1 3 COMPUTER NETWORKS AND NETWORK SECURITY 1. Definition of Computer Network: A network is a set of devices (also known as nodes, terminals or stations) interconnected by communication links. A computer network is collection of computers and terminal devices connected together by a communication system. 1.1 Scope of Network: File sharing; Print sharing, , Fax facility, Remote Access, Shared databases, Fault tolerance, Internet access and security, Communication and collaboration, Organization. 1.2 Benefits of using networks: Improve communication, Reduce costs and improve efficiency, Reduce errors. 2. Networks Classification 2.1 Function Based: Data Network, Voice Network, and Multimedia Network Data Networks: A communication network that transmits data Voice Networks: A communication network that transmits voice Multimedia Networks: A communications network that transmits data, voice, image, video etc. 2.2 Area Coverage Based: LAN, MAN, WAN Local Area Network (LAN): A high speed data transfer network that supports 1 Mbps to 30 Mbps or more Metropolitan Area Network (MAN): Based on Fiber Optic transmission technology that supports 10 Mbps transferring of data Wide Area Networks (WAN): Uses long distance telephone services and satellite transmission. It operates at lower link speeds of about 1 Mbps. 2.3 Forwarding Based: Switched Network, Shared Network and Hybrid Network Switched Network: Switched network is a type of network that provide switched communication system and in which users are connected with each other through the circuits, packets, sometimes message switching and the control devices Shared Networks: A shared network is also known as hubbed network which is connected with a hub. When packets arrive in to the network, all segments can see packets. LAN using hub is an example of shared networks Hybrid Networks: Network comprising the features of switched and shared networks. 2.4 Ownership Based: Public Network, Private Network, Virtual Private Network, and Leased Network.
2 3.2 Information Technology Public Networks: Networks established for all users across the world is known as public networks. Internet is an example of public networks Private Networks: Private network is used by particular organization, particular campus or particular enterprise only. This is a network that is not available to the outside world. Intranet is an example of it Virtual Private Networks: A virtual private network (VPN) is a network that uses a public network, such as the Internet, to provide secure access to organization's private network Leased Networks: Dedicated or leased lines exist to support network communication. 2.5 Media Based: Wired Network and Wireless Network Wired Networks: Networks communication supported by physical (wired) medium Wireless Networks: Networks communication supported by wireless medium. 2.6 Network Models: Client Server Model and Peer-to-peer Model Client Server Model: In Client-Server networks, servers are typically powerful computers running advanced network operating systems and user workstations (clients) access data or run applications located on the servers Peer-to-peer Model: In peer-to-peer architecture, there are no dedicated servers. All computers are equal, and therefore, are termed as peer and each of these machines functions both as a client and a server. Peer-to-Peer networks are designed for small to medium LANs. 3. Components of Network 3.1 Sender / Receiver: A host computer at both ends which sends and receives the data. 3.2 Communication Interface Devices: Network Interface Cards, Switches and Routers, Hubs, Bridges, Repeaters and Gateways, Modems, Multiplexer, Front-end communication processors, Protocol converters, Remote access devices. 3.3 Communication Channel: Guided Media (Twisted Pair cable, Coaxial cable and Optical Fiber cable) and Unguided Media (Radio waves, Micro waves, Infrared waves). 3.4 Communication Software Functions: Access control, Network management, Data and file transmission, Error detection and control, Data security. 4. Definition of Network Structure or Topology: Geometrical arrangement of computer resources, remote devices, and communication facilities to share the information. The four types of network topology are: 4.1 Star Topology: Communication channel controlled by Centralized System. 4.2 Bus Topology: Single network cable connected with node via communication line. 4.3 Ring Topology: Direct point-to-point link between two neighboring nodes with unidirectional mode of data transmission. 4.4 Mesh Topology: Random connection of nodes using communication links.
3 Computer Networks and Network Security Data Transmission Technologies: Transferring of data on a communication channel between sender and receiver determines by transmission techniques which include direction of exchanges of data, no. of bits sent and synchronization between the transmitter and receiver. 5.1 Serial versus Parallel transmission: Single path of data transmission serially versus multiple path of data transmission simultaneously. 5.2 Synchronous versus Asynchronous transmission: Data transmission based on regular versus irregular time interval. 5.3 Transmission modes: Characterized on the basis of direction of exchanges, they are classified into three categories: Simplex, Half-duplex and Full-duplex connection. 5.4 Transmission Techniques: Circuit switching, Message switching, Packet switching. 6. Transmission Protocols: Protocols are set of rules for communication between computers ensuring timings, sequencing, and error checking for data transmission. 6.1 Protocol Definition: Syntax, Semantics and Timing. 6.2 Open System Interconnection (OSI) Model: Application layer, Presentation layer, Session layer, Transport layer, Network layer, Data link layer, Presentation layer. 6.3 Transmission Control Protocol / Internet Protocol (TCP/IP): Application layer, Transport layer, Internet layer, Network Interface layer. 7. Definition of Local Area Network: A data transmission system intended to link computers and associated devices with in a restricted geographical area. It is useful for sharing resources like files, printers or other applications. 7.1 Benefits of using LAN: Security, Inexpensive workstation, Distributed processing, ing and message broadcasting, Organizational benefits, Data management benefits, Software cost and up-gradation. 7.2 LAN Requirements: Compatibility, Internetworking, Growth path and modularity, System reliability and maintenance. 7.3 Components of a LAN: File server, Network operating system, Workstations, Network Interface Card (NIC), Network cabling. 7.4 Wireless LAN: It is a flexible data communication systems that uses radio waves, micro waves and infrared waves to transmit and receive data over the air with minimizing the need for wired connections. 8. Client/Server Technology: A computing technology in which the hardware and software components are distributed across a network to accept the request sent by the client machine to the server machine for processing of data. 8.1 Limitation of the traditional computing models: Mainframe architecture, Personal computers, File sharing architecture. 8.2 Component of C/S technology: Client, Server, Middleware, Fat-client or Fat-server, Network.
