Introduction to Internet Materials for First Two Units
Introduction to Internet Materials for First Two Units
Unit – I
Introduction to internet
The Internet is a vast system of networks that use standardized communication protocols to
connect devices and allow data exchange. It operates on the TCP/IP protocol suite, which ensures
reliable data transfer across diverse hardware and software platforms.
1. Infrastructure:
o Composed of servers, routers, cables, and satellites.
o Data travels in packets across these interconnected devices.
2. Protocols:
o HTTP/HTTPS: For accessing websites.
o SMTP/IMAP: For email communication.
o FTP: For file transfers.
3. Domain Name System (DNS):
o Converts human-readable domain names (e.g., www.google.com) into IP addresses.
4. Internet Service Providers (ISPs):
o Companies that provide Internet access to users.
Growth of internet
The Internet has seen exponential growth since its inception, transforming from a small research
project into a global phenomenon connecting billions of people and devices
2
Internet Growth
1. Technological Advancements:
o Faster networks (e.g., 4G, 5G).
o Improved hardware like smartphones, laptops, and tablets.
o Development of efficient communication protocols.
2. Globalization:
o Increasing interconnectivity of economies, businesses, and cultures.
o Demand for cross-border communication and collaboration.
3. Affordability:
o Reduced costs of Internet-enabled devices.
o Cheaper data plans and free Wi-Fi hotspots.
4. Government Initiatives:
o Policies promoting digital inclusion and infrastructure development.
o Universal Service Funds to provide rural connectivity.
5. Innovation:
o Rise of e-commerce, social media, and online entertainment.
o Growth of digital services like telemedicine, e-learning, and fintech.
Anatomy of computers
The term 'Internet' includes both the hardware (satellites, cable, routing devices and computers)
and the software (programs and network protocols) that enable computers to communicate with each
other.
When information is sent across the Internet, the Transmission Control Protocol (TCP: the
networking-language computers use when communicating over the Internet) first breaks the
information up into packets of data. The client computer sends those packets to the local network,
Internet service provider (ISP), or online service. From here, the packets travel through many levels of
networks, computers, and communications lines until they reach their final destinations.
Many types of hardware help the packets on their way. These are:
Hubs, which link groups of computers together and let them intercommunicate through multiple ports.
Bridges, which link local area networks (LANs) with each another.
Gateways, which act like bridges, but also convey data between dissimilar networks.
Repeaters, which amplify the data at intervals so that the signal doesn't weaken.
Routers, which ensure packets of data arrive at their proper destination across different technologies,
3
All hardware units need common operating methods, basic instructions called protocols that specify to
all parties how the data will be handled.
Internet Connections
1. Twisted wire: two insulated copper wires twisted into pairs for ordinary telephone communications,
and 4 pairs of copper cabling for Internet networks. Transmission speeds range from 2 Mbps to 100
Mbps. (Transmission speed or bandwidth is measured in bits per second, where K a thousand, M a
million, and G is a thousand million.)
2. Coaxial cables: copper or aluminum wire wrapped with an insulating and flexible material: widely
used for cable television systems, office buildings, and for local area networks generally. Transmission
speeds range from 200 Gbps to over 500 Gbps.
3. Optical fiber cable: one or more filaments of glass fiber wrapped in protective layers: not affected
by electromagnetic radiation. Transmission speeds may exceed 1000 Gbps.
History of WWW
WWW stands for World Wide Web and is commonly known as the Web. The WWW was started
by CERN in 1989. WWW is defined as the collection of different websites around the world,
containing different information shared via local servers(or computers).
It is a created, by Tim Berner Lee in 1989, for researchers to work together effectively at CERN.
System Architecture :
4
How is it Works?
Applications of internet
Communication: The internet allows people to communicate through email, chat, and video
conferencing.
Web browsing: The internet allows people to browse the World Wide Web, which includes social
media, online shopping, and other services.
Online research: The internet allows people to search for information and conduct research.
File sharing: The internet allows people to copy files between computers.
Streaming media: The internet allows people to stream video and music.
Navigation: The internet allows people to navigate using their car, smart scooter, or other devices.
Games: The internet allows people to play interactive games and multiplayer online games.
Education: The internet allows teachers to teach their students with the help of projectors and the
internet.
5
Travel: The internet allows people to book holiday tours, hotels, and trains.
Stock market updates: The internet allows people to get stock market updates.
IP address: A unique string of numbers that identifies a device on the internet. IP addresses are
written as four sets of numbers separated by dots.
