Essentials of Computer Science Notes
Essentials of Computer Science Notes
1
MILESTONES OF COMPUTER EVOLUTION
The evolution of computers can be traced back several centuries starting with
simple mechanical devices and progressing to the complex electronic systems we use
today
• Abacus (3000 BCE): The abacus, one of the earliest known calculating tools,
consisted of a series of beads or stones on rods used for arithmetic calculations.
• Analytical Engine (1837): Proposed by Charles Babbage the Analytical Engine was
a mechanical computing device that utilized punched cards for input and had the
capability to perform complex calculations.
• Vacuum Tubes (1940s): Vacuum tubes were electronic components used as switches
and amplifiers in early electronic computers
• ENIAC (1946): The Electronic Numerical Integrator and Computer (ENIAC) was
one of the first general-purpose electronic computers.
• Transistors (1947): The invention of the transistor by John Bardeen, Transistors
replaced vacuum tubes making computers smaller, more reliable, and more energy-
efficient.
• Integrated Circuits (1958): Jack Kilby and Robert Noyce independently integrated
circuit which allowed multiple transistors and other components to be miniaturized
onto a single silicon chip.
• Mainframe Computers (1960s): Mainframe computers were large centralized
machines capable of processing vast amounts of data.
• Microprocessors (1971): The invention of the microprocessor by Intel with the
release of the Intel 4004, marked a significant milestone. Microprocessors integrated
the functions of a central processing unit (CPU)
• Personal Computers (1980s): The introduction of personal computers, such as the
IBM PC and Apple Macintosh, made computing accessible to individuals.
• World Wide Web (1990): Tim Berners-Lee created the World Wide Web a system
of interlinked hypertext documents accessible via the internet.
• Mobile Computing (2000s): The rise of smartphones and tablets brought computing
to the fingertips of billions of people worldwide. Mobile devices the internet, apps,
and various services.
• Cloud Computing (2006): Cloud computing emerged as a paradigm where
computing resources such as storage and processing power, are accessed remotely
over the internet.
2
INTERNET
• The internet is a global network of interconnected computers and other devices that
allows for the exchange of information and communication across vast distances.
• The origin of Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
• ARPANET was developed by United States Department of Defense.
• In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet
Advantages
Disadvantages
3
.
• Internet Protocols: Protocols are the rules and standards that govern how data is
transmitted, addressed, and processed on the internet.
• Networking Technologies: Various networking technologies enable the functioning
of the internet. These include Ethernet, Wi-Fi, routers, switches, and modems.
• Internet Services and Applications: The internet offers a wide range of services and
applications that leverage its connectivity.
• Internet of Things (IoT): The IoT refers to the network of interconnected devices,
sensors, and objects that communicate and exchange data over the internet.
• Data Communication and Networking: Computer scientists study the principles
and techniques of data communication and networking to understand how data is
transmitted, routed, and received across the internet.
• Web Development and Internet Technologies: Computer science encompasses the
development of web-based applications and technologies.
HISTORY
The history of computers spans several centuries, with the development of various
mechanical and electronic devices that paved the way for the modern computer.
Mechanical Computing Devices
• Abacus: The abacus, developed in ancient times, was the earliest known mechanical
device used for performing arithmetic calculations.
First Programmable Computing Devices
• Jacquard Loom: In the early 19th century, Joseph-Marie Jacquard developed a
mechanical loom that used punched cards to control the weaving of intricate patterns.
• Analytical Engine: In the mid-19th century, Charles Babbage designed the
Analytical Engine, a mechanical computing device that incorporated concepts like
conditional branching and loops.
Early Electronic Computers
• Atanas off-Berry Computer (ABC): In the late 1930s and early 1940s, physicist
John Atanasoff and engineer Clifford Berry developed the ABC,
4
• Colossus: During World War II, British code breakers developed the Colossus
computer to decrypt German messages.
