Unit 2

You might also like

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 33

Computer Networks

Internet
Security
Data Protection
 A “network” enables associated PCs to share documents and
information and also equipment assets,

Network  A network consists of two or more computers that are linked in


order to share resources (such as printers and CDs), exchange
files, or allow electronic communications. The computers on a
network may be linked through cables, telephone lines, radio
waves, satellites, or infrared light beams.
 A computer network is a set of computers sharing
resources located on or provided by network nodes.
Computer  The computers use common communication protocols
Network over digital interconnections to communicate with each
other.
ARPANET was the network that became the basis for the
Internet.
ARPANET It was the first network that came into existence in 1969, which
(Advanced was designed and named by the Advanced Research Projects
Research Agency Agency (ARPA) and US Department of Defence (DoD).
Network) It was where a bunch of PCs were associated at various colleges
and US DoD for sharing of information and messages and playing
long separation diversions and associating with individuals to
share their perspectives.
NSFNET In mid 80’s another federal agency, NSFNET (National Science
Federation Network) created a new network which was more
(National Science capable than ARPANET.
Federation It became the first backbone infrastructure for the commercial
Network) public Internet.
Its main aim was to use networks only for academic research and
not for any kind of private business activity.
 Many privately owned businesses with their very own private
systems joined with ARPANET and NSFNET to make a more
capable and wide network, the Internet.

 ARPANET + NSFNET + PRIVATE NETWORKS =


INTERNET
INTERNET
 The Internet, which is a network of networks, came into existence.
 The internet has evolved from ARPANET.
 It allows computers of different types to exchange information and
is known as the internet. 
 The following services are available
• Email
Internet • Web-enabled audio/video conferencing services
• Online movies and gaming
• Data transfer/file-sharing, often through File Transfer Protocol (FTP)
• Instant messaging
• Social networking
• Online shopping
• Financial services
 A computer network is mainly of four types:
• LAN(Local Area Network)
• PAN(Personal Area Network)
• MAN(Metropolitan Area Network)
• WAN(Wide Area Network)
Type of Network
 PAN (Personal Area Network) is a computer network formed
around a person.
 It generally consists of a computer, mobile, or personal digital
assistant.
 PAN can be used for establishing communication among
these personal devices for connecting to a digital network
PAN (Personal and the internet.
Area Network)
 A Local Area Network (LAN) is a group of computer and
peripheral devices which are connected in a limited area such
as a school, laboratory, home, and office building.
 It is a widely useful network for sharing resources like files,
printers, games, and other applications.
 The simplest type of LAN network is to connect computers and
a printer in someone’s home or office. 
LAN (Local Area
• It is a private network, so an outside regulatory body never
Network) controls it.
• LAN operates at a relatively higher speed compared to other
WAN systems.
 A Metropolitan Area Network or MAN is consisting of a
computer network across an entire city, college campus, or a
small region.
 Depending upon the type of configuration, this type of network
allows you to cover an area from several miles to tens of miles.

MAN • It mostly covers towns and cities in a maximum 50 km range


(Metropolitan Area • Mostly used medium is optical fibres, cables
Network)
• MAN is used in communication between the banks in a city.
Uses Of
• It can be used in an Airline Reservation.
Metropolitan Area
Network • It can be used in a college within a city.
• It can also be used for communication in the military.
 WAN (Wide Area Network) is another important computer
network that is spread across a large geographical area.
 A WAN network system could be a connection of a LAN which
connects with other LANs using telephone lines and radio
waves.

WAN (Wide Area


Network)
• Mobile Broadband: A 4G network is widely used across a
region or country.
• Last mile: A telecom company is used to provide internet
Examples Of Wide services to customers in hundreds of cities by connecting their
Area Networks homes with fibre.
• Private network: A bank provides a private network that
connects the 44 offices. This network is made by using the
telephone leased line provided by the telecom company.
• An internetwork is defined as two or more computer network
LANs or WAN or computer network segments are connected
using devices, and they are configured by a local addressing

Internetwork scheme. This process is known as internetworking.


