Beruflich Dokumente
Kultur Dokumente
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
DEF. OF NETWORK Network is a system of computers together with peripherals which are
interconnected in such a way that each computer is autonomous.
Goal, Application And Advantages of Network
(1) Resource Sharing (2) Reliability (3) Low Cost Factor (4) Exchange of Information
(5) Access to Remote Database (6) Speedy and Easy Communication
Hardware sharing E-mail
Software sharing Chatting
Info and data sharing Computer telephony
Live show communication
through web-cams
ARPANET And NSFnet ARPANET is a large wide area network. It was created in 1960s by the
US Department of Defense Advanced Research Projects Agency (ARPA). That is why it got the
name ARPANET. It was created for the free exchange of information between universities,
research organizations and military. ARPANET was the network from which the modern time
Internet has evolved.
The National Science Foundation created NSFNET in 1980. It used the technology
developed by ARPANET to allow universities and schools to connect to each other. Later it
improved high speed network which formed todays Internet.
Internet The Internet is a world wide network of networks. It is a conglomeration of small and
large networks spanning the entire globe. It consists of 30,000 networks in 100 countries. Around
the world each country has at least on backbone network that operates at very high speed and
carries the bulk of traffic to other smaller networks connected to the backbone.
Backbone A backbone is central interconnecting structure of many networks. Backbone
employs the highest speed transmission paths in the network to the longest distance. A backbone
can span either a large geographic area or it can span as a backplane in a single cabinet.
Gateway A gateway is a device that connects dissimilar networks. A gateway has a
microprocessor that is capable of converting information from one network into a readable format
for a second network that uses a different protocols.
PROTOCOLS Protocol is a standard procedure for regulating data transmission between
computers or between devices such as modems. Internet uses a set of protocol called TCP/IP.
The TCP is responsible for dividing the file/message into packets on the source computer. It
also reassembles the received packets at destination recipient computer.
The IP is responsible for handling the address of destination commuter for sending the
file/message to the proper destination.
Functioning Of The Internet The information that is to be passed from one computer system to
another is broken up into pieces called packets using the TCP. Using the IP, a message (less than or
equal to 1500 bytes) is put into a packet. Each packet contains the address of sender and destination
(called IP addresses). These packets are moved form one network to another until they reach their
destination. At the destination point the TCP software reassembles the packets into a message as
was sent from source. If packets are damaged or lost a request is sent to resent them. It is not
necessary for all the packets in a single message to make the same route through the Internet or the
same message to take the same route each time it is send.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-1
Communication And Network Concepts Page - 2 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-2
Communication And Network Concepts Page - 3 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
In packet switching the data to be sent is divided into packets. The size of packet is
generally 128 bytes or 512 bytes. The format of a packet has been shown here.
The steps followed to establish connection are as
given below: Destination
1. The origin node locates the first intermediate node. Node Id
2. The origin node sends the packet one by one to
intermediate node.
3. The intermediate node checks the destination Id of Data
the packet.
4. If the Id of node does not match with the destination
Id of the packet, it sends the packet to next available Origin Node Id
node.
5. Steps 3 and 4 are repeated till the packet reaches to
its destination. FORMAT OF A PACKET
6. Steps 2 to 5 are repeated till all the data packets are
delivered.
The action taken by intermediate nodes (step 3 and 4) is known as store and forward method of
packet transfer. Since there is no connection or circuit between the sender and destination node, the
path followed by each packet from sender to receiver can be different. Due to different paths for
each packet and the propagation delays at intermediate nodes, the packet often arrive at the
destination node in disordered fashion as shown below:
Sender
Destination
Node
Node
PACKET SWITCHING
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-3
Communication And Network Concepts Page - 4 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Transmission Media
Guided Media
Twisted Pair Cable It consists of two identical wired wrapped together in a double helix, as is
shown in the following figure:
Conductor Copper
Foil Copper Foil
PVC PVC Shield wire
wire
Jacket Jacket
Twisted Pair Unshielded Twisted Pair Shielded Twisted Pair
Cable Cable Cable
Twisted pair cable used mostly in internal office telephone system is called VGM Voice
Grade Medium. High grade twisted pair cable used LAN application is called DGM Data Grade
Medium.
The twisting of wire reduces the crosstalk or bleeding of signal which means the presence of
an unwanted signal via an accidental coupling causing corrupt signals.