Domain name: A human-friendly name that's associated with an IP address. For example, bbc.co.uk is
a domain name.
Domain Name Service (DNS): A directory that translates domain names into IP addresses.
Internet Service Provider (ISP): A company or government organization that connects a user to the
internet.
Router: A hardware device that manages network signals from the ISP to a home or business.
Hypertext Transfer Protocol (HTTP): A networking language that manages data packets over the
internet.
Hyperlink: A linked graphic or text that connects a user to other websites, parts of websites, or web-
enabled services.
Uniform Resource Locator (URL): The address of a computer file on a computer server.
Web server: A computer that contains web pages and sends them to requests.
Browser: A piece of software that allows a computer to access and display documents, pictures,
sound, and video clips from the World Wide Web.
File Transfer Protocol (FTP): A standard method for downloading and uploading files over the
internet.
6
Commerce on the internet, also known as e-commerce or electronic commerce, is the buying and
selling of goods and services online. It's a convenient and accessible way to do business, and it's
become increasingly popular in recent years.
E-commerce businesses have virtual storefronts where customers can browse and purchase products
or services. Customers can also buy and sell things to other individuals on their own websites or
through e-commerce platforms like Amazon, eBay, and Etsy.
Benefits of e-commerce
Timeliness: Websites are accessible 24/7, and email queries can be handled quickly.
Reduced marketing costs: Online catalogs are cheaper to produce and maintain than paper catalogs.
Better targeting: Internet communities are self-selecting, so customers find you rather than the other
way around.
Greater market reach: Distance is no object, so you can send information or exchange messages at a
low cost.
Governance on the internet
Internet governance is the process of developing and applying shared principles, rules, and decision-
making procedures to shape the evolution and use of the internet. It involves:
Technical standards: Developing and coordinating technical standards
Internet governance involves a variety of actors, including: governments, the private sector, civil
society, and the technical community.
Internet governance is important because it affects: International trade and economic growth, The
potential for sustainable human development, The building of inclusive knowledge societies, and The
free flow of information and ideas.
Following debates
Education: The internet has made education easier with online courses, access to books and journals,
and research opportunities.
Access to information: The internet has improved access to health information and options. It also
allows people to access vital health information and medical care.
Negative impacts:
The internet can have negative impacts on society, including:
Information overload: The internet can lead to information overload, which can make it difficult to
understand issues and make decisions.
Social isolation: Excessive use of the internet, especially social media, can lead to loneliness and social
isolation.
Blurring of boundaries: The internet can blur the distinction between private and public, and between
different spheres of life.
Damage to communities: The internet can lead to the partial migration of human activities from offline
communities to the internet.
8
Packet Swirching :
Packet Switching is a method of data transmission used in computer networks, where data is broken
into small, manageable units called packets before being sent. These packets are transmitted independently
over the network and reassembled at the destination. Packet switching is a core technology of modern
networking, including the Internet.
How it works
Packet switching allows users to send files across networks as smaller packets instead of one large
file. The packets are forwarded independently over the network to their destination, where they are
reassembled to reconstruct the original data.
Benefits
Packet switching improves efficiency, has less bandwidth network wastage, and works at an optimal
speed with a less latency factor.
Disadvantages
Packet switching can be more complex than other types of networks, like circuit switching. It can
also cause a slight delay as the data is reassembled if packets arrive out of order.
Internet Protocol:
Internet Protocol (IP) is the method or protocol by which data is sent from one computer to another
on the internet. Each computer -- known as a host -- on the internet has at least one IP address that uniquely
identifies it from all other computers on the internet
Types of Internet Protocol
IP (Internet Protocol):
o This is the primary protocol responsible for addressing, routing, and packetizing data.
o It works at the network layer of the OSI model.
o IP itself is connectionless and does not guarantee data delivery or error recovery. This
functionality is handled by other protocols (e.g., TCP).
Routers
A router is a networking device that forwards data packets between computer networks. It
acts as a traffic controller for the Internet or local networks, directing data from the source to the
destination across networks, based on their IP addresses.
1. Routing:
o Routers determine the optimal path for data packets to travel across networks. They
examine the destination IP address in each data packet's header to forward it toward
the correct destination network.
2. Packet Forwarding:
o Routers forward packets from one network to another. This is done by examining the
routing table and sending packets to the next hop (another router or the destination
network).
3. Network Address Translation (NAT):
o Routers often perform NAT, which allows multiple devices in a private network to
share a single public IP address when communicating with the Internet. This is
typically used in home and office routers.