• An interconnection between public, private, commercial,
industrial, or government computer networks can also be
defined as internetworking.
• Internetworking uses the internet protocol.
• The reference model used for internetworking is Open System
Interconnection(OSI).
 1. Extranet: It is used for information sharing. Access to the extranet is
restricted to only those users who have login credentials. An extranet is the
lowest level of internetworking. It can be categorized as MAN, WAN or

Types Of other computer networks. An extranet cannot have a single LAN, at least it


must have one connection to the external network.
Internetwork
 2. Intranet: An intranet belongs to an organization which is only accessible
by the organization's employees or members. The main aim of the intranet
is to share information and resources among the organization’s employees.
An intranet provides the facility to work in groups and for teleconferences.
 The Internet Protocol (IP) is a protocol, or set of rules, for routing
and addressing packets of data so that they can travel across
networks and arrive at the correct destination. 
 Data traversing the Internet is divided into smaller pieces, called packets. IP
information is attached to each packet, and this information helps routers to
send packets to the right place. Every device or domain that connects to the

Internet Protocol Internet is assigned an IP address, and as packets are directed to the IP
address attached to them, data arrives where it is needed.
(IP)
 Once the packets arrive at their destination, they are handled differently
depending on which transport protocol is used in combination with IP.
 The most common transport protocols are TCP
 The Transmission Control Protocol (TCP) is a transport
protocol, meaning it dictates the way data is sent and received.
A TCP header is included in the data portion of each packet
that uses TCP/IP. Before transmitting data, TCP opens a
connection with the recipient. TCP ensures that all packets
arrive in order once transmission begins. Via TCP, the recipient
will acknowledge receiving each packet that arrives. Missing
TCP/IP packets will be sent again if receipt is not acknowledged.
 TCP is designed for reliability, not speed. Because TCP has to
make sure all packets arrive in order, loading data via TCP/IP
can take longer if some packets are missing.
 TCP and IP were originally designed to be used together, and
these are often referred to as the TCP/IP suite.
 The World Wide Web—commonly referred to as WWW,
W3, or the Web—is an interconnected system of
public web pages accessible through the Internet. 
World Wide Web
 A collection of websites or web pages stored in web servers and
connected to local computers through the internet. 
 The Internet is a worldwide network of devices like computers,
laptops, tablets, etc. It enables users to send emails to other
users and chat with them online. For example, when you send
an email or chat with someone online, you are using the
Difference between internet.
World Wide Web  when opening a website like google.com for information, the
and Internet World Wide Web works; a network of servers over the internet.
You request a webpage from your computer using a browser,
and the server renders that page to your browser. Your
computer is called a client who runs a program (web browser),
and asks the other computer (server) for the information it
needs.
 A search engine is a software system designed to
carry out web searches.
Search Engine  A search engine is a web-based tool that enables users
to locate information on the World Wide Web. Popular
examples of search engines are Google and Yahoo.
 A URL (Uniform Resource Locator) is a unique identifier used to
locate a resource on the Internet. It is also referred to as a web
address.
 Just as buildings and houses have a street addresses, web
pages also have unique addresses to help people locate them.
URL (Uniform On the Internet, these addresses are called URLs (Uniform
Resource Locator) Resource Locators).

 A URL has two main components:


• Protocol identifier: For the URL http://example.com, the protocol
identifier is HTTP.
• Resource name: For the URL http://example.com, the resource
name is example.com.
Sample Questions
IF A3 is equal to 50, show "Pass", otherwise, show "Fail”, which is correct option

=IF C3=70,"Pass","Fail"
=IF(C3=70,"Fail","Pass")
=IF(C3=70,Fail,Pass)
=IF(C3=70,"Pass","Fail")
Answer
=IF(C3=70,"Pass","Fail")
Show the total marks for all the students those are having more than 50 in the marketing
subject. Write the formula.
Answer
=SUMIF(B2:B10,"<=50")
Show the total number of students those are having more than 60 in the Economics subject.
Write the formula.
Answer
=COUNTIF(A2:A10, ">=50")
What will be the result if the formula =Count(A2:A10) is applied
 
What will be the result if the formula =Counta(A2:A10) is applied
 
What will be the result if the formula =Countblank(A2:A10) is applied
What will be the result if the formula =Count(A2:A10) is applied
=6
 
What will be the result if the formula =Counta(A2:A10) is applied
=10
 
What will be the result if the formula =Countblank(A2:A10) is applied
=2
Which values are able to type into
the cell if it has the following the
given data validation rule?
Answer
BBA, MBA and MTech

You might also like