4 3.4 Information Technology 9. Virtual Private Network (VPN): A private network that uses a public network (usually the Internet) to connect remote sites or users together with virtual connections routed through the Internet from the company s private network to the remote site or employee. Two types of VPNs are: Virtual Private Dial-up Network (VPDN) Site-to-Site VPN 10. Broad Band Networks (ISDN): System of digital phone connections to allow simultaneous voice and data transmission across the world. Two types of ISDN services are: 10.1 Basic Rate Interface (BRI): BRI consists of two 64 Kbps B channels and one 16 Kbps D channel suitable for individual users Primary Rate Interface (PRI): PRI consists of 23 B channels and one 64 Kbps D channel for users with higher capacity requirements. 11. Types of Servers 11.1 Database Servers, Application Servers (Web Information Server, Component Server, Active Application Server), Print Servers, and Transaction Servers Types of Internet Server : File Server, Mail Server, Gopher Server, Web Server, FTP Server, News Server, Chat Server, Caching Server, Proxy Server. 12. Network Tier Architectures: A tier is a distinct part of hardware or software. It comprises: 12.1 Single tier system: Single computer that contains a database and a front end to access the database Two tier system: Client at front-end and server at back-end Three tier system: provides process management with business logic and rules Multi tier system: An application is executed by more than one distinct software agent. 13. Definition of Data Centre: Centralized repository for the storage, management and dissemination of data and information with high security, fault-resistant facilities, hosting customer equipment that connects to telecommunication networks. Two types of data centers are: Private and Public Data Centre. Tier 1 data centre can tolerate upto 28.8 hours of downtime per year. Tier 4 data centre can tolerate upto 0.4 hours of downtime per year Value added services by Data Centre: Database monitoring, Web monitoring, Backup and restore, Intrusion detection system, Storage on demand Features of Data Centers: Size, Data Security, Availability of Data, Electrical and power systems, Security, Backup Systems, Continuous monitoring 24x7, Environment - cooling Data Center Protection challenges and Best Practice Solutions: Control skyrocketing data growth, System performance and scalability, Network congestion and connectivity
5 Computer Networks and Network Security 3.5 architecture, It administration and staff time at premium, Inadequate Disaster Recovery Plans, Adopting new risk prone, cost-effective data protection technologies and Resource balancing Disaster recovery sites: Cold site, Warm site, Hot site. 14. Network Security: Ensure safeguarding assets and maintain the data integrity within the system Need of Security: safeguard assets, ensure and maintain the data integrity Threats and Vulnerabilities Threats: Unstructured threats, Structured threats, External threats, Internal threats Vulnerabilities: Software bugs, Timing windows, insecure default configurations, Bad protocols, trusting Untrustworthy information, End users Level of Security: Preparing project plan for enforcing security, Assets identification, Assets valuation, Threats identification, Threats probability of occurrence assessment, Exposure analysis, Controls adjustment, and Report generation outlining the levels of security to be provided for individual systems, end users etc Network Security Techniques: Firewalls, IDS technologies IDS Technologies: Network Intrusion Detection, Host-based Intrusion Detection, Hybrid Intrusion Detection, Network-Node Intrusion Detection. Question 1 (a) Describe briefly, the following terms: (i) Switch (ii) Data Centre (iii) Repeaters (iv) DNS Server (v) MODEM (vi) VPDN (vii) Layer 3 or Network Layer (viii) Virtual Private Network (VPN) (ix) Protocol (x) Chat Server (xi) Wireless LAN (b) Explain each of the following: (i) Multiplexer (ii) (iii) Web Casting
6 3.6 Information Technology (a) (i) (ii) Switch: It is hardware device used to direct messages across a network. Switches create temporary point to point links between two nodes on a network and send all data along that link. Data Centre: It is a centralized depository for the storage, management and discrimination of data and information. It can be defined as highly secure, fault-resistant facilities, hosting customer equipment that connects to telecommunications networks. (iii) Repeaters: Repeaters are devices that solve the snag of signal degradation which results as data is transmitted along the cables. It boosts or amplifies the signals before passing it through to the next section of cable. (iv) DNS Server: Domain Name Service Server is an Internet-wide distributed database system that documents and distributes network specific information such as the associated IP address for a host name, and vice-versa. The host storing this database is a DNS server. (v) MODEM: It stands for Modulator/Demodulator and is an encoding as well as decoding device used in data transmission that converts a digital computer signal into an analog telephone signal (i.e. it modulates the signal) and converts an analog telephone signal into a digital computer signal (i.e. it demodulates the signal) in a data communication system. (vi) VPDN: VPDN (Virtual Private Dial-Up Network) is a user-to-lan connection used by a company that has employees who need to connect to the private network from various remote locations. (vii) Layer 3 or Network Layer: Network Layer corresponds to the layer 3 of the OSI model and enables a choice of the physical route of transmission of a message packet by Creating a virtual circuit for upper layers to make them independent of data transmission and switching. Establishing, maintaining, and terminating connections between the nodes. Ensuring proper routing of data. (viii) Virtual Private Network (VPN): It is a private network that uses a public network (usually the Internet) to connect remote sites or users together to provide secure access to organization s private network. Instead of using a dedicated, real-world connection such as leased line, a VPN uses virtual connections routed through the Internet from the company's private network to the remote site or employee. There are two types of VPN. A Remote-access VPN is a user-to-lan connection which can be used by an organization that has employees who need to connect to the private network from various remote locations. A Site-to-Site VPN provides connection with remote site based on number of users who wants to connect to either Intranet or Extranet.
7 Computer Networks and Network Security 3.7 (ix) Protocol: A protocol is a set of conventions or rules that must be adhered by both the inter-computer communication parties to ensure that the information being exchanged between the two parties is received and interpreted correctly. In other words, Protocol is software that performs variety of actions necessary for data transmission between computers. A protocol defines the following three aspects of digital communications. Syntax: The format of data being exchanged, character set used, types of error correction used, type of encoding scheme (e.g. signal levels) being used. Semantics: Type and order of messages used to ensure reliable and error free information transfer. Timing: Defines data rate selection and correct timing for various events during data transfer. (x) Chat Server: Some organizations choose to run a server that allows multiple users to have real-time discussions, called chats on the Internet. Most chat servers allow the creation of private chat rooms where participants can meet for private discussions. (xi) Wireless LAN: Wireless Local Area Network (WLAN) is a flexible data communications system that does not require any physical media or cables for data transmission. Using Radio Frequency (RF) technology, Wireless LANs transmit and receive data over the air. Users can access shared information without any plug in or without any physical connection. Wireless LAN configurations range from simple peer-to-peer topologies to complex networks offering distributed data connectivity, flexibility and mobility. (b) (i) Multiplexer: It is a device that enables several devices to share one communication line. The multiplexer scans each device to collect and transmit data on a single line to the CPU, and also communicates transmission from the CPU to the appropriate terminal linked to the multiplexer. The devices are polled and periodically asked whether there is any data to transmit. (ii) is a method of composing, sending, storing and receiving messages over electronic communication systems. The term applies both to the Internet system based on the Simple Mail Transfer Protocol (SMTP) and to intranet systems allowing users within one company to each other. (iii) Web Casting: Web casting is a media presentation distributed over the Internet using streaming media technology to distribute a single content source to many simultaneous listeners/viewers. A webcast may either be distributed live or on demand. Essentially, webcasting is broadcasting over the Internet. Question 2 Describe the functions of layers in TCP/IP protocol.