4. Traffic Management:
o Routers manage network traffic by directing packets efficiently. They help in balancing
network load, controlling congestion, and minimizing delays by selecting the best
available routes.
5. Security:
o Many routers have built-in security features, such as firewalls, to prevent unauthorized
access to the network. Routers may filter traffic based on IP addresses, protocols, or
ports.
6. Connecting Different Networks:
o Routers enable communication between networks with different IP address schemes,
such as connecting a local area network (LAN) to a wide area network (WAN), or
linking a private network to the Internet.
IP addresses
Each host on a TCP/IP network has a unique 32-bit IP address that's divided into two parts: the
network number and the host number. IP addresses are represented in dot-decimal notation, with
each byte separated by a dot.
Subnet addressing
Broadcast addresses
Allows TCP/IP to send data to all hosts on a local network or to all hosts on all directly connected
networks.
E- mail Addresses
An internet email address is a unique string of characters that identifies an email account:
Format
An email address is made up of three parts: a local-part, an “@” symbol, and a domain:
Local-part: This part can include letters, numbers, and punctuation marks. It tells the server where to
deliver the email message.
Domain: This part can be a domain name, like example.com, or an IP address, like 192.0.2.0. The
domain name signifies the city where the recipient lives.
Length
The maximum number of characters for an email address is 320, but the recommended length is 254
characters.
Security
An email account is secured by a password that only the account owner can access.
Here are some examples of email addresses: [email protected], [email protected], and
jsmith@[192.168.1.2.
11
Yahoo! Mail
Gmail
Resource Addresses
The address for a resource on the internet is a Uniform Resource Locator (URL). A URL is
a unique identifier that specifies a resource's location on a computer network and how to retrieve it.
URLs are commonly used to reference web pages, but can also be used for other applications, such
as: File transfer (FTP), Email (mailto), and Database access (JDBC).
To access a web resource, a URL must include the correct domain name and the appropriate protocol,
such as "http://" or "https://".
In theory, each valid URL points to a unique resource, but there are some exceptions. For example, a
URL might point to a resource that no longer exists or has moved.
The owner of the web server is responsible for managing the resource and its associated URL.
URLs that use HTTP (HyperText Transfer Protocol) are not encrypted, so sending sensitive data over
them may not be safe. HTTPS (HyperText Transfer Protocol Secure) URLs are encrypted and provide
a secure connection for transmitting data.
Fragments can appear at the end of a URL, starting with a hashtag (#) symbol. These are internal page
references that refer to a specific section within the page.
12
Unit – II
InternetConnectivity
1. Wired Connections:
o DSL (Digital Subscriber Line): Uses telephone lines for internet.
o Fiber Optic: Offers high-speed data transfer using light signals.
o Cable Internet: Uses coaxial cables from television service providers.
2. Wireless Connections:
o Wi-Fi: Local wireless networks within a limited range.
o Mobile Networks (4G/5G): Cellular network-based connectivity.
o Satellite Internet: Connects to the internet via satellites, useful in remote areas.
3. Broadband and Dial-up:
o Broadband: High-speed, always-on connections.
o Dial-up: Slower and outdated, requiring telephone line access.
Hardware Requirements
To connect to the internet, specific hardware is necessary depending on the type of internet service and
devices involved. Here's an overview of the hardware requirements:
Modem: Connects your home network to the internet service provider (ISP).
o Types: DSL modem, cable modem, fiber optic ONT (Optical Network Terminal).
Router: Distributes the internet connection to multiple devices via wired or wireless
connections.
o Can be a standalone device or integrated with the modem (modem-router combo).
13
Ethernet Cable: Connects devices to the modem or router for a stable, wired connection.
o Common standards: Cat5e, Cat6, or Cat7 cables.
Switch (Optional): Allows connecting multiple wired devices to a network.
6. Power-Related Hardware
UPS (Uninterruptible Power Supply) (Optional): Provides backup power for modems and
routers during outages.
Selection of a modem :
When choosing a modem for your internet connection, you can consider things like:
Speed: The modem's speed should match your internet plan, which is measured in megabits per
second (Mbps).
Compatibility: Make sure the modem is compatible with your internet service provider's (ISP)
infrastructure.
Range: Think about how large the area is that you need Wi-Fi coverage for.
14
Security: Look for a modem with strong security features to protect your network.
Latest technology features: Consider whether the modem has the latest technology features.
ISPs provide internet connectivity to individuals, businesses, and organizations. They offer different
types of accounts and plans based on the required speed, data usage, and technology.
