Docsity
Docsity

Prepare for your exams
Prepare for your exams

Study with the several resources on Docsity


Earn points to download
Earn points to download

Earn points by helping other students or get them with a premium plan


Guidelines and tips
Guidelines and tips

Computer Networks: Fundamentals, Topologies, and Devices, Lecture notes of Introduction to Computers

Btech cse 1st semester FOC notes

Typology: Lecture notes

2018/2019

Uploaded on 01/23/2019

TheReaper1220
TheReaper1220 🇮🇳

4.7

(3)

1 document

1 / 30

Toggle sidebar

This page cannot be seen from the preview

Don't miss anything!

bg1
Basic Linux Commands
ls Used to display the Lists of files and directory without information.
ls l Used to display the list of files and directory with complete information such
as permissions, owner, time etc.
rm data1 Deletes the file data1 in the current directory.
rm rf dirname Used to remove a directory including subdirectory and files.
rmdir temp Removes the directory temp.
mkdir temp Creates the directory temp.
cd Changes directories.
cd .. To exit from current directory.
pwd (Print Working Directory) Shows what directory (folder) you are in.
man This command is used to display the manual about any command.
man pwd You will see the manual for the pwd command.
info This command is used to display the information about any command.
info pwd You will see the information for the pwd command.
clear Clears the terminal screen.
cat Used to view the contents of a file and it is also used for creating a new file
with some contents
cat <file name> To view file contents
cat > newfilename Press enter,then you can write something in the file and then to save the file
contents press ctrl+d then enter.
cp Used to copy something in a destination file or directory.
cp sourcepath destinationpath
mv Used to move one file or directory from one place to another place.
mv source destination
who By this command you can see the user name and their ip addresses, who have
loged in on your server
who am i This command shows you the logged in terminal number and user name and
more detailed information
useradd username Used to create a new user.
passwd Used to give a password of a user.
userdel username Used to remove a user from linux.
groupadd grpname Used to add a new group.
groupdel grpname Used to delete a group.
cal Used to display the calendar of current month and year.
cal month year Used to display the calendar of given month and year.
cal year Used to display the calendar of complete year.
pf3
pf4
pf5
pf8
pf9
pfa
pfd
pfe
pff
pf12
pf13
pf14
pf15
pf16
pf17
pf18
pf19
pf1a
pf1b
pf1c
pf1d
pf1e

Partial preview of the text

Download Computer Networks: Fundamentals, Topologies, and Devices and more Lecture notes Introduction to Computers in PDF only on Docsity!

Basic Linux Commands

ls Used to display the Lists of files and directory without information.

ls – l Used to display the list of files and directory with complete information such

as permissions, owner, time etc.

rm data1 Deletes the file data1 in the current directory.

rm – rf dirname Used to remove a directory including subdirectory and files.

rmdir temp Removes the directory temp.

mkdir temp Creates the directory temp.

cd Changes directories.

cd .. To exit from current directory.

pwd (Print Working Directory) Shows what directory (folder) you are in.

man This command is used to display the manual about any command.

man pwd You will see the manual for the pwd command.

info This command is used to display the information about any command.

info pwd You will see the information for the pwd command.

clear Clears the terminal screen.

cat Used to view the contents of a file and it is also used for creating a new file

with some contents

cat To view file contents

cat > newfilename Press enter,then you can write something in the file and then to save the file

contents press ctrl+d then enter.

cp Used to copy something in a destination file or directory.

cp sourcepath destinationpath

mv Used to move one file or directory from one place to another place.

mv source destination

who By this command you can see the user name and their ip addresses, who have

loged in on your server

who am i This command shows you the logged in terminal number and user name and

more detailed information

useradd username Used to create a new user.

passwd Used to give a password of a user.

userdel username Used to remove a user from linux.

groupadd grpname Used to add a new group.

groupdel grpname Used to delete a group.

cal Used to display the calendar of current month and year.

cal month year Used to display the calendar of given month and year.

cal year Used to display the calendar of complete year.

Flowchart In Programming

Flowchart is a diagrammatic representation of an algorithm. Flowchart are very helpful in writing program and explaining program to others.

Symbols Used In Flowchart

Different symbols are used for different states in flowchart, For example: Input/Output and decision making has different symbols. The table below describes all the symbols that are used in making flowchart

Symbol Purpose Description

Flow line Used to indicate the flow of logic by connecting symbols. Terminal(Stop/Start) Used to represent start and end of flowchart. Input/Output Used for input and output operation. Processing Used for airthmetic operations and data- manipulations. Desicion Used to represent the operation in which there are two alternatives, true and false. On-page Connector Used to join different flowline Off-page Connector Used to connect flowchart portion on different page. Predefined Process/Function Used to represent a group of statements performing one processing task.

  • Draw a flowchart to find all the roots of a quadratic equation ax^2 +bx+c=

Draw a flowchart to find the Fibonacci series till term≤1000. Though, flowchart are useful in efficient coding, debugging and analysis of a program, drawing flowchart in very complicated in case of complex programs and often ignored.

  1. Number of users
  2. Capability of connected hardware Reliability It decides the frequency at which network failure take place. More the failures are, less is the network's reliability. Security It refers to the protection of data from any unauthorised user or access. While travelling through network, data passes many layers of network, and data can be traced if attempted. Hence security is also a very important characteristic for Networks.

Properties of a Good Network

  1. Interpersonal Communication: We can communicate with each other efficiently and easily. Example: emails, chat rooms, video conferencing etc, all of these are possible because of computer networks.
  2. Resources can be shared: We can share physical resources by making them available on a network such as printers, scanners etc.
  3. Sharing files, data: Authorized users are allowed to share the files on the network. Basic Communication Model A Communication model is used to exchange data between two parties. For example: communication between a computer, server and telephone (through modem). Source Data to be transmitted is generated by this device, example: telephones, personal computers etc.

Transmitter The data generated by the source system is not directly transmitted in the form its generated. The transmitter transforms and encodes the data in such a form to produce electromagnetic waves or signals. Transmission System A transmission system can be a single transmission line or a complex network connecting source and destination. Receiver Receiver accepts the signal from the transmission system and converts it into a form which is easily managed by the destination device. Destination Destination receives the incoming data from the receiver.

Computer Networks

The ability to exchange data and communicate efficiently is the main purpose of networking computers. But we have to consider beyond these points to evaluate the feasibility of networking for our own advantages. A computer network can be identified as a group of computers that are interconnected for sharing data between them or their users. There is a wide variety of networks and their advantages and disadvantages mainly depend on the type of network.  Advantages of Computer Networking

  1. Easy Communication and Speed It is very easy to communicate through a network. People can communicate efficiently using a network with a group of people. They can enjoy the benefit of emails, instant messaging, telephony, video conferencing, chat rooms, etc.

One major disadvantage of networking is the breakdown of the whole network due to an issue of the server. Such breakdowns are frequent in networks causing losses of thousands of dollars each year. Therefore once established it is vital to maintain it properly to prevent such disastrous breakdowns. The worst scenario is such breakdowns may lead to loss of important data of the server.

  1. Expensive to Build Building a network is a serious business in many occasions, especially for large scale organizations. Cables and other hardware are very pricey to buy and replace.
  2. Security Threats Security threats are always problems with large networks. There are hackers who are trying to steal valuable data of large companies for their own benefit. So it is necessary to take utmost care to facilitate the required security measures.
  3. Bandwidth Issues In a network there are users who consume a lot more bandwidth than others. Because of this some other people may experience difficulties. Although there are disadvantages to networking, it is a vital need in today’s environment. People need to access the Internet, communicate and share information and they can’t live without that. Therefore engineers need to find alternatives and improved technologies to overcome issues associated with networking. Therefore we can say that computer networking is always beneficial to have even if there are some drawbacks.

Line Configuration in Computer Networks

Network is a connection made through connection links between two or more devices. Devices can be a computer, printer or any other device that is capable to send and receive data. There are two ways to connect the devices :

  1. Point-to-Point connection
  2. Multipoint connection

Point-To-Point Connection It is a protocol which is used as a communication link between two devices. It is simple to establish. The most common example for Point-to-Point connection (PPP) is a computer connected by telephone line. We can connect the two devices by means of a pair of wires or using a microwave or satellite link. Example: Point-to-Point connection between remote control and Television for changing the channels. MultiPoint Connection It is also called multidrop configuration. In this connection two or more devices share a single link. There are two kinds of Multipoint Connections:

Features of Bus Topology

  1. It transmits data only in one direction.
  2. Every device is connected to a single cable Advantages of Bus Topology
  3. It is cost effective.
  4. Cable required is least compared to other network topology.
  5. Used in small networks.
  6. It is easy to understand.
  7. Easy to expand joining two cables together. Disadvantages of Bus Topology
  8. Cables fails then whole network fails.
  9. If network traffic is heavy or nodes are more the performance of the network decreases.
  10. Cable has a limited length.
  11. It is slower than the ring topology.

RING Topology It is called ring topology because it forms a ring as each computer is connected to another computer, with the last one connected to the first. Exactly two neighbours for each device. Features of Ring Topology

  1. A number of repeaters are used for Ring topology with large number of nodes, because if someone wants to send some data to the last node in the ring topology with 100 nodes, then the data will have to pass through 99 nodes to reach the 100th node. Hence to prevent data loss repeaters are used in the network.
  2. The transmission is unidirectional, but it can be made bidirectional by having 2 connections between each Network Node, it is called Dual Ring Topology.
  3. In Dual Ring Topology, two ring networks are formed, and data flow is in opposite direction in them. Also, if one ring fails, the second ring can act as a backup, to keep the network up.

Features of Star Topology

  1. Every node has its own dedicated connection to the hub.
  2. Hub acts as a repeater for data flow.
  3. Can be used with twisted pair, Optical Fibre or coaxial cable. Advantages of Star Topology
  4. Fast performance with few nodes and low network traffic.
  5. Hub can be upgraded easily.
  6. Easy to troubleshoot.
  7. Easy to setup and modify.
  8. Only that node is affected which has failed, rest of the nodes can work smoothly. Disadvantages of Star Topology
  9. Cost of installation is high.
  10. Expensive to use.
  11. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
  12. Performance is based on the hub that is it depends on its capacity MESH Topology It is a point-to-point connection to other nodes or devices. All the network nodes are connected to each other. Mesh has n(n-1)/2 physical channels to link n devices. There are two techniques to transmit data over the Mesh topology, they are :
  13. Routing
  14. Flooding

Routing In routing, the nodes have a routing logic, as per the network requirements. Like routing logic to direct the data to reach the destination using the shortest distance. Or, routing logic which has information about the broken links, and it avoids those node etc. We can even have routing logic, to re-configure the failed nodes. Flooding In flooding, the same data is transmitted to all the network nodes, hence no routing logic is required. The network is robust, and the its very unlikely to lose the data. But it leads to unwanted load over the network. Features of Mesh Topology

  1. Fully connected.
  2. Robust.
  3. Not flexible. Advantages of Mesh Topology
  1. Extension of bus and star topologies.
  2. Expansion of nodes is possible and easy.
  3. Easily managed and maintained.
  4. Error detection is easily done. Disadvantages of Tree Topology
  5. Heavily cabled.
  6. Costly.
  7. If more nodes are added maintenance is difficult.
  8. Central hub fails, network fails. HYBRID Topology It is two different types of topologies which is a mixture of two or more topologies. For example if in an office in one department ring topology is used and in another star topology is used, connecting these topologies will result in Hybrid Topology (ring topology and star topology). Features of Hybrid Topology
  9. It is a combination of two or topologies
  10. Inherits the advantages and disadvantages of the topologies included Advantages of Hybrid Topology
  11. Reliable as Error detecting and trouble shooting is easy.
  12. Effective.
  13. Scalable as size can be increased easily.
  14. Flexible.

Disadvantages of Hybrid Topology

  1. Complex in design.
  2. Costly.

Transmission Modes in Computer Networks

Transmission mode means transferring of data between two devices. It is also called communication mode. These modes direct the direction of flow of information. There are three types of transmission mode. They are :  Simplex Mode