8 3.8 Information Technology TCP/IP Protocol Layers: TCP/IP protocol suit has four layers and each layer performs specific function so that packet can be moved to next layer in TCP/IP protocol suit. These layers are given below: (i) Application layer: It provides services directly to the user such as . (ii) Transport layer: It provides end-to-end communication between applications and verifies correct packets arrival. (iii) Internet layer: It provides packet routing for error checking, addressing and integrity. (iv) Network Interface layer: It provides an interface to the network hardware and device drivers. This can also be called Data link layer. Question 3 Describe the ways a computer network can help business. A computer network can help the business in following ways: (i) File Sharing - It provides sharing and grouping of data files over the network. The data file stored on the server allows easy access to all the staff in the organization. (ii) Print Sharing - It provides sharing of computer resources such as hard disk, printers etc by multiple users simultaneously to reduce the cost of installing and maintaining multiple resources in the organization. (iii) - It provides collaboration tools such as group application which enables staff in the office to communicate with each other quickly and effectively. Further, group applications support contact management, scheduling and task assignment useful for every staff in the organization. The Internet facility can be embedded so that staff can send and receive attachments outside of the organization in faster, cheaper and easier way. (iv) Fax Sharing - Using network, sharing of fax documents directly from computer reduces the paper consumption and printer usage and is more convenient for staff in the organization. Also fax applications can be integrated with contact lists to be sent to groups of recipient for efficient sharing of documents over the network. (v) Remote Access - Network allows users to remotely access the data and information from organization s network via Internet in cost effective manner. (vi) Shared Databases - Network facilitates simultaneous access to the shared databases to multiple users at the same time by ensuring the integrity of the database. (vii) Fault Tolerance - By using network, fault tolerance can be implemented as a defense against accidental data loss. Usually, primary and secondary line of defense backups the
9 Computer Networks and Network Security 3.9 data in case of system failure. Additional measures can also be taken by attaching a server with un-interruptible power supply in case of power failure or blackouts. (viii) Internet Access and Security - It provides access to the Internet for transferring the document and to access the resources available on World Wide Web by maintain data security through firewall system in the organization s network. (ix) Communication and Collaboration - It facilitates communication and collaboration amongst employees of the organization by sharing of files, views and exchanging ideas more efficiently. (x) Organization - By using various network managing and scheduling software, it is now possible to arrange meetings without constantly checking everyone s schedules. Question 4 What do you understand by Message Switching? Message Switching: In message switching, end-users communicate by sending each other a message, which contains the entire data being delivered from the source to destination node. As a message is routed from its source to its destination, each intermediate switch within the network stores the entire message, providing a very reliable service. In fact, when congestion occurs, the message-switched network will store and delay the traffic until sufficient resources are available for successful delivery of the message. There is no direct connection between the source and destination nodes. The intermediary nodes (switches) have the responsibility of conveying the received message from one node to another in the network. Therefore, each intermediary node within the network must store all messages before retransmitting them one at a time as proper resources become available. This characteristic is often referred to as store-and-forward. Question 5 Define computer network? What are the benefits of using computer network? Describe in brief. A computer network is a collection of computers and terminal devices connected together by a communication system. The set of computers may include large-scale computers, medium scale computers, mini computers and microprocessors. The set of terminal devices may include intelligent terminals, dumb terminals, workstations of various kinds and miscellaneous devices such as the commonly used telephone instruments. Benefits of Using Networks: (i) Organizations can improve communication by connecting their computers and working on standardized systems. Staff, suppliers and customers are able to share information and get in touch more easily.