Advantages Of Twisted Pair Cable Simple Flexible Easy connection Easy
installation Low weight Very inexpensive
Disadvantages Of Twisted Pair Cable Signals do not go long distances without repeaters.
Unsuitable for broadband application Supports only maximum data rate of 1 Mbps.
Coaxial Cable A coaxial cable is made up of a central copper wire surrounded by a conductive
sleeve separated by a plastic insulator as shown in the following figure:
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-4
Communication And Network Concepts Page - 5 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
COAXIAL CABLE
The coaxial cable is an all purpose transmission medium because it is used in various
applications such as long distance telephone, television transmission, networking etc. Now a day
it is widely used as TV-cable.
Advantages Of Coaxial Cable Better data transmission characteristics than twisted pair cable
Can be used for a shared cable network Can be used for broadband transmission High rate
of data transmission rate up to 400 Mbps.
Disadvantages Of Coaxial Cable Expensive as compared to twisted pair cable. Not
compatible with the application where twisted pair cable are applicable.
Optical Fiber An optical fiber is a thin strand of light conducting glass or plastic firer. The fiber
is cylindrical shape of size 2 to 125 micro-meters that acts as transmission medium for pulses of
light carrying data. For creating pulse of light LED or LD (Laser Diode) is used. Optical fiber cable
has 3 sections as is indicated in the figure attached here. A bundle of optical fibers passes easily
through the eye of this needle. A single pair of such cables can carry over a thousand conversations
simultaneously
Jacket or sheath
for cable strength
Optical fiber
(ultra-pure silica )
for data carrying
Cladding for
refraction of light
OPTICAL FIBER
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-5
Communication And Network Concepts Page - 6 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
High-intensity
modulated
infrared beam
Server
INFRARED TRANSMISSION
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-6
Communication And Network Concepts Page - 7 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Geostationary
Communication Satellite
35680 km
Transponder (Reception
& Transmission) Device
Earth
Earth Station
Earth Station
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-7
Communication And Network Concepts Page - 8 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
The network spread over a city is called MAN. The main purpose of MAN is also hardware
and software sharing.
The network covering many countries is known as WAN. The main purpose of WAN is fast
and efficient exchange of information across various countries. WAN uses telephone, lease-line or
satellite. Internet is the largest WAN in the world.
NETWORK TOPOLOGY The network topology or simply the topology is the geometric
arrangement in which the nodes of a LAN are connected to each other. The choice of topology for
networking mainly depends on the cost of media, flexibility to ass/detach/replace new nodes and
reliability against node failure and malfunction.
Important topologies are Star, Bus, Ring and Tree topologies, which are described below:
Star Topology In star topology various nodes (computers and resources) are directly connected
to a central dedicated computer called hub of the star, as is illustrated in the following figure. Star
topology is mainly used in LAN.
Advantages Of Star Topology (1) Inherently fault tolerant, (2) Easy networking management,
(3) Easy fault detection, (4) Central control, (5) Simple access protocol.
Disadvantages Of Star Topology (1)
Hub-crash is catastrophic,
(2) More cables needed, (3)Cable
installation and maintenance problems, (4)
Difficult to expand, (5) Heavy dependency
and reliability on hub.
Bus Or Linear Topology In the bus
topology, various nodes are connected to a
long main trunk called backbone, which is a
twisted pair or coaxial cable.
Transmission travels the backbone
in both direction and can be received by all
other nodes. Th4e two ends of the backbone Hub or Switch
Work Stations
cable are terminated at both ends by as a Server
or Nodes
absorbers. These absorbers absorb the signal
from the cable after it has passed through all Star Topology
the nodes. Each nod has a NIC to recognize
it a address for the information transmitted in the form of packets. The bus or linear topology is
used in traditional data communication network.
Server
Nodes or Work Stations
Absorber
Drop
Backbone Cable
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-8
Communication And Network Concepts Page - 9 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Disadvantages Of Bus Topology (1) Difficult fault detection, (2) Single message can travel at a
time, (3) Chances of collision of messages from two nodes are possible, (4) A break or short circuit
in backbone can halt the entire network.
Ring Or Circular Topology In the ring topology, each node is connected to two and only two
neighboring nodes. Data is passed in one direction along the ring from one node to next. Each node
renews the data with anew electric pulse and sends its way. After passing through each node, the
data returns to the sending node, which removes it.
Advantages Of Ring Topology (1) Less cabling needed,
(2) Easy for optical fiber as medium, (3) Collision dont
occur, (4) No need for separate repeator.
