines increasingly are connecting home and business users
to networks around the globe because they transmit data and information at faster rates than
analog lines.

Five types of digital dedicated lines are ISDN lines, DSL, FTTP, T-carrier lines, and ATM.

Integrated Services Digital Network (ISDN):-


These are a set of communication standards for simultaneous digital transmission of
voice, video, data, and other network services over the traditional circuits of the public
switched telephone network. Before Integrated Services Digital Network (ISDN), the
telephone system was seen as a way to transmit voice, with some special services
available for data. The main feature of ISDN is that it can integrate speech and data on
the same lines, which were not available in the classic telephone system.
ISDN is a circuit-switched telephone network system, but it also provides access to
packet-switched networks that allows digital transmission of voice and data. This
results in potentially better voice or data quality than an analog phone can provide. It
provides a packet-switched connection for data in increments of 64 kilobit/s. It provided
a maximum of 128 kbit/s bandwidth in both upstream and downstream directions. A
greater data rate was achieved through channel bonding. Generally, ISDN B-channels
of three or four BRIs (six to eight 64 kbit/s channels) are bonded.
In the context of the OSI model, ISDN is employed as the network in data-link and
physical layers but commonly ISDN is often limited to usage to Q.931 and related
protocols. These protocols introduced in 1986 are a set of signaling protocols
establishing and breaking circuit-switched connections, and for advanced calling
features for the user. ISDN provides simultaneous voice, video, and text transmission
between individual desktop videoconferencing systems and group videoconferencing
systems.

ISDN Services:
ISDN provides a fully integrated digital service to users. These services fall into 3
categories- bearer services, teleservices, and supplementary services.
1. Bearer Services –
Transfer of information (voice, data, and video) between users without the network
manipulating the content of that information is provided by the bearer network.
There is no need for the network to process the information and therefore does not
change the content. Bearer services belong to the first three layers of the OSI model.
They are well defined in the ISDN standard. They can be provided using circuit-
switched, packet-switched, frame-switched, or cell-switched networks.

2. Teleservices –
In this, the network may change or process the contents of the data. These services
correspond to layers 4-7 of the OSI model. Teleservices rely on the facilities of the
bearer services and are designed to accommodate complex user needs. The user
need not be aware of the details of the process. Teleservices include telephony,
teletex, telefax, videotex, telex, and teleconferencing. Though the ISDN defines
these services by name yet they have not yet become standards.

3. Supplementary Service –
Additional functionality to the bearer services and teleservices are provided by
supplementary services. Reverse charging, call waiting, and message handling are
examples of supplementary services which are all familiar with today’s telephone
company services.

Principle of ISDN:
The ISDN works based on the standards defined by ITU-T (formerly CCITT). The
Telecommunication Standardization Sector (ITU-T) coordinates standards for
telecommunications on behalf of the International Telecommunication Union (ITU) and
is based in Geneva, Switzerland. The various principles of ISDN as per ITU-T
recommendation are:

 To support switched and non-switched applications

 To support voice and non-voice applications

 Reliance on 64-kbps connections

 Intelligence in the network

 Layered protocol architecture

 Variety of configurations

Advantages of ISDN:

 ISDN channels have a reliable connection.


 ISDN is used to facilitate the user with multiple digital channels.
 It has faster data transfer rate.

Disadvantages of ISDN:

 ISDN lines costlier than the other telephone system.


 It requires specialized digital devices.
 It is less flexible.
Serial Line Internet Protocol (SLIP) and
Point-to-Point Protocol (PPP):-

Both SLIP and PPP are most common TCPIP modem protocols used for establishing
dial-up internet connection. SLIP stands for Serial Line Internet protocol and PPP stands
for Point-to-Point Protocol. Initially SLIP was introduced, which has few limitations and
hence was later replaced by PPP. Now PPP is the most common protocol used to
establish internet connection. This page covers difference between SLIP and
PPP protocols. SLIP is described in RFC 1055 and PPP is described in RFC1661.