10 3.10 Information Technology More information sharing can make the business more efficient - eg networked access to a common database can avoid the same data being keyed multiple times, which would waste time and could result in errors. As staff are better equipped to deal with queries and deliver a better standard of service as they can share information about customers. (ii) Organization can reduce costs and improve efficiency - by storing information in one centralized database and streamlining working practices. Staff can deal with more customers at the same time by accessing customer and product databases. Network administration can be centralized, less IT support is required. Costs are cut through sharing of peripherals such as printers, scanners, external discs, tape drives and Internet access. (iii) Organizations can reduce errors and improve consistency - by having all staff work from a single source of information, so that standard versions of manuals and directories can be made available, and data can be backed up from a single point on a scheduled basis, ensuring consistency. Question 6 What is Data Communication? Discuss various types of networks in brief. The transmission of data from one computer to another, or from one device to another is known as data communication. A communications device, therefore, is any machine that assists data transmission. For example, modems, cables, and ports are all communications devices. All of the interconnected data communication devices can form a wide area network, a local area network, or a metropolitan area network, or virtual private network. (i) Local Area Networks (LAN): A Local Area Network (LAN) covers a limited geographical area. A typical LAN connects as many as hundred or so microcomputers that are located in a relatively small area, such as a building or several adjacent buildings. (ii) Metropolitan Area Networks (MAN): A Metropolitan Area Network (MAN) is somewhere between a LAN and a WAN. The terms MAN is sometimes used to refer to networks which connect systems or local area networks within a metropolitan area (roughly 40 km in length from one point to another). MANs are based on fiber optic transmission technology and provide high speed (10 Mbps or so), interconnection between sites. A MAN can support both data and voice. Cable television networks are examples of MANs that distribute television signals. A MAN just has one or two cables and does not contain switching elements. (iii) Wide Area Networks (WAN): A Wide Area Network (WAN) covers a large geographic area with various communication facilities such as long distance telephone service,
11 Computer Networks and Network Security 3.11 satellite transmission, and under-sea cables. The WAN typically involves different types of communication hardware and software. Examples of WANs are interstate banking networks and airline reservation systems. Wide area networks typically operate at lower link speeds (about 1 Mbps). Question 7 Discuss any five Communication Interface Devices. Five commonly used Communication Interface Devices are discussed as follows: (i) Network Interface Card (NIC): It is an electronic card which is installed in server as well as in all the nodes for interconnection of nodes with server. Network Interface card provides a connector on its back for connection of nodes and server using network cable. NIC has buffer for storing incoming and outgoing packets, thus improving the network throughput. NIC uses linear bus topology, according to which only one node can access the data from the server at a time. NIC is installed in one of the available PCI/ISA slot on the motherboard. (ii) Modem (Modulator/Demodulator): It is a device that converts a digital computer signal into an analog telephone signal (i.e. it modulates the signal) and converts an analog telephone signal into a digital computer signal (i.e. it demodulates the signal) in a data communication system. MODEMs are classified on the basis of different criteria such as the place where they are installed (External vs Internal MODEMs), the manner in which they accept information (Standard vs Intelligent Modems) and the way they transmit signals (Short-haul and Wireless Modems). (iii) Multiplexer (MUX): It is an electronic device which allows number of devices to share a single communication line. Multiplexer continuously scans the nodes and server to find out whether any of them wants to send data to other nodes or not. This process of continuously scanning by multiplexer is called Polling. Multiplexer may perform Time division multiplexing (TOM) or Frequency division multiplexing (FOM). (iv) Front-end communication processor: In case of high volume data transfer, a separate computer, known as front-end communication processor is used for sending and receiving data, code conversions, editing and verification of data, terminal recognition and control of transmission lines thus relieving the main computer for data processing tasks rather than data transmission. (v) Protocol Converter: Protocols are the standard set of rules which govern the flow of data on a communication network. Dissimilar devices, which follow different protocols, can not communicate with each other without protocol conversion. Thus, a protocol converter is a device that provides interoperability amongst networking devices by converting protocols of one device to another. They transform data and commends from one application to another for exchanging information. For example, one computer representing data in ASCII code can not communicate with another computer using EBCDIC code for data representation without protocol conversion.
12 3.12 Information Technology Question 8 Briefly explain various functions of Communication Software. Various Functions of Communication Software: Communication software manages the flow of data across a network. It performs the following functions: (i) Access control: Linking and disconnecting different devices; automatically dialing and answering telephones; restricting access to authorized users and establishing parameters such as speed, mode, and direction of transmission. (ii) Network management: Polling devices to see whether they are ready to send or receive data; queuing input and output; determining system priorities; routing messages and logging network activity, use, and errors. (iii) Data and file transmission: Controlling the transfer of data, files, and messages among various devices. (iv) Error detection and control: Ensuring that the data sent is indeed the data received. (v) Data security: Protecting data during transmission from unauthorized access. Question 9 Explain Star Network Topology in brief. Or Discuss various advantages and disadvantages of Star Network Topology. Star Network Topology The geometrical arrangement of computer resources, remote devices and communication facilities is known as Network Structure or Network Topology. Star Network topology is characterized by communication channels emanating from centralized computer system as shown in figure given below: Fig: Star Network Topology The processing nodes in a star network interconnect directly with a central system. Each terminal, small computer or large main frame can communicate only with the central site and not with other nodes in the network. If it is desired to transmit information from one node to another, it can be done only by sending the details to the central node, which in turn sends them to the destination.
13 Computer Networks and Network Security 3.13 Advantages: It is easy to add new and remove nodes. A node failure does not bring down the entire network. It is easier to diagnose network problems through a central hub. Disadvantages: If the central hub fails, the whole network ceases to function. It costs more to cable a star configuration than other topologies. Question 10 Describe the Ring Network. Discuss its advantages and disadvantages. Ring Network: This is one of the structures for local area networks. In this topology, the network cable passes from one node to another until all nodes are connected in the form of a loop or ring. There is a direct point-to-point link between two neighboring nodes. These links are unidirectional which ensures that transmission by a node traverses the whole ring and comes back to the node, which made the transmission. Ring Network topology is particularly appropriate for organizations that require a centralized database or a centralized processing facility. Advantages: (i) Ring networks offer high performance for a small number of workstations. (ii) These can span longer distances compared to other types of networks. (iii) Ring networks are easily extendable. Disadvantages: (i) It is relatively expensive and difficult to install. (ii) Failure of one computer on the network can affect the whole network. (iii) It is difficult to trouble shoot a ring network. Adding or removing computers can disrupt the network. Question 11 Write the features of Synchronous transmission. Features of Synchronous transmission are as follows: The bits are transmitted at fixed rate. The transmitter and receiver both use the same clock signals for synchronization. It allows characters to be sent without start-stop bit.
14 3.14 Information Technology It allows data to be sent as multi-word block. Synchronization bit is placed at the beginning and end of each block. Timing is determined by MODEM. It is faster but more expensive transmission. Question 12 Discuss various Data transmission modes. Or Discuss in brief various data transmission modes. There are three Data transmission modes: (i) Simplex: A simplex communication mode permits data to flow in only one direction. A terminal connected to such a line is either a send-only or receive only device. Simplex mode is seldom used because a return path is generally needed to send acknowledgements, control or error signals. (ii) Half duplex: In this mode, data can be transmitted back and forth between two stations, but data can only go in one of the two directions at any given point of time. (iii) Full duplex: A full duplex connection can simultaneously transmit and receive data between two stations. It is most commonly used communication mode. A full duplex line is faster, since it avoids the delay that occurs in a half-duplex mode each time the direction of transmission is changed. Question 13 Explain the OSI Model of communication. OSI or the Open System Interconnection Model of Communication has been outlined by International Organization for Standardization (ISO) to facilitate communication among the various hardware and software platforms which are heterogeneous in nature. It consists of following seven layers of functions: (i) Layer 7 or Application Layer: This layer is closest to the end user through which the user interacts directly with the software application. Database concurrency and deadlock situation controls are undertaken at this layer and also provides services for file transfer, file sharing, etc. (ii) Layer 6 or Presentation Layer: This layer controls on screen display of data, transforms data to a standard application interface, encrypt or compress the data as per requirement. (iii) Layer 5 or Session Layer: This layer establishes, maintains and terminates sessions (dialogues) between user processes. Identification and authentication are undertaken at this layer level.