1. Residential Accounts:
o Designed for personal or household use.
o Plans include fixed-line connections like DSL, cable, or fiber optic.
o Common features: Wi-Fi routers, monthly data limits, and varying speeds.
2. Business Accounts:
o Tailored for enterprises needing reliable, high-speed connectivity.
o Include features like static IP addresses, advanced security, and priority support.
o Often delivered via fiber optics or leased lines.
3. Mobile Internet Accounts:
o Provide internet access via cellular networks (3G, 4G, 5G).
o Associated with SIM cards in smartphones or hotspots.
o Suitable for on-the-go users.
4. Pay-As-You-Go or Prepaid Accounts:
o Internet access based on usage or pre-purchased data.
o Popular for travelers or temporary users.
5. Dedicated or Leased Line Accounts:
o Provide a fixed bandwidth connection directly to the user.
o High-cost but reliable, used for critical business operations.
ISDN (Integrated Services Digital Network) was a popular method of digital communication before
broadband and fiber technologies became mainstream. It integrates voice and data services over
standard telephone lines.
15
Network definition :
A network consists of two or more computers that are linked in order to share resources (such
as printers and CDs), exchange files, or allow electronic communications. The computers on a network
may be linked through cables, telephone lines, radio waves, satellites, or infrared light beams.
Common terminologies
Firewall
A security measure that prevents unauthorized access to data on a network or computer. Firewalls
are especially useful for web users to protect them from cyber criminals and spyware.
HTTP
Stands for hypertext transfer protocol, which is a protocol that defines verbs to tell a remote system
what is being requested.
Browser
A service used to access website pages, such as Google Chrome, Firefox, Internet Explorer, or
Safari.
DNS
Stands for Domain Name Service, which is a directory that translates a domain name into an IP
address when it is typed into a web browser.
16
URL
The address of a computer file that is on a computer server and can be accessed on the internet.
Cloud computing
A term that describes software that is online and can be borrowed instead of purchased and installed
on a computer. Web-based email is an example of cloud computing.
Wireless network
Also known as Wi-Fi, this is a way to connect a computer to the internet without using cables or
wires.
ISP
Stands for Internet Service Provider, which is a company that provides an internet connection. ISPs
can be telephone companies, cable TV companies, or companies that specialize in providing internet
connections to businesses or home users.
Router
A device that passes traffic back and forth, such as a home router that passes incoming traffic from
the internet to devices and outgoing traffic from local devices to the internet.
In the context of the internet, nodes, hosts, and workstations are fundamental components
that interact within networks.
1. Node
A node is any physical or virtual device that participates in a network and can send, receive, or
forward data.
Examples of Nodes:
End Nodes: Devices like computers, smartphones, IoT devices, and printers.
Intermediate Nodes: Networking devices like routers, switches, and gateways.
Node Functions:
2. Host
A host is a specific type of node with an IP address that can send and receive data over the internet or
a network.
Key Features:
Examples of Hosts:
3. Workstation
A workstation is a type of host, typically a high-performance personal computer used for professional
or technical tasks.
Characteristics of Workstations:
Connected to a Network: Workstations are usually part of a LAN (Local Area Network) or
the internet.
Enhanced Capabilities: Often more powerful than standard PCs, used for tasks like graphic
design, programming, or simulations.
Roles in a Network:
Network Administrator :
A network administrator is responsible for the smooth and secure operation of an
organization's network systems. They manage the network's devices, applications, and data, and ensure
that the network is functional and efficient.
18
Network Security :
Network security is the protection of a network's infrastructure from unauthorized access, misuse, or
theft. It involves creating a secure environment for devices, applications, and users.
Firewalls
A device that monitors and controls network traffic based on security rules. Firewalls act as a barrier
between internal and external networks.
Respond to network security risks by blocking them. IPSs scan network traffic and connect it to
databases of known attack methods.
Access control
Defines who or what has access to network applications and systems. Access control can be
integrated with Identity and Access Management (IAM) products.
IT security policies
19
Application security
Vulnerability management
Antivirus software
Network Components :
Network components are hardware or software pieces that connect devices and enable data flow
within a network. Some common network components include:
Routers
Connect multiple networks and forward data packets between them. Routers use a MAC address for
L2 or an IP address for L3 to route packets.
Switches
Connect devices within a network and forward data packets to their intended destinations. Switches
are multi-port devices that can receive, process, and forward data to multiple devices.
Connect a desktop or server to a network. NICs are integrated into computer circuit boards and are
also known as network adapters, LAN adapters, or physical network interfaces.
Firewalls