• Stored-Program Computers and Transistors
• ENIAC: The Electronic Numerical Integrator and Computer (ENIAC), completed in
1945 was the first general-purpose electronic computer.
• Transistors: In the late 1940s, transistors were invented, replacing vacuum tubes and
enabling smaller, more reliable and faster electronic components
5
• Internet of Things (IoT): With the growth of IoT, everyday objects are now
connected to the internet, enabling them to collect and exchange data.
Internet Service Providers
• An Internet Service Provider (ISP) is a company or organization that provides internet
access to individuals, businesses, and other entities.
• ISPs connect users to the internet, enabling them to browse websites, send and receive
emails, stream videos, and engage in various online activities.
• ISPs typically offer different types of internet connections, including dial-up, DSL
(Digital Subscriber Line), cable, fiber optic, and wireless
Characteristics
• E-mail Account:
• User Support:
• Access to high-speed internet:
• Spam Blocker:
• Web Hosting:
Advantages
• The customer need not then bother with either the technicalities
• Many ISPs, being professional companies, provide its clientele with high-speed
internet.
• ISPs offer a very high degree of reliability and availability
Disadvantages
• Because of the range of options available in the market and due to cut-throat
competition,
6
• If an Internet Service Provider is stretched thin because of hosting too many sites on a
shared server,.
Common Types of ISPs
• Dial-up ISPs: Dial-up ISPs were popular in the early days of the internet. Users
would connect to the internet using a modem and a telephone line.
• DSL ISPs: DSL ISPs use existing telephone lines to provide internet access. DSL
offers faster speeds compared to dial-up but is generally slower than cable or fiber
optic connections.
• Cable ISPs: Cable ISPs provide internet access over coaxial cables that are primarily
used for cable television.
• Fiber Optic ISPs: Fiber optic ISPs deliver internet access through fiber optic cables,
which transmit data using light signals.
• Wireless ISPs: Wireless ISPs (WISPs) use wireless technologies, such as radio waves
or satellite signals, to provide internet access.
• Mobile ISPs: Mobile ISPs offer internet access through cellular networks. Users can
connect to the internet using smartphones, tablets, or other mobile devices.
Types of Networks
There are several types of networks that are commonly used to connect devices and
facilitate communication and data sharing.
7
Wide Area Network (WAN):
• A Wide Area Network covers a larger geographic area, such as multiple buildings,
cities, or even countries.
• WANs are typically used to connect multiple LANs and provide connectivity between
different locations.
Wireless Network
• A wireless network allows devices to connect to a network without the need for
physical cables.
8
• Wi-Fi is a common example of a wireless network, enabling devices such as laptops,
smartphones, and tablets to connect to a LAN or the internet.
9
• It provides a platform for internal communication, collaboration, and document
sharing.
• It enables secure collaboration and information sharing with external entities
10
• Public IP Address: A public IP address is assigned to a device directly connected to
the internet.
• It is unique and globally routable, allowing the device to communicate with other
devices on the internet.
• IPv4: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to
192.168.255.255.
• IPv6: fc00::/7 (Unique Local Addresses) and fd00::/8 (Private-Use Addresses)
Sub Netting
• Sub netting is the process of dividing a larger network into smaller sub networks
called subnets.
• Sub netting helps optimize network performance, improve security, and efficiently
utilize IP addresses.
11
DNS Work Components
• Domain Names: Domain names are user-friendly hierarchical, and human-readable
names that represent specific resources on the Internet.
• IP Addresses: IP (Internet Protocol) addresses are numeric identifiers assigned to
every device connected to the Internet. For example, "192.0.2.1" is an IP address.
DNS Resolution Process
• When you enter a domain into your web browser or any other application, the DNS
resolution process begins. It involves the following steps
• Caching: Your device first checks its local DNS cache to see if the domain name and
its corresponding IP address have been recently accessed.
• Root Servers: If the DNS resolver doesn't have the requested information, it contacts
one of the 13 root DNS servers worldwide.
• TLD Servers: The root server directs the resolver to the appropriate TLD server
based on the domain's extension
• Authoritative Servers: The TLD server in turn, directs the resolver to the
authoritative DNS server responsible for the specific domain name
• IP Address Retrieval: The authoritative DNS server finally returns the corresponding
IP address for the requested domain name.
• DNS Response: The DNS resolver caches the IP address and sends the information
back to your device
• DNS Records: DNS records are stored on authoritative DNS servers and contain
various types of data related to domain names
12
Applications
• It seems like you're asking about general applications not necessarily network
applications.
• They can range from productivity tools to entertainment and there are countless
applications available across various platforms.
Productivity Applications
• Word Processors (e.g., Microsoft Word, Google Docs)
• Spread sheets (e.g., Microsoft Excel, Google Sheets)
• Presentation Software (e.g., Microsoft PowerPoint, Google Slides)
Communication and Social Media Applications
• Messaging Apps (e.g., WhatsApp, Facebook Messenger)
• Social Networking Apps (e.g., Facebook, Twitter, Instagram)
• Video Calling Apps (e.g., Zoom, Skype)
Web Browsers:
• Google Chrome,
• Mozilla Firefox,
• Apple Safari,
• Microsoft Edge
Travel and Navigation Applications
• Mapping and GPS Apps (e.g., Google Maps, Waze)
• Travel Planning Apps (e.g., Airbnb, Expedia)
Finance Applications:
• Online Banking Apps (e.g., Chase Mobile, PayPal)
• Budgeting and Expense Tracking Apps (e.g., Mint, YNAB)
Ethical and Social Implications
Ethical and social implications refer to the potential consequences and considerations
As technology becomes increasingly integrated into various aspects of our lives,
13
• Privacy and Data Protection: Advancements in technology have led to the
collection and storage of vast amounts of personal data.
• Artificial Intelligence and Automation: As AI and automation continue to advance
there are ethical considerations the impact on employment and the potential for biased
decision-making algorithms.
• Cyber security and Hacking: The digital world is vulnerable to cyber-attacks and
hacking incidents that can disrupt critical infrastructure steal sensitive information.
• Environmental Impact: The rapid growth of technology and electronic devices leads
to a significant environmental impact manufacturing processes.
• Globalization and Cultural Impact: The interconnectedness of the world through
technology can lead to cultural homogenization and the loss of traditional practices
and languages.
• Ethical Use of Emerging Technologies: Technologies like virtual reality, augmented
reality and brain-computer interfaces raise ethical questions about privacy, consent,
and potential misuse.
• Intellectual Property and Copyright: Digital technologies make it easier to
reproduce and distribute copyrighted material raising concerns about intellectual
property rights and fair compensation for creators
Network and Security Concepts
• Network and security concepts encompass a wide range of principles, protocols, and
practices that play a crucial role in establishing, maintaining, and protecting computer
networks
• These concepts is essential for building reliable and secure network infrastructures
14
• Network Topologies: Network topology refers to the physical or logical layout of
devices in a network
• Network Protocols: Protocols are rules and conventions that govern data
communication between devices on a network.
• IP Addressing: IP addresses are unique numeric identifiers assigned to devices on a
network. IPv4 (32-bit) and IPv6 (128-bit) are the two main versions of IP addressing
used to route data between devices across the Internet.
• Sub netting: Sub netting is the process of dividing a large IP network into smaller
more manageable sub networks. It allows for efficient IP address allocation and
improves network performance
• Routing and Switching: Routers and switches are essential network devices that
enable data packets to be forwarded between devices in different networks
• Firewalls: Firewalls are security devices that monitor and control incoming and
outgoing network traffic based on predetermined security rules.
• VPN (Virtual Private Network): A VPN allows secure remote access to a private
network over a public network, such as the Internet.
15
• Encryption: Encryption is the process of converting data into a code to prevent
unauthorized access.
• Access Control: Access control mechanisms determine who can access specific
network resources and access .
• Network Segmentation: Network segmentation involves dividing a large network
into smaller isolated segments.
• Load Balancing: Load balancing distributes network traffic across multiple servers
or devices to ensure efficient resource utilization and prevent network congestion
• Disaster Recovery and Redundancy: Disaster recovery strategies and redundancy
mechanisms implemented to ensure business continuity in the event of network
failures
• Social Engineering: Social engineering involves manipulating individuals into
divulging confidential information or performing actions that compromise network
security.
Information Assurance Fundamentals
Information Assurance (IA) is a multidisciplinary approach to protecting and
managing information assets, ensuring the confidentiality, integrity, availability, and
authenticity of information.
Fundamentals of Information Assurance
• Information Security: It involves protecting information from various threats, such
as cyber-attacks, data breaches, and insider threats.
• Risk Management: Risk management is the process of identifying, assessing, and
mitigating risks to information assets.
• Confidentiality: Confidentiality ensures that sensitive information is accessible only
to authorized individuals or entities and is protected from unauthorized disclosure.
• Integrity: Integrity guarantees that information remains accurate complete, and
unaltered throughout its lifecycle.
• Availability: Availability ensures that information and information systems are
accessible and operational when needed.
• Authentication: Authentication is the process of verifying the identity of users
devices, or entities attempting to access information or resources.
• Authorization: Authorization determines what actions or resources users or entities
are allowed to access after successful authentication.
• Non-Repudiation: Non-repudiation prevents individuals from denying their actions
or transactions.
• Compliance: Compliance ensures that organizations adhere to relevant laws,
regulations, and industry standards concerning information security and privacy
16
• Training and Awareness: Educating employees and stakeholders about security best
practices and potential threats
Cryptography-Symmetric and Asymmetric
• Cryptography is the science and practice of secure communication and data protection
through the use of mathematical algorithms and keys.
• It plays a vital role in ensuring the confidentiality integrity, and authenticity of
information.
• There are two primary types of cryptographic systems:
• symmetric cryptography
• asymmetric cryptography
Symmetric Cryptography
• Symmetric cryptography involves the use of a single secret key for both encryption
and decryption of data.
• The sender and receiver must share this secret key in advance making secure key
distribution a significant challenge
17
• Lack of non-repudiation: Symmetric cryptography does not provide a mechanism
for non-repudiation meaning the sender of a message can deny having sent it.
Asymmetric Cryptography
• Asymmetric cryptography uses a pair of mathematically related keys: a public key
and a private key.
• The public key is widely distributed and used for encryption, while the private key is
kept secret and used for decryption
Overview of The Process:
• Encryption: The sender uses the recipient's public key to encrypt the plaintext data,
generating cipher text.
• Decryption: The receiver uses their private key to decrypt the cipher text and recover
the original plaintext
18
• Phishing Attacks: Phishing emails or messages with malicious attachments or links
are often used to trick users into downloading malware.
• Infected Removable Media: Malware can spread through infected USB drives
external hard drives to a network device, the malware may transfer to that device and
start infecting other connected devices
• Malicious Advertisements: Users may unknowingly click on these ads, leading to
malware infection on their devices.
• Insider Threats: Malicious actors within an organization can intentionally introduce
malware into the network.
Various Techniques
• Worm-like Behavior: Some malware, such as worms, are specifically designed to
self-propagate through network connections.
• Credential Theft: Malware can steal login credentials or use brute-force attacks to
compromise other devices or servers within the network.
• Lateral Movement: Malware can move laterally within a network exploiting weak
security controls to critical systems
Protect Malware Organizations
• Use reliable and up-to-date antivirus and anti-malware software on all network
devices.
• Regularly apply security patches and updates to close known vulnerabilities.
• Implement firewalls, intrusion detection and prevention systems (IDS/IPS), and other
network security measures.
Firewalls
• Firewalls are network security devices that act as a barrier between a trusted internal
network and an untrusted external network.
• Firewalls play a crucial role in protecting the network from unauthorized access
malicious activities, and potential cyber threats
19
Firewalls Work
• Packet Filtering: The basic function of a firewall is packet filtering, which means
examining individual data packets as they pass through the firewall. The firewall
checks the packet headers and applies filtering
Fraud Techniques
Fraud techniques encompass a range of deceptive practices used to deceive
individuals, businesses, or systems in order to gain unauthorized access steal sensitive
information or obtain financial benefits
20
Overview Fraud Techniques
• Phishing: Phishing involves sending fraudulent emails, messages, sensitive
information, such as login credentials, credit card numbers, or personal details.
• Social Engineering: Social engineering relies on manipulating people into divulging
confidential information actions that compromise security.
• Identity Theft: Identity theft occurs when fraudsters steal someone's personal
information to impersonate them for financial gain or to commit other crimes.
• Malware: Fraudsters use malicious software to infect devices and steal information,
gain unauthorized access or cause harm
• Card Skimming: This technique involves installing devices on payment terminals or
ATMs to capture credit or debit card information when users make transactions.
21
• Informational Privacy: Ensuring that personal information collected about
individuals is used only for the intended purposes and is not shared or sold to third
parties without explicit consent.
• Bodily Privacy: Protecting an individual's physical body from intrusive actions or
surveillance.
• Communication Privacy: Securing the confidentiality of communications, such as
emails messages, and phone calls, from unauthorized interception or monitoring
Data Protection
• Data protection refers to the measures and practices put in place to safeguard personal
data from unauthorized access, loss, alteration, or disclosure.
22
Regulations
• General Data Protection Regulation (GDPR): Enforced in the European Union
(EU), GDPR sets comprehensive data protection rules and provides individuals with
enhanced rights over their data.
• Health Insurance Portability and Accountability Act (HIPAA): A U.S. law that
mandates data privacy and security standards for protected health information
23
ADVANCED APPLICATION OF COMPUTER SCIENCE
UNIT V: Advanced Applications of computer Science Number System-Binary,
Octal, decimal, and Hexadecimal, Signals-Analog, Digital, Modem, Codec,
Multiplexing, Transmission media, error detection and correction- Parity check and
CRC, Networking devices- Repeater, hub, bridge, switch, router, gateway.
Number System
A number system is a way of representing and expressing quantities in a systematic
and organized manner.
Different number systems have been developed and used throughout history, and they
serve as the foundation for mathematics and various computing systems
Common Number Systems
• Decimal Number System (Base-10): The decimal system is the one we use in our
day-to-day lives.
• It has ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Each digit's position represents a power
of 10.
• For example, in the number "365," the '3' is in the hundreds place (10^2), the '6' is in
the tens place (10^1), and the '5' is in the units place (10^0)
24
Octal Number System (Base-8)
• Octal Number System (Base-8): The octal system uses eight digits: 0, 1, 2, 3, 4, 5, 6,
and 7.
• Each digit's position represents a power of 8.
• Octal is less common today but is still sometimes used in computing
25
• For example, binary is used in computers because it directly maps to electronic on/off
states (0s and 1s).
Signals-Analog
• Analog signals are a fundamental concept in the field of electronics and
communication.
• They are a type of signal that represents information as continuous, varying quantities.
• In contrast to digital signals, which are discrete and represent information using a
series of 0s and 1s, analog signals convey data as continuous changes in voltage,
current, or frequency over time
26
• A digital system is a type of system that processes and represents data using discrete
values, typically in the form of binary digits, also known as "bits," which can be either
0 or 1.
Overview of Digital Systems:
• Binary Representation: In a digital system, data is represented using binary digits
(0s and 1s).
• Discrete Levels: Digital signals are discrete, meaning they can only take specific,
well-defined levels (0 and 1). This is in contrast to analog signals.
• Boolean Logic: Digital systems use Boolean logic to perform operations and make
decisions with true and false values, represented as 1 and 0, respectively. Logic gates,
such as AND, OR, NOT, and XOR, form the building blocks of digital circuits.
• Digital Circuits: Digital systems consist of electronic circuits that process digital
signals such as arithmetic operations, data storage, and logical decision-making
• Microprocessors and Microcontrollers: Microprocessors are central processing
units (CPUs) found in computers and other digital devices.
• Digital Communication: Digital technology is used extensively in communication
systems.
• Digital Storage: Digital data can be stored in various media, such as hard drives,
solid-state drives (SSDs), USB flash drives, and optical discs.
• Digital Signal Processing (DSP): Digital signal processing involves manipulating
digital signals to extract information
• Digital Entertainment: Digital technology has revolutionized entertainment
industries.
• Digital Security: Digital systems face various security challenges, such as data
breaches, hacking, and malware.
Modem
A modem, short for "modulator-demodulator," is a communication device used to
transmit and receive digital data over analog communication channels.
It is a critical component in connecting digital devices such as computers to analog
communication networks like telephone lines or cable systems.
Overview of Modems
• Modulation and Demodulation: The primary function of a modem is to convert
digital signals from a computer into analog signals for transmission over an analog
medium (modulation), and then convert the received analog signals back into digital
signals (demodulation) that can be understood by the digital device on the other end
Types of Modems
27
• Telephone Modems: These are the most common type of modems used historically
to connect computers to the public switched telephone network (PSTN) for dial-up
internet access.
• Cable Modems: Cable modems are used to access the internet via cable television
infrastructure.
Data Transmission Speeds
• Data Transmission Speeds: Modems are rated by their data transmission speeds,
usually expressed in bits per second (bps) or a multiple
• Connection Interfaces: Modems can connect to devices using various interfaces,
including serial ports (RS-232), USB, or Ethernet.
Obsolete Technology
• Traditional dial-up modems have become largely obsolete due to the widespread
availability of high-speed broadband internet connections like DSL, cable, fiber optic,
and wireless technologies they were essential in the early days of the internet when
broadband access was limited
• DSL Modems and Routers: DSL (Digital Subscriber Line) modems are commonly
used in homes and businesses to provide internet access over telephone lines.
Integrated Modems
• In many cases modems are now integrated into other devices such as routers, which
are often provided by internet service providers (ISPs) to customers for internet
connectivity.
Security Considerations
• With the rise of broadband internet connections, security concerns related to modems
have evolved.
• Firewalls and security features are now essential to protect against unauthorized
access and cyber threats
Codec
• A codec, short for "coder-decoder" or "compressor-decompressor," is a technology
used to encode (compress) and decode (decompress) data for efficient storage,
transmission, and playback.
• Codecs are widely used in various fields, including audio, video, and
telecommunications.
Data Compression
• Data Compression: The primary purpose of codecs is data compression which
reduces the size of digital data by eliminating redundant or unnecessary information.
• Lossless Codec: A lossless codec compresses data without any loss of quality. When
the data is decompressed, it is identical to the original, uncompressed data.
28
• Lossy Codec: A lossy codec achieves higher compression ratios by selectively
discarding some data. The loss of some detail is often imperceptible to human senses
Audio Codecs
• MP3 (MPEG Audio Layer III): A lossy audio codec commonly used for music and
audio streaming.
• AAC (Advanced Audio Codec): Another lossy codec used for audio compression,
known for its high quality at lower bit rates.
Video Codecs
• H.264 (AVC): A widely used and efficient video codec for various applications,
including online streaming and video conferencing.
• Real-Time Communication: In video conferencing and VoIP applications, codecs
play a crucial role in compressing audio and video data to ensure smooth real-time
communication over the internet
• Container Formats: Codecs are often used in combination with container formats
which provide a way to package compressed audio and video data, along with other
multimedia elements, into a single file
Hardware and Software Codecs
• Hardware and Software Codecs: Codecs can be implemented in both hardware and
software.
• They have revolutionized digital media allowing us to enjoy high-quality content
while minimizing data size and bandwidth requirements
Multiplexing
Multiplexing is a technique used in telecommunications and data communication to
combine multiple signals into a single transmission channel.
Multiplexing plays a crucial role in modern communication systems allowing multiple
to share a common communication link
Overview of Multiplexing
• Multiplexing takes advantage of the fact that different signals or data streams can be
combined without interfering with each other as long as they occupy different
frequency ranges or time slots.
Types of Multiplexing
29
• Frequency Division Multiplexing (FDM): FDM divides the available frequency
spectrum into multiple non-overlapping frequency bands, with each band assigned to
a different signal or data stream.
• Time Division Multiplexing (TDM): TDM allocates specific time slots within a
transmission cycle to different signals or data streams.
• Statistical Time Division Multiplexing (STDM): STDM is a variation of TDM that
dynamically allocates time slots to signals based on demand.
• Code Division Multiplexing (CDM): CDM assigns a unique code to each signal or
data stream and then combines them.
• The receiver can isolate and decode the individual signals using the corresponding
codes.
Space Division Multiplexing
• Space Division Multiplexing (SDM): SDM uses physical separation in space to
multiplex signals.
Multiplexing in Networking
• Frequency Division Multiple Accesses (FDMA): Divides the radio frequency
spectrum into non-overlapping frequency channels.
• Time Division Multiple Access (TDMA): Divides time into discrete slots, allowing
multiple users to share the same frequency channel
• Orthogonal Frequency Division Multiplexing (OFDM): A popular modulation
technique that divides a high-speed data stream into multiple lower-speed sub
streams,
Transmission Media
30
• Transmission media also known as communication channels or communication links,
are the physical pathways that carry signals and data between devices in a
communication system.
Coaxial Cable
• Coaxial cables consist of a central conductor surrounded by an insulating layer a
metallic shield, and an outer jacket.
Fiber Optic Cable
• Fiber optic cables use strands of glass or plastic to transmit data as pulses of light.
• Fiber optic cables are widely used in long-distance telecommunications, internet
backbone networks, and high-speed data networks
Wireless Transmission
• Wireless transmission media use electromagnetic waves to transmit data without
physical cables.
Satellite Communication
• Satellite communication uses geostationary or low-earth-orbit satellites to relay
signals over long distances.
31
Infrared Transmission:
• Infrared transmission uses infrared light to transmit data between devices.
• It is commonly used for short-range communication between devices like remote
controls and some wireless keyboards
Microwave Transmission
• Microwave transmission uses microwave frequencies to transmit data over point-to-
point links.
• It is used in backhaul networks, connecting cell towers to the core network, and in
certain wireless communication applications
32
Error Detection and Correction Techniques
33
• Odd Parity: The total number of ones, including the parity bit, is made odd. If the
number of ones in the original data is even the parity bit is set to 1 otherwise it is set
to 0
Cyclic Redundancy Check (CRC)
• Cyclic Redundancy Check (CRC): CRC is a more robust error detection technique
commonly used in data communication and storage systems.
• The checksum is calculated using polynomial division
• The sender and receiver agree on a polynomial before transmission. This polynomial
is used to create the checksum at the sender's end which is then appended to the data
being sent.
Networking Devices
Networking devices are hardware components that play essential roles in the functioning and
management of computer networks.
These devices operate at different layers of the OSI (Open Systems Interconnection) model
each serving specific functions
34
Hub
• Hub: A hub is a basic networking device that operates at the physical layer (Layer 1)
of the OSI model.
• It is used to connect multiple devices within a local area network (LAN).
• Hubs are simple but inefficient devices, as they do not manage or control network
traffic, leading to collisions and reduced network performance
Switch
• Switch: A switch is a more intelligent device that operates at the data link layer
(Layer 2) of the OSI model.
• It connects multiple devices in a LAN and efficiently forwards data only to the
intended recipient.
• This reduces collisions and improves network performance
Router
• A router operates at the network layer (Layer 3) of the OSI model and is used to
connect multiple networks, such as LANs and Wide Area Networks (WANs).
35
• Routers are responsible for forwarding data between networks based on IP (Internet
Protocol) addresses.
• Network Address Translation (NAT) to enable private IP addresses in a LAN to
access the internet using a single public IP address
Modem
• A modem is a networking device used to connect computers and other digital devices
to the internet or other wide area networks.
• It converts digital data from a computer into analog signals suitable for transmission
over traditional telephone lines for transmission over cable lines
36
Firewall
• A firewall is a security device that helps protect a network from unauthorized access
and cyber threats.
• It filters incoming and outgoing network traffic based on predefined rules allowing or
blocking data packets as needed.
• Firewalls can be either hardware or software-based and are crucial for network
security
Repeater
• A repeater is a network device used to extend the reach and improve the signal
strength of data transmitted over a network.
• It operates at the physical layer OSI model and is commonly used in both wired and
wireless networks.
37
Signal Regeneration
• As data travels through a network medium it can suffer from signal degradation due to
factors like distance, interference, or environmental obstacles.
• This degradation leads to a weakening of the signal, which can result in errors and
data loss
Extending Network Range
• One of the primary purposes of using repeaters is to extend the range of a network the
strength of signals repeaters enable data to travel longer distances across the network
medium.
• This is especially useful in large-scale networks environments where the distance
between devices
Transparent Operation
• Repeaters are transparent devices, meaning they do not modify the data or headers of
the frames they receive.
• They operate at the physical layer, dealing with raw electrical signals, without any
knowledge of the network's higher-layer protocols.
Router
A router is a networking device that acts as an intermediary between multiple networks.
Its primary function is to forward data packets between different networks to enable
communication and data exchange.
Routers are essential components in computer networks including the internet
38
Types of Router
• Broadband Routers: These are one of the important kinds of routers. It is used to do
different types of things.
• Wireless routers: These routers are used to create a wireless signal in your office or
home.
• Edge Routers: As the name indicates these are located at the edges usually connected
• Core Routers: Core routers distribute packets within the same network.
Router Working
Advantages of Router
• Easier Connection: Sharing a single network connection among numerous machines
is the router’s main job.
• Security: Undoubtedly installing a router is the first step in securing a network
connection.
• Supports Dynamic Routing: The router employs dynamic routing
• Filtering of Packets: Switching between packets and filtering packets are two more
router services
Disadvantages of Router
• Slower: Routers analyze multiple layers of information from the physical layer to
the network layer, which slows down connections.
39
• High Cost: They are more expensive than some other tools for systems
administration.
• Bandwidth shortages: Dynamic routing techniques used by routers to support
connections tend to cause network overhead
Gateway
• In networking a gateway is a network device software system that serves as an entry
point exit point between different networks.
• It acts as an interface or bridge that connects networks with different protocols
architectures communication methods.
• Gateways play a crucial role in enabling communication and data exchange between
diverse networks.
Types Of Gateways
• High Bandwidth Gateways
These Gateways are meant for a more complex and intelligent Internet of Things
• Low Bandwidth Gateway
These Gateways are really the best choice while choosing a simple smart object
Gateways Work
• The user end’s application made a request for a certain amount of data via its portal to
the gateway.
40
• The gateway sends this request for a password to the server.
• The server receives the request and search for the data type.
• The data is then sent to the smart door interface where it is matched with the data
entered for data type: “password”.
Gateways Functions
• Network Connectivity: The primary purpose of a gateway is to establish
connectivity between different networks.
• Internet Gateway: In home or small office environments, a gateway is commonly
referred to as an internet gateway.
• Cloud Gateways: With the rise of cloud computing cloud gateways have become
important components.
• IoT Gateways: In the context of the Internet of Things (IoT) gateways are used to
connect IoT devices to the internet or central servers.
41