15 Computer Networks and Network Security 3.15 (iv) Layer 4 or Transport Layer: This layer ensures reliable and transparent transfer of data between user processes, assembles and disassembles message packets, provides error recovery and flow control. At this layer, multiplexing and encryption take place. (v) Layer 3 or Network Layer: This layer makes a choice of the physical route of transmission, creates a virtual circuit for upper layers to make them independent of data transmission and switching, establishes, maintains, terminates connections between the nodes and ensure proper routing of data. (vi) Layer 2 or Data Link Layer: This layer is a hardware layer which specifies channel access control method and ensures reliable transfer of data through the transmission medium. (vii) Layer 1 or Physical Layer: This layer is a hardware layer which specifies mechanical features as well as electromagnetic features of the connection between the devices and the transmission. Question 14 Write short notes on TCP/IP. TCP/IP: The protocols used on the Internet are called TCP/IP (Transmission Control Protocol/Internet Protocol). A TCP/IP protocol has two parts which create packet switching network: (a) TCP deals with exchange of sequential data. (b) IP handles packet forwarding and is used on the Internet. TCP/IP has following four layers. (i) The Application Layer, which provides service directly to the user. (ii) The Transport Layer, which provides end-to end communication between applications and verifies correct packet arrival. (iii) The Internet Layer, which provides packet routing for error checking, addressing and integrity. (iv) The Network Interface Layer, which provides an interface to the network hardware and device drivers. This can also be called the data link layer. Some reference books also include a fifth layer namely Physical Layer as part of TCP / IP which transmits the data from one system to another system in the form of bits - 0 and 1. The TCP protocol breaks file or message in small packets. Each packet is then given a header, which contains the destination address and is then sent over the Internet. The IP protocol guides the packets so that they arrive at the destination. Once there, the TCP protocol resembles the packets into the original message.
16 3.16 Information Technology Question 15 Describe the various factors which have contributed to the growth of Local Area Network (LAN). The following factors have contributed to the growth of LAN. (i) Security: Security for programs and data can be achieved using servers that are locked through both software and physical means such as diskless nodes. (ii) Expanded PC Usage: Once a LAN has been set up, it actually costs less to automate all processes as existing PCs can be easily converted into nodes by adding network interface card. (iii) Distributed Processing: LAN with inter-user communication and information exchange helps to develop distributed processing system. (iv) Electronic mail and Message Broadcasting: allows users to communicate more easily among themselves through a mail-box on the server. (v) Organizational Benefits: The information flow becomes a lot smoother with various departments, having the ability to access or request for information and data pertinent to them. Besides these, it leads to reduction in costs of Hardware, Software, and also in time, and cost of training on manpower to use the system. (vi) Data Management Benefit: Since data is located centrally on the server, it becomes much easy to manage it, as well as back it up. (vii) Software cost and up-gradation: Network version software cost is less compared to single version software. Software upgrade is easy as package is stored centrally on the server. Question 16 Explain briefly Asynchronous Transmission. Asynchronous Transmission: In asynchronous transmission mode, each character (1 byte) to be transmitted is preceded by a start bit and terminated by one or more stop bits. The function of start bit is to tell the receiver where the new character starts and the function of the stop bit is to tell the receiver that the character has ended. This mode of transmission is designed for a situation where the characters are transmitted intermittently. This mode is inefficient as compared to the synchronous transmission as the extra start and stop bits slow down the process of data transmission when there is huge volume of data to be transmitted. Question 17 What do you understand by Local Area Network? Describe its basic components.
17 Computer Networks and Network Security 3.17 A Local Area Network (LAN) is primarily a data transmission system intended to link computers and associated devices within a restricted geographical area such as an office building or several adjacent buildings. The linked computers and related equipments may be anything from full-scale mainframe computing systems to small desktop office workstations, terminals and peripherals etc. Organizations use LANs because they enable multiple users to share software, data and devices. LANs use a shared physical media, which is routed in the whole campus to connect various systems. LAN uses high-speed media (1Mbps to 30 Mbps or more) and are mostly privately owned and operated. Local area network has following five components: (i) File Server: A network file server is a computer system used for the purpose of managing the file system, servicing the network printers, handling network communications, and other functions. A server may be dedicated in which case all of its processing power is allocated to network functions, or it may be non-dedicated which means that a part of the servers functions may be allocated as a workstation or DOS-based system. (ii) The network operating system: It is loaded into the server s hard disk along with the system management tools and user utilities. When the system is restarted, NetWare boots and the server come under its control. (iii) Workstations: Workstations are attached to the server through the Network Interface Card and the cabling. Workstations are normally intelligent systems, such as the IBM PC. The concept of distributed processing relies on the fact that personal computers attached to the networks perform their own processing after loading programs and data from the server. Hence, a workstation is called an Active Device on the network. After processing, files are stored back on the server where they can be used by other workstations. (iv) Network Interface Card: Every device connected to a LAN needs a Network Interface Card (NIC) to plug into the LAN. For example, a PC may have an Ethernet card installed in it to connect to an Ethernet LAN. (v) Network Cabling: Once the server, workstations and network interface cards are in place, network cabling is used to connect everything together. The most popular type of network cable is the shielded twisted-pair, co-axial and fiber optic cabling. Question 18 Discuss the various attributes of Local Area Network (LAN). Main attributes of Local Area Networks are as follows: (i) Inexpensive transmission media is used to connect computers in limited geographical area mainly through coaxial cable.