Disadvantages Of Ring Topology (1) Each node handles
the data, (2) More failure changes if one node fails to
transfer the data, (3) Node failures causes network failure,
(4) Difficult fault diagnosis, (5) Difficult reconfiguration for
expansion.
Tree Topology Tree topology is the modified form of bus Ring or Circular Topology
topology. The original bus splits into number of separate
branches, as shown in the figure. In this topology,
transmission takes place in the same way as in bus topology. This is also known as hybrid
topology.
Bus
Tree Topology
NETWORK DEVICES
Modem (Modulator/Demodulator) A modulator is a device used as an interface between a
computer and a communication channel (telephone line). At sending end, a modulator converts
digital signal (from computer) to analog signal for transmission (modulation) and the receiving end
the modem converts analog signal to digital signal (demodulation).
A 25-pin connector or RS232C interface is common standard for connecting a computer to
a modem. (for external modems). The RJ11 (Registered Jack) connector is used for internal
modems.
Now a days fiber optic modems are also available which convert digital signals into pulses
of light for transmission over the glass fiber.
RJ 45 (Registered Jack 45) It is a eight-wire connector, which connects computer to
LAN especially Eth3ernets. RJ 45 is similar to RJ 11 (4-wird connector for telephone line) in
view as is illustrated in the figure below.
Note: Ethernet Ethernet is a trademark for a LAN protocol developed by Xerox, DEC and Intel.
Ethernet uses a bus or star topology and provides data transfer rate up to 10 Mbps.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-9
Communication And Network Concepts Page - 10 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
8 7 6 5 4 3 2 1 1 2 3 4 5 6 7 8
RJ 45
Ethernet Card Or LAN Adopter It is an especial PCB card which is fitted in the PCI slot
(Peripheral Component Interface) f the computers motherboard. Ethernet E2000C and E-2000T
are very popular LAN-adorers. It contains 2 or 3ports for the connection of RJ 45, BNC and AUI,
as is shown in the following figure.
RJ-45
Hub A hub is a physical layer device that interconnect several computers together. A hub
contains multiple independently connected modules of network and Internet-work equipment. Hub
has multi-slots in which multi-port cords can be inserted to provide additional access as the network
grows in size.
There are two types of hubs Active and Passive hubs. Active hub electrically amplifies the
signal, like repeaters. Passive hubs allow the signal to pass from one computer to another without
any change. Hubs support 8, 12, or 24 pin RJ 45 ports and often used in star or ring network.
Switch A switch is a device to make segments of a network into different subnetworks (called
subnets or LAN segments). It is done so to prevent traffic overloading. Switch supports any packet
protocol. LANs that are segmented through switches are called Switched LANs. In case of Ethernet
LAN, it is called Switched Ethernet LAN.
Repeater A repeater is a network device that amplifies and restores signals for long distance
transmission. Repeaters are helpful in a situation where the signals become weaker over the
transmission medium after a certain distance. In a simple repeater the noise (the distortion in the
signal) is also gets amplified, but in a regenerating repeater weak signals are amplified without the
amplification of noise.
Repeater
Bridge A bridge is a network device that connects two LANs which are physically different
and allows them to exchange data, even though they may have different topologies or
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-10
Communication And Network Concepts Page - 11 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
communication protocols. As a packet arrives at the bridge, the bridge examines the physical
destination address of the packet. The bridge then decides whether or not to let the packet cross.
Bridge
Router A router is a network device which interconnects tow complex networks and is used
to load balance between various paths that exists on networks. A router receives information and
forwards it based on what the router determines to be the most efficient route at the time of transfer.
(Advice Students are advised to see the picture of router from MS Encarta, for clear idea.)
Gateway A is a device that connects dissimilar networks having different Internet protocols.
Gateways operate at the highest layer (the application layer) of network abstraction. Thus a
gateway performs the protocols conversion between the networks which have different protocol
families. (Advice Students are advised to see the picture of router from MS Encarta, for clear
idea.)
ELEMENTARY RULES OF LAN DESIGN
Process of General Network Design The process of designing a network consists following
steps as shown in the following figure:
When we design a network, we must take into Redesigning of Network
consideration the following constrains or
problems:
Environment location of hosts, servers, Performance Sensitive Tests
terminals, and end nodes; traffic for the
environment; cost of delivering services.
Performance Constraints network reliability,
Simulation of Network Under
traffic performance, host/client
Expected Load
computer speed.
Networking Variables network topology,
line capacity and packet flow Model Network Workload
assignment.
The major goal of network design is to
minimize costs with thigh performance, and Topology And Technology
reliability. Selection
The 80 20 Rules In a properly
designed small to medium size network, 80% of Access Needs and Costs
the traffic on a given net segment must be local
(i.e. in the same workgroup) and not more than 20% of the network traffic should move across a
backbone.
Network performance can be improved by doing one of the following:
Moving resources to contain traffic locally within a workgroup.
Moving users (logically, if not physically) so that the workgroups more closely
reflect the actual traffic patterns.
Adding server so that users can access locally without crossing the backbone.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-11
Communication And Network Concepts Page - 12 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Host Z
Host A
Rule of Using Bridge Bridges implement the Spanning-Tree Protocol to make a loop-free
network technology. It means that on a network, one or more bridges may be blocked if they are
forming a loop, as shown in the following figure:
Blocked Working
Bridge Bridge
Spanning Tree Protocol ensures a loop free technology by blocking one or more bridges.
If now, more nodes are to be added, then multi-port repeater i.e. HUB is used.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-12
Communication And Network Concepts Page - 13 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
But, hub share bandwidth among all attached devices. Hubs cannot filter traffic. They send data
frames to all connected nodes. The solution for this problem is the use of smarter hub i.e. BRIDGE.
Bridge filters network traffic based on MAC addresses.
A SWITCH (or multi-port bridge) can effectively replace the four bridges and also gives a
dedicated bandwidth to each LAN segment.
10 Mbps 10 Mbps
10 Mbps 10 Mbps
But with switches, the network traffic travels to all LAN segments, not just to that segment where it
should go. This proble3m is solved with the use of ROUTER. The router filters the network traffic
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-13
Communication And Network Concepts Page - 14 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
(data packet) based on IP-address. The IP address tells the router which LAN segment the network
(data packet) should go.
10 Mbps 10 Mbps
10 Mbps 10 Mbps
Note: The transmission media, their speeds and suggested length has been provided in the
following table:
Transmission Maximum speed Speed
Medium / Cabling
Thicknet coax 500 m (1640 ft) 10 Mpbs
Thinnet coax 185 m (607ft) 10 Mpbs
Twisted pair 100 m (328 ft) 10 Mbps
Fiber optic 2 Km (6562 ft) 200 Mbps
Wireless 150 + 11 54 Mbps
Infrared varies Upto 16 mbps
SOME IMPORTANT PROTOCOLS
HTTP (Hypertext Transfer Protocol) The HTTP is a client/server protocol used on World
Wide Web (WWW) to govern the transfer of data. A client makes a request for a particular
document. The URL (Universe Resource Locator) of the document is sent to the HTTP server.
Then the HTTP server uses the HTTP protocol to deliver the required document to the client, as is
shown in the following figure:
Client
Process of HTTP HTTP
Server
The main features of HTTP are:
It is object oriented protocol that follows client server model of Internet.
It is a stateless protocol i.e. no continuous connection between client and sever. Thus it does
not relate information about the client.
It is a search and retrieve protocol.
It uses port number 80.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-14
Communication And Network Concepts Page - 15 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
TCP/IP (Transmission Control Protocol / Internet Protocol) The TCP/IP is a set of rules
that are based on communication architecture, that interconnect different types of LANs. It is
shown in the following figure ( On next page):
Applications, Applications,
FTP, Telnet, FTP, Telnet,
Operating System
Operating System
SMTP, PPP SMTP, PPP
TCP TCP
IP IP
Network Network
access access
Protocol 1 Protocol 2
IP (Internet Protocol)
Network Network Network
Network
access access 2
1
Protocol 1 Protocol 2
The TCP/IP architecture consists of 5 core protocols ( FTP, TELNET, SMPT and PPP)
known as Internet protocol suite . TCP and IP are two most common protocols of this suit,
discussed below:
(i) IP (Internet Protocol) The IP is used by the Internet to transfer messages from one computer
to another. The messages are sent in the form of packets. Each packets consists of 1500 or less
bytes data. Hence IP uses packet switching to connect multiple LANs within the same building or
different sites. IP identifies each network and each computer by a unique fixed address (32-bit).
This address is used by IP to determine the source and destination of a packet.
(ii) TCP (Transmission Control Protocol) The TCP provides the logic for ensuring the reliable
delivery of data to be exchanged between the host systems. It collects the related packets of a
message or together with blocks of data and places them in proper order. It also checks the validity
of the packets. Thus, it ensures reliable delivery of packets to the destination.
FTP (File Transfer Protocol) The FTP is a part of TCP/IP. This protocol helps in transferring
files from one computer/network to another computer/network. Thus , it allows a user to copy files
from a remote server/host to the users computer. The main features of FTP are:
It promotes sharing of files (programs and /or data)
It allows explicitly or implicitly the use of remote computer
It transfers data reliably and efficiently.
It is not just a protocol, but also a program used by commands.
TELNET (Network Terminal Protocol) This protocol (Internet utility) helps the user to login
at a remote computer and function as if he/she were connected to his/her own computer. It is a from
of dial up connection between the two computers for exchange of data.
For starting a TELNET session click at
Start Run (print) C:\windows\telnet.
Normally TELNET session requires valid user login name and password. Once a connection is
setup, we can start browsing as per the direction in the default menu. Finally to disconnect we can
use the Disconnect command from connect menu or simply press ALT + F4.
SMTP (Simple Mail Transfer Protocol) The SMTP is used to govern the transferring and
receiving electronic mails on networks, from one computer to another. SMTP does not provide
facilities to create message. Therefore, a user creates his message on a local editor, and through
TCP via SMTP it is sent to its destination.
SMTP is quite robust, but provides no facility fro authentication of sender or receiver, and
attachment of non-ASCII data.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-15
Communication And Network Concepts Page - 16 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-16
Communication And Network Concepts Page - 17 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
SMS (Short Message Service) The SMS is a transmission service for sending and receiving
text messages in the form of alpha-numeric characters, without image or graphics. SMS can be sent
to and received from a mobile phone, fax-machine and IP address.
When a message is sent, it is received by SMSC (Short Message Service Centre). Then, in
turn SMSC request to the HLR (Home Location Register) to find the location of roaming customer.
HLR responds to SMSC with subscribers status: 1) active or inactive and 2) subscribers location.
On the basis of this status, the SMSC sends the text message to its destination. It is clear form the
following figure:
SMSC
HLR
Email (Electronic Mail) The E-mail (e-mail) is a service provided by ISP (Internet Service
Process of SMS
Provider) through which electronic mails cab e sent and received over a computer network. The e-
mail service uses TCP/IP protocol suit to transmit the mail from one user to another by packet
switching mode.
Voice Mail The voice mail is a computerized telephone answering system that digitizes
incoming voice messages and stores them on a disk. This system has auto attendant capability, by
the use of which pre-recorded messages are sent to the appropriate person, department or mail-box.
Chat The chat or chatting is an on line textual talk in real time, between two or more users on
a LAN or Internet. The chat is accomplished by typing on the keyboard. Each keystroke is
transmitted as it is pressed.
Video Conferencing The 2-way face to face videophone conversation among multiple
participants is called video conferencing. Video conferencing cab eb accomplished through a
computer if webcam and video-conferencing software (such as Microsoft Netmeeting) is installed
in the computer. Video conferencing uses compressed digital images transmission over www on
Internet. A 56K communication channel supports freeze-frame video and with 1.544 Mbps channel,
full-motion video can be transmitted.
IMPORTANT INTERNET WORKING TERMS
|1| WWW (World Wide Web) The www is a system of Internet server that supports hypertext to
access many Internet protocols on a single interface. Almost all Internet protocols are accessible on
the web. This includes E-mail, FTP, Telnet and Usenet News. Besides these protocols, www has its
own protocols called HTTP (Hyper Text Transfer Protocol).
|2| Web Browser And Web Server The web browser is a software that allows to access and view
webpages. Microsoft Internet Explorer, Firefox Mozilla, Netscape Navigator are some very famous
web-browsers, and widely used in PCs.
Web server is a computer that provides www services on the Internet. It includes the
hardware, OS, web server software, TCP/IP protocols and the website contents (webpages). If the
web server is for internal use, it is known as an intranet-server.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-17
Communication And Network Concepts Page - 18 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|3| Website And Web Address The Website is a location on the serer of the concerned net. Each
website is recognized or denitrified by its unique address. This unique address is called URL
(Uniform Resource Locator or Universal Resource Location). For example,
http://www.freesoftware.com/dictionary.asp, ; http://www.msn.com etc. obvious the URL has
following format:
type://address/path
Where, type: specifies the type of server, address specifies the location of URL, and path
specifies the path of the file (HTML pages).
In any URL e.g. http://www.invention.com, the http gives the information about both the
protocol and the server. Generally the web servers name begins with www. The suffix .com
indicates the domain name.
The characters based naming system by which servers are identified is also known as
domain name system (DNS). Some important Internet servers are:
|4| Web Page A document that is used by HTTP is called webpage.
|5| Home Page The home page is the top-level web page of a website. When a website is opened
its homepage is loaded and displayed first of all.
|6| Web Portal The web portal is a website that hosts other websites, through hyper-linking.
www.yahoo.com is an example of web portal. Web portal also provides resources and services such
as e-mail, forum (e.g. orkut, facebook etc.). Search engines, on-line shopping etc.
|7| Web Hosting The web hosting is a means to hosting of web server application on a computer
system through which electronic content is available on the Internet to any web-browser client.
The computer which provides the web-hosting is known as web server or web host, which
allows their customers to place html pages, graphics, multimedia files etc. Web hosting can be
divided into following 4 categories
Web Hosting
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-18
Communication And Network Concepts Page - 19 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|11| DHTML (Dynamic HTML) The DHTML are such content on the web page that varies each
time when it is viewed. For example, the same URL is connected to different page depending on
some parameter such as :
(i) time or date (ii) geographical location of reader (iii)
previous page viewed (iv) profile of the reader etc.
Hence DHTML is an extension to HTML, which enable a Web page to react to the user
without sending request to the web server. Thus DHTML = HTML + script or variation of
contents of web page depending on some parameter.
|12| Mosaic The Mosaic is a GUI web browser created by the university of Illinois National
Centre for Super Computing applications (NCSA). It was released early in 1993. Mosaic was the
web browser that exploded the interest in WWW, throughout the world. Originally developed for
UNIX, it was soon ported to Windows. An enhanced version of NCSA Mosaic is offered by
Spyglass Inc Naperville IL.
|13| Gopher The Gopher is an Internet application that searches for file names on the Internet
and presents hierarchical menus to the user. As users select options, they are moved to different
Gopher servers on the Internet. If links have been established, Usenet news and other information
can be read directly from Gopher. There are more than 7000 Gopher servers on the Internet.
|14| Usenet (User Network) The Usenet s a public access network on the Internet that provides
user news and group e-mail. It is a giant, dispersed bulletin board that is maintained by volunteers
who provide news and mail feeds to other nodes. All the news that travels over the Internet is called
NetNews, and running collection of messages about a particular subject is called a newsgroup.
Usenet began in 1979 as a bulletin-board between two universities in North Carolina, and today,
there are more than 50000 newsgroups. News can be read via a Web browser or via Newsreader
such as nn, rn, trn and tin.
|15| Archie The Archie is an Internet utility program that allows searching the files of all Internet
FTP servers that offer anonymous FTP. Archie servers periodically updated catalogs of local files
that are available to the public and lets user search those catalogues.
|16| Veronica The Veronica is a program that searches for specific resources by description, not
just file name, but also Boolean searches (like AND, OR). Users can search the Gopher sites, read
the entire directory and file names and then index them in one large index. However with almost
complete demise of Gopher servers, Veronica has become a relic of the early 1990s.
|17| WAIS (Wide Area Information System) The WAIS is a networked information retrieval
system, which can search all documents containing a particular keyword. Whenever, a user types a
keyword or topic, the WAIS server searches the Internet databases and libraries and returns a
master index containing information of all the sites containing the required documents. WAIS uses
Z39-50 query protocol to communicate between clients and servers.
NETWORK SECURITY Network security means the security and assurance that only legal or
authorized users and programs get access to information resource like databases, web pages,
username and passwords etc.
PROBLEMS OF NETWORK SECURITY
|1| Physical Security Holes The unauthorized physical access to a computer and tampering with
files is called physical security holes. Hackers do it by guessing passwords of various users and
then gaining access to network systems.
|2| Software Security Holes The badly written program or a software compromised for doing
illegal things is called software security holes.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-19
Communication And Network Concepts Page - 20 Communication And Network Concepts
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
|3| Inconsistent Usage Holes The inconsistent usage holes occurs when a system administrator
collects a group of hardware and software which flaws the system seriously from security point of
view.
~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. Nasra || This Tutorial is prepared by : A. NASRA Page-20