SLIP
The function of the SLIP is to transmit IP datagrams across modem line. SLIP data
format consists of data followed by special END character(decimal 192) which marks
end of the data. To avoid false stop in case data itself contains END character, then SLIP
adds ECS character before actual END character so that receiver will be able to receive
complete message/data. RFC 1055 specifies maximum packet size as 1006 bytes.
Characteristics and deficiencies of SLIP protocol:

• Both the computers(sender and receiver) must know each other's IP address in order to
communicate. SLIP does not support DHCP which is used to assign dynamic IP. Hence it
is not appropriate to be used by most of the ISPs of providing dial-up internet services.
• It does not have type field and hence there is no way to specify protocol type. Hence
SLIP can not be used for multiple protocol functionalities. This is take care by PPP. Also
SLIP can not multiplex and demultiplex other protocol systems along with TCPIP, the
same is supported by PPP.
• SLIP does not take care of error correction, this need to be done by upper layers.
• SLIP does not support header compression and hence is not ideal for slow speed
internet connection.
PPP
As mentioned PPP is designed to overcome the shortcomings studied with the
introduction of SLIP. PPP is divided into 3 basic functionalities as outlined below.
• Method of encapsulation of multiprotocol datagrams.
• LCP(Link Control Protocol) used by PPP to establish,manage and to terminate the dial
up connections.
• NCPs(Network Control Protocols) to support upper layer protocols.
PPP frame consists of protocol field,followed by data and then padding. The data part
carry control packet or upper layer datagrams. protocol field is 1 or 2 bytes long and
identifies protocol type of the enclosed packet. Possible types can be LCP packet,NCP
packet,IP packet or OSI network layer protocol packet.

the Serial Line Internet Protocol (SLIP) and Point-to-Point Protocol (PPP) is that
Serial Line Internet Protocol is the Predecessor protocol of Point-to-Point Protocol.

Features of SLIP:
 Simple: SLIP is a simple protocol that does not include any error detection or
correction mechanisms.
 Efficient: SLIP is an efficient protocol that does not include any unnecessary
overhead, which makes it ideal for low-bandwidth connections.
 Supported by many operating systems: SLIP is supported by many operating
systems, including Windows and Linux.
 Used for point-to-point connections: SLIP is used to establish a point-to-point
connection between two network devices.

Features of PPP:

 Authentication: PPP includes authentication mechanisms such as Password


Authentication Protocol (PAP) and Challenge Handshake Authentication Protocol
(CHAP) to ensure secure communication.
 Error detection and correction: PPP uses error detection and correction mechanisms
such as CRCs and acknowledgments to ensure the integrity of the transmitted data.
 Network layer protocol independence: PPP is independent of the network layer
protocol being used, making it compatible with various network protocols.
 Multilink support: PPP supports multilink connections, which allow multiple
physical connections to be combined to increase the data transmission rate.

Similarities between SLIP and PPP:

 Both are used to establish a point-to-point connection between two network devices.
 Both are widely used in various communication systems and have been standardized
by international organizations.
 Both are used for transmitting data over serial connections.
 Both can be used with a variety of networking hardware, including modems and
serial cables.

Let’s see the difference between SLIP and PPP:

Parameters SLIP PP
SLIP stands for Serial Line
Internet Protocol. PPP stands for Point-to-Point Protocol.
Stands for

SLIP is a deprecated PPP is a successor protocol that


protocol that is still in use in accomplishes the same goal but adds a
Basics some places like IBM OS. few more capabilities.

Predecessor / SLIP is a Predecessor


PPP is a Successor protocol of SLIP.
Successor protocol of PPP.

SLIP encloses the Internet


PPP encloses the datagram.
Encloses Protocol (IP) packet.

SLIP does not provide


PPP provides two-way authentication.
Authentication authentication.

Derived The derived Protocol from While the derived protocol from PPP is
protocol SLIP is Compressed SLIP. PPP over Ethernet and PPP over ATM.

IP address SLIP is a static IP PPP is a dynamic IP addressing


assignment addressing assignment. assignment.

Data transfer In SLIP data is transferred in While in this, data is transferred in both
type synchronous form. synchronous and asynchronous form.

It works only with TCP/IP.


There is no method to
indicate protocol type
because it lacks a type field. It can be used with multiple protocols.
As a result, SLIP cannot be
Supported utilized to perform numerous
Protocols protocol functions.

It offers error detection (using checksum


It does not support error
Error detection to detect transmission errors) or
detection or compression.
or compression compression.
PPP adds a header and padding
Each packet is simply given
information at the end of a packet before
an end character by SLIP.
Transmission sending it.

SLIP can be used in the PPP should be used only in those


applications where PPP is applications where it is required
not much required to be used otherwise it is a waste of bandwidth as
because of its minimal header and padding will always be
When to use it? overhead. associated with packet sending.
PPP can auto-configure its connection
parameters during initialization. The
SLIP requires the settings to whole process works in the following
be coded in advance in order way- firstly, the client and host converse,
to make a successful and then they agree on the appropriate
connection. parameters to use. In this way, most
settings do not need to be input
Auto-configure manually, auto-configuration makes
settings setup much easier.

Conclusion :

SLIP and PPP are both protocols used for communication over serial connections, but
they differ in several key aspects, including authentication, network layer protocols,
error detection and correction, frame size, flexibility, and compatibility. While SLIP is
a simpler and more lightweight protocol, PPP is more modern and offers more features,
such as authentication and support for multiple network layer protocols.
What Does Shell Mean?
A shell is software that provides an interface for an operating system’s users to provide access to
the kernel’s services.

What is an Email
Email stands for Electronic Mail. It is a method to sends messages from one computer
to another computer through the internet. It is mostly used in business, education,
technical communication, document interactions. It allows communicating with people
all over the world without bothering them. In 1971, a test email sent Ray Tomlinson to
himself containing text.
It is the information sent electronically between two of more people over a network. It
involves a sender and receiver/s.

Why use E – Mail?

An email is communication that happens in real time and can get important data across
to people in various geographies. An email is a record of the communications that has
happened and is stored in the server of the organization. One has to be very cautious
while typing out a mail.

History of Email

The age of email services is older than ARPANET and the Internet. The early emails
were only sent to the same computer. Email services started in 1971 by Ray Tomlinson.
He first developed a system to send mail between users on different hosts across the
ARPANET, using @ sign with the destination server and was recognized as email.
Why use E – Mail?

An email is communication that happens in real time and can get important data across
to people in various geographies. An email is a record of the communications that has
happened and is stored in the server of the organization. One has to be very cautious
while typing out a mail.

History of Email

The age of email services is older than ARPANET and the Internet. The early emails
were only sent to the same computer. Email services started in 1971 by Ray Tomlinson.
He first developed a system to send mail between users on different hosts across the
ARPANET, using @ sign with the destination server and was recognized as email.
Uses of Email
Email services are used in various sectors, organizations, either personally, or among a
large group of people. It provides an easy way to communicate with individuals or
groups by sending and receiving documents, images, links, and other files. It also
provides the flexibility of communicating with others on their own schedule.
Large or small companies can use email services to many employees, customers. A
company can send emails to many employees at a time. It becomes a professional way
to communicate. A newsletters service is also used to send company advertisements,
promotions, and other subscribed content to use advertisements, promotions.

What is World Wide Web?


World Wide Web, which is also known as a Web, is a collection of websites or web pages stored
in web servers and connected to local computers through the internet. These websites contain
text pages, digital images, audios, videos, etc. Users can access the content of these sites from
any part of the world over the internet using their devices such as computers, laptops, cell
phones, etc. The WWW, along with internet, enables the retrieval and display of text and media
to your device.
The building blocks of the Web are web pages which are formatted in HTML and connected by
links called "hypertext" or hyperlinks and accessed by HTTP. These links are electronic
connections that link related pieces of information so that users can access the desired
information quickly. Hypertext offers the advantage to select a word or phrase from text and thus
to access other pages that provide additional information related to that word or phrase.

A web page is given an online address called a Uniform Resource Locator (URL). A particular
collection of web pages that belong to a specific URL is called a website,
e.g., www.facebook.com, www.google.com, etc. So, the World Wide Web is like a huge
electronic book whose pages are stored on multiple servers across the world.

Small websites store all of their WebPages on a single server, but big websites or organizations
place their WebPages on different servers in different countries so that when users of a country
search their site they could get the information quickly from the nearest server.

What is news firewall?


Within any credible news organization, a firewall exists between those carrying out the
journalism, including journalists and editors (often referred to as the “newsroom”) and everyone
else in the organization.

What is a computer network?


A computer network is a group of interconnected nodes or computing devices that
exchange data and resources with each other. A network connection between these
devices can be established using cable or wireless media. Once a connection is
established, communication protocols -- such as TCP/IP, Simple Mail Transfer
Protocol and Hypertext Transfer Protocol -- are used to exchange data between the
networked devices.

A computer network must be physically and logically designed in such a way that
makes it possible for the underlying network elements to communicate with each
other. This layout of a computer network is known as the computer network
architecture.

Types of area networks – LAN, MAN, and WAN:-

LAN stands for local area network. It is a group of network devices that allow
communication between various connected devices. Private ownership has control over
the local area network rather than the public. LAN has a short propagation delay than
MAN as well as WAN. It covers smaller areas such as colleges, schools, hospitals, and
so on.

MAN stands for metropolitan area network. It covers a larger area than LAN such as
small towns, cities, etc. MAN connects two or more computers that reside within the
same or completely different cities. MAN is expensive and should or might not be
owned by one organization.
WAN stands for wide area network. It covers a large area than LAN as well as a MAN
such as country/continent etc. WAN is expensive and should or might not be owned by
one organization. PSTN or satellite medium is used for wide area networks.

Differences between LAN, MAN, and WAN


Basis LAN MAN WAN

MAN stands for


LAN stands for local WAN stands for wide
metropolitan area
area network. area network.
Full-Form network.

Operates in small
Operates in larger areas
areas such as the Operates in large
such as country or
Geographic same building or areas such as a city.
continent.
Span campus.

Ownership LAN’s ownership is MAN’s ownership While WAN also might


can be private or not be owned by one
private. public. organization.

The transmission While the


Whereas the transmission
Transmission speed of a LAN is transmission speed of
speed of a WAN is low.
Speed high. a MAN is average.

The propagation There is a moderate Whereas, there is a long


Propagation delay is short in a propagation delay in propagation delay in a
delay LAN. a MAN. WAN.

Whereas there is more


There is less While there is more
congestion than MAN in
congestion in LAN. congestion in MAN.
Congestion WAN.

Whereas WAN’s design


LAN’s design and While MAN’s design
and maintenance are also
maintenance are and maintenance are
Design & difficult than LAN as well
easy. difficult than LAN.
Maintenance MAN.

There is more fault While there is less In WAN, there is also less
Fault tolerance tolerance in LAN. fault tolerance. fault tolerance.

 Network Node Definition


A network node can be defined as the connection point among network devices such as routers,
printers, or switches that can receive and send data from one endpoint to the other.

OR
A network node can be defined as the connection point among network
devices such as routers, printers, or switches that can receive and send data
from one endpoint to the other.

Host –
any computer connected to a network. It can provide information, applications or services to other hosts
or nodes on the network. Some examples include, but are not limited to, computers, personal electronic
devices, thin clients, and multi-functional devices.

Workstation
A workstation refers to an individual computer, or group of computers, used by a single user to
perform work.

For example, a "workstation" may be an average-powered computer connected to a


larger network. It can also refer to a powerful computer intended for serious academic or
professional computation.

Introduction to Bandwidth
Overview :

Bandwidth, or precisely network bandwidth, is the maximum rate at which data transfer
occurs across any particular path of the network. Bandwidth is basically a measure of
the amount of data that can be sent and received at any instance of time. That simply
means that higher is the bandwidth of a network, larger is the amount of data network
can be sending to and from across its path. Be careful not to confuse bandwidth with
closely related terms such as the data rate and the throughput. Bandwidth is something
that deals with the measurement of capacity and not the speed of data transfer.

Interoperability
Interoperability is the property that allows for the unrestricted sharing of resources between different
systems. This can refer to the ability to share data between different components or machines, both via
software and hardware, or it can be defined as the exchange of information and resources between
different computers through local area networks (LANs) or wide area networks (WANs). Broadly
speaking, interoperability is the ability of two or more components or systems to exchange information
and to use the information that has been exchanged.

Network Administrator
A network administrator is an IT expert who manages an organization’s network. The network
administrator must possess a high level of technological knowledge and is most commonly the
highest level of technical staff within a given organization. Network administrators keep
networks operational and monitor functions and operations within the network.
A network administrator is responsible for installing, maintaining and upgrading any software or
hardware required to efficiently run a computer network. The IT or computer network may extend to a
local area network, wide area network, the Internet and intranets.

Network Security
Network security is any activity designed to protect the usability and integrity of your network
and data.

 It includes both hardware and software technologies

 It targets a variety of threats

 It stops them from entering or spreading on your network

 Effective network security manages access to the network

How does network security work?


Network security combines multiple layers of defenses at the edge and in the network. Each
network security layer implements policies and controls. Authorized users gain access to
network resources, but malicious actors are blocked from carrying out exploits and threats.
How do I benefit from network security?
Digitization has transformed our world. How we live, work, play, and learn have all changed.
Every organization that wants to deliver the services that customers and employees demand must
protect its network. Network security also helps you protect proprietary information from attack.
Ultimately it protects your reputation.

You might also like