18 3.18 Information Technology (ii) Inexpensive devices like modems, repeaters and transceiver is used to interface with the transmission media. (iii) Provide easy physical connection of devices to the media. (iv) Provide high data transmission rates between source and the destination. (v) Network data transmissions are easier for the devices with different transmission rates in the network. (vi) Provide high degree of interconnection between the network devices. (vii) All devices have the potential to communicate with other devices on the network. (viii) It does not provide central controlling processor on the network. (ix) Each attached device may only hear and does not necessarily process messages or instructions. Question 19 Describe the important characteristic of client / server technology. Characteristics of Client / Server Technology: (i) It consists of a client process and a server process that can be distinguished from each other. (ii) The client portion and the server portion can operate on separate computer platforms. (iii) Either the client or the server platform can be upgraded without having to upgrade the other platform. (iv) The server is able to service multiple clients concurrently. (v) The system includes some sort of networking capability. (vi) A significant portion of the application logic resides at the client end. (vii) Action is usually initiated at the client end and not the server end. (viii) A user-friendly Graphical User Interface (GUI) generally resides at the client end. (ix) A Structured Query Language (SQL) capability is available to client server system. (x) Database server provides data protection and security. Question 20 Describe in brief the various components of Client Server Architecture.
19 Computer Networks and Network Security 3.19 The various components of Client-Server Architecture are as follows: (i) Client: Clients, which are typically PCs, are the users of the services offered by the servers. There are basically three types of clients: Non-Graphical User Interface (GUI) Clients: These require a minimum amount of human interaction e.g. ATMs, cell phones, fax machines, and robots. GUI-Clients: These are human interaction models usually involving object/action models like the pull-down menus in Windows 3-X. Object-Oriented User Interface (OOUI) Clients: These take GUI-Clients even further with expanded visual formats, multiple workplaces, and object interaction rather than application interaction. Window 7 is a common OOUI Client. (ii) Server: Servers await request from the client and regulate access to shared resources and perform action based on client request. File servers make it possible to share files across a network by maintaining a shared library of documents, data, and images. Database servers, transaction servers and web servers are some of the servers used in client server architecture. (iii) Middleware: The network system implemented within the client/server technology is termed as Middleware. It is all the distributed software needed to allow clients and servers to interact. General Middleware allows for communication, directory services, queuing, distributed file sharing, and printing. (iv) Fat-client or Fat-server: Fat-client or Fat-server allows more of the processing to take place on the client, like with a file server or database server. Fat-servers place more emphasis on the server and try to minimize the processing done by clients. Transactions, GroupWare, and web servers are examples of Fat Servers. Fat Clients are also referred to as 2-Tier systems and Fat-servers as 3-Tier systems. Question 21 What is VPN? Discuss different types of VPN. A VPN is a private network that uses a public network (usually the Internet) to connect remote sites or users together. Instead of using a dedicated, real-world connection such as leased line, a VPN uses virtual connections routed through the Internet from the company's private network to the remote site or employee. There are two common types of VPN: (i) Remote-access VPN: Remote-access, also called a Virtual Private Dial-up Network (VPDN), is a user-to-lan connection which can be used by an organization that has employees who need to connect to the private network from various remote locations. The Enterprise Service Provider (ESP) sets up a Network Access Server (NAS) and provides the remote users with desktop client software for their computers. The telecommuters can
20 3.20 Information Technology then dial a toll-free number to reach the NAS and use their VPN client software to access the corporate network. Remote-access VPNs permit secure, encrypted connections between an organization's private network and remote users through a third-party service provider. (ii) Site-to-Site VPN: Through the use of dedicated equipment and large-scale encryption, a company can connect multiple fixed sites over a public network such as the Internet. Site-to-site VPNs can be one of two types: Intranet-based: If a company has one or more remote locations that they wish to join in a single private network, they can create an intranet VPN to connect LAN to LAN. Extranet-based: When a company has a close relationship with another company, they can build an extranet VPN that connects LAN to LAN, and allows the various companies to work in a shared environment. Question 22 What is Integrated Services Digital Network (ISDN)? Write its advantages. ISDN: Integrated Services Digital Network is a system of digital phone connections to allow simultaneous voice and data transmission across the world. Such voice and data are carried by bearer channels known as B channels having a bandwidth of 64 kilobits per second. ISDN provides two types of services namely Basic Rate Interface (BRI) and Primary Rate Interface (PRI). BRI consists of two 64 kbps B channels and one 16 kbps D channel and is suitable for individual users. PRI consists of twenty three B channels and one 64 kbps D channel and is suitable for users with higher capacity requirements. Various advantages of ISDN are as follows: (i) ISDN allows multiple digital channels to be operated simultaneously through the same regular phone cable meant for analog signals. The digital connection scheme permits a much higher data transfer rate than analog connections. (ii) In ISDN, digital data sources can be combined together to route the information at the destination point without any loss of data or voice. (iii) ISDN sends a digital packet on a separate channel without disturbing the established connections with high data rate transfer. (iv) ISDN transmits full duplex data using single device that can be connected with a U interface, which is known as Network Termination 1. Question 23 Describe Caching Server and Proxy Server. How are they different from each other? Caching Server: A caching server is used to restrict number of one s own access to the Internet. Basically, a caching server sits between the client computer and the server that would normally
21 Computer Networks and Network Security 3.21 fulfill a client s request. The caching server intercepts the request sent and maintains a library of files that have been requested in the recent past by users on the Internet. If the request is found in the library, the server returns the desired information without going out to the Internet. Thus, a caching server does not restrict information flow. Instead, it makes a copy of requested information, so that frequent requests can be served locally, rather than from the original Internet source. It provides a good means to reduce overall traffic to and from the Internet. It is also possible to connect the caching servers in a hierarchy so that if the requested information is not available locally, it can be passed to the nearby caching servers for possible availability. Proxy Server: A proxy server is designed to restrict access to information on the Internet. A proxy server can be configured to refuse to pass the request to the intended Internet server. Such a server operates on a list of rules given to it by a System Administrator. Some proxy software use list of specific forbidden sites, the others examine the content of a page pertaining to the request. Question 24 Explain the various types of Internet servers. Types of Internet Servers: (i) File server: It manages requests from clients for files stored on the server s local disk. A central file server permits groups and users to share and access data in multiple ways. (ii) Mail server: A mail server is the most efficient way to receive and store electronic mail messages for a community of users. A central mail server runs 24 hours a day. The mail server can also provide a global directory for all community and organization s users, as well as gateway and relay services for all other mail servers. (iii) DNS server: Domain Name Service is an Internet-wide distributed database system that documents and distributes network-specific information, such as the associated IP address for a host name, and vice versa. (iv) Gopher server: Gopher is an Internet application that uses multiple Gopher servers to locate images, applications, and files stored on various servers on the Internet. Gopher offers menu choices to prompt users for information that interests them, and then establishes the necessary network connections to obtain the resource. (v) Web server: The World Wide Web (WWW) is a very popular source of information on the Internet. Web browsers present information to the user in hypertext format. When the user selects a word or phrase that a Web page s author has established as a hypertext link, the Web browser queries another Web server or file to move to another Web page related to the link. (vi) FTP server: File Transfer Protocol (FTP) is an Internet-wide standard for distribution of files from one computer to another. The computer that stores files and makes them available to others is a server.
Computer Networks A group of two or more computer systems linked together. There are many [types] of computer networks: Peer To Peer (workgroups) The computers are connected by a network, however, there
Lecture 1 An Introduction to Networking Chapter 1, pages 1-22 Dave Novak BSAD 146, Introduction to Networking School of Business Administration University of Vermont Lecture Overview Brief introduction
Introduction Computer Network. Interconnected collection of autonomous computers that are able to exchange information No master/slave relationship between the computers in the network Data Communications.
MANAGEMENT INFORMATION SYSTEMS 8/E Raymond McLeod, Jr. and George Schell Chapter 10 Data Communications Copyright 2001 Prentice-Hall, Inc. 10-1 Objectives Understand data communication basics. Know the
Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4
Uses of a network A network is a way to connect computers so that they can communicate, exchange information and share resources in real time. Networks enable multiple users to access shared data and programs
5 Data Communication and Networking 5.1 Introduction Today computer is available in many offices and homes and therefore there is a need to share data and programs among various computers. With the advancement
3.1 TELECOMMUNICATIONS, NETWORKS AND THE INTERNET The Business Value of Telecommunications and Networking Business value impacts of the telecommunications and Networking are: Declining transaction costs
Future Stars Grade X Manual Chapter 1 Networking and Telecommunication 1. Answer the following questions. a. What is telecommunication? Ans: The transfer of information at a far distance is known as telecommunication.
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Chapter 8: Computer Networking AIMS The aim of this chapter is to give a brief introduction to computer networking. OBJECTIVES At the end of this chapter you should be able to: Explain the following terms:
Discovering Computers 2008 Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the the components required for for successful communications Identify various sending and receiving devices
NETWORKING TECHNOLOGIES (October 19, 2015) BUS3500 - Abdou Illia, Fall 2015 1 LEARNING GOALS Identify the major hardware components in networks. Identify and explain the various types of computer networks.
WAN Technology Heng Sovannarith firstname.lastname@example.org Introduction A WAN is a data communications network that covers a relatively broad geographic area and often uses transmission facilities provided
Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer
Chapter 7: Computer Networks, the Internet, and the World Wide Web Invitation to Computer Science, C++ Version, Third Edition Objectives In this chapter, you will learn about: Basic networking concepts
Review questions 1 Which network type is a specifically designed configuration of computers and other devices located within a confined area? A Peer-to-peer network B Local area network C Client/server
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Basic Networking Concepts 1. Introduction 2. Protocols 3. Protocol Layers 4. Network Interconnection/Internet 1 1. Introduction -A network can be defined as a group of computers and other devices connected
Local Area Network By Bhupendra Ratha, Lecturer School of Library and Information Science Devi Ahilya University, Indore Email: email@example.com Local Area Network LANs connect computers and peripheral
The Purpose of ing CSCI 362 Computer and Security Introduction to ing Goals: Remote exchange and remote process control. A few desirable properties: Interoperability, Flexibility, Geographical range, Scalability,
How Virtual Private Networks Work by Jeff Tyson This article has been reprinted from http://computer.howstuffworks.com/ Please note that the web site includes two animated diagrams which explain in greater
Communication Networks MAP-TELE 2011/12 José Ruela Network basic mechanisms Introduction to Communications Networks Communications networks Communications networks are used to transport information (data)
New York University, Leonard N. Stern School of Business C20.0001 Information Systems for Managers Fall 1999 Networking Fundamentals A network comprises two or more computers that have been connected in
Computer Networks CS321 Dr. Ramana I.I.T Jodhpur Dr. Ramana ( I.I.T Jodhpur ) Computer Networks CS321 1 / 22 Outline of the Lectures 1 Introduction OSI Reference Model Internet Protocol Performance Metrics
Technology in Action Alan Evans Kendall Martin Mary Anne Poatsy Eleventh Edition Technology in Action Chapter 10 Behind the Scenes: Networking and Security in the Business World 2 Chapter Topics Client/Server
ADSL or Asymmetric Digital Subscriber Line Backbone Bandwidth Bit Commonly called DSL. Technology and equipment that allow high-speed communication across standard copper telephone wires. This can include
Chapter 15: Advanced Networks IT Essentials: PC Hardware and Software v4.0 1 Determine a Network Topology A site survey is a physical inspection of the building that will help determine a basic logical
Chapter 2 - The TCP/IP and OSI Networking Models TCP/IP : Transmission Control Protocol/Internet Protocol OSI : Open System Interconnection RFC Request for Comments TCP/IP Architecture Layers Application
DATA COMMUNICATION AND NETWORKS 1. Define the term Computer Networks. A Computer network is a number if computers interconnected by one or more transmission paths. The transmission path often is the telephone
CHAPTER 8: NETWORKING AND DIGITAL COMMUNICATION Multiple Choice: 1. A basic computer network can be described as: A. a minimum of five computers linked together. B. a number of palmtop computers. C. two
Chapter 9 Communications and Networks Chapter 9 Objectives Discuss the components required for successful communications Identify various sending and receiving devices Explain the purpose of communications
2. Basic Concepts Contents 2 Basic Concepts a. Link configuration b. Topology c. Transmission mode d. Classes of networks 1 a. Link Configuration Data links A direct data link is one that establishes a
Network Design Yiannos Mylonas Physical Topologies There are two parts to the topology definition: the physical topology, which is the actual layout of the wire (media), and the logical topology, which
Local Area What s a LAN? A transmission system, usually private owned, very speedy and secure, covering a geographical area in the range of kilometres, comprising a shared transmission medium and a set
CTS2134 Introduction to Networking Module 07: Wide Area Networks WAN cloud Central Office (CO) Local loop WAN components Demarcation point (demarc) Consumer Premises Equipment (CPE) Channel Service Unit/Data
Overview of Network Hardware and Software CS158a Chris Pollett Jan 29, 2007. Outline Scales of Networks Protocol Hierarchies Scales of Networks Last day, we talked about broadcast versus point-to-point
Dear Student Here is the list of chapter sections that we will be covering for this semester. For each chapter listed in pages below: Any Bold text is required (with all the details in that sections) Any
Chapter 1 Review Questions R1. What is the difference between a host and an end system? List several different types of end systems. Is a Web server an end system? 1. There is no difference. Throughout
Chapter 12 Topics: Communication links LAN / WAN Internet / WWW A computer network is a set of independent computer systems interconnected by telecommunication links. CMPUT101 Introduction to Computing
Top-Down Network Design Chapter Five Designing a Network Topology Copyright 2010 Cisco Press & Priscilla Oppenheimer Topology A map of an internetwork that indicates network segments, interconnection points,
Agenda Distributed System Structures CSCI 444/544 Operating Systems Fall 2008 Motivation Network structure Fundamental network services Sockets and ports Client/server model Remote Procedure Call (RPC)
COMPUTERS ARE YOUR FUTURE CHAPTER 7 NETWORKS: COMMUNICATING AND SHARING RESOURCES Answers to End-of-Chapter Questions Matching g 1. router o 2. node i 3. ring l 4. hub c 5. star n 6. backbone b 7. latency
Region 10 Videoconference Network (R10VN) Network Considerations & Guidelines 1 What Causes A Poor Video Call? There are several factors that can affect a videoconference call. The two biggest culprits
Videoconferencing Glossary Algorithm A set of specifications that define methods and procedures for transmitting audio, video, and data. Analog Gateway A means of connecting dissimilar codecs. Incoming
Introduction to Computer Networks and Data Communications Chapter 1 Learning Objectives After reading this chapter, you should be able to: Define the basic terminology of computer networks Recognize the
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
1 Data communication principles, types and working principles of modems, Network principles, OSI model, functions of data link layer and network layer, networking components, communication protocols- X
Network+ Guide to Networks 6 th Edition Chapter 7 Wide Area Networks Objectives Identify a variety of uses for WANs Explain different WAN topologies, including their advantages and disadvantages Compare
Topics Use of networks Network structure Implementation of networks Computer Networks Introduction Let s Get Started! Networking today: Where are they? Powerful computers are cheap Networks are everywhere
- Data Communication and Networks (Optional) INTRODUCTION This is one of the optional courses designed for Semester 4 of the Bachelor of Information Technology Degree program. This course on Data Communication
Internet Public Network Bandwidth Data rate measured in bits (not bytes) per seconds Kbps (Kilobits per seconds) 125 chars/sec Mbps (Megabits per seconds) 1,250 chars/sec Gbps (Gigabits per seconds) 12,500
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Packet Switching and Computer Networks Switching As computer networks became more pervasive, more and more data and also less voice was transmitted over telephone lines. Circuit Switching The telephone
1 TCP Transmission Control Protocol, is a connection based Internet protocol responsible for breaking data into packets to send over a network using IP (internet protocol) IP works at the TCP/IP Internet
Data communications Think! Think!?? What makes it possible to communicate from point A to point B?? Long-Distance Transmission Media If you place a call outside the local transport area, an interchange
Core Syllabus C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS Version 2.6 June 2006 EUCIP CORE Version 2.6 Syllabus. The following is the Syllabus for EUCIP CORE Version 2.6, which
524 Computer Networks Section 1: Introduction to Course Dr. E.C. Kulasekere Sri Lanka Institute of Information Technology - 2005 Course Outline The Aim The course is design to establish the terminology
The OSI Model and the TCP/IP Protocol Suite To discuss the idea of multiple layering in data communication and networking and the interrelationship between layers. To discuss the OSI model and its layer
Mathatma Gandhi University BSc Computer Science IV th semester BCS 402 Computer Network &Internet MULTIPLE CHOICE QUESTIONS 1. The computer network is A) Network computer with cable B) Network computer
Lecture 7: Distributed Operating Systems A Distributed System 7.2 Resource sharing Motivation sharing and printing files at remote sites processing information in a distributed database using remote specialized
Protocols and Architecture Protocol Architecture. Layered structure of hardware and software to support exchange of data between systems/distributed applications Set of rules for transmission of data between
Chapter 14: Distributed Operating Systems Chapter 14: Distributed Operating Systems Motivation Types of Distributed Operating Systems Network Structure Network Topology Communication Structure Communication
Lecture 11: ISDN & ATM CS 5516 Computer Architecture Networks VA Tech Prof. Roy M. Wnek History of ISDN Traditionally, local loop connectivity has been with an analog signal on copper Inefficient, prone
Data Link Protocols Relates to Lab. This module covers data link layer issues, such as local area networks (LANs) and point-to-point links, Ethernet, and the Point-to-Point Protocol (PPP). 1 TCP/IP Suite
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
Leased Line + Remote Dial-in connectivity Client: One of the TELCO offices in a Southern state. The customer wanted to establish WAN Connectivity between central location and 10 remote locations. The customer
3 Telecommunication and Networks 3.1 Introduction Telecommunication technology is moving towards open, internetworked digital networks for voice, data, video and multimedia whose primary goal is to promote
Layer 3 Network + Dedicated Internet Connectivity Client: One of the IT Departments in a Northern State Customer's requirement: The customer wanted to establish CAN connectivity (Campus Area Network) for
Multiplexing on Wireline Telephone Systems Isha Batra, Divya Raheja Information Technology, Dronacharya College of Engineering Farrukh Nagar, Gurgaon, India ABSTRACT- This Paper Outlines a research multiplexing
Networking Basics Data communications the electronic transfer of information between computers. This has become a major focus of the computer industry especially since the rapid growth of the internet.
What Is an Internetwork? An internetwork is a collection of individual networks, connected by intermediate networking devices, that functions as a single large network. Internetworking refers to the industry,
Office : BLB 290E, Business Leadership Building Office Hours: Tu &Th 9:00 am - 11:00 am, or by appointment/drop-in Telephone: 940-565-4660 Web Page: http://www.coba.unt.edu/bcis/faculty/capan/capan.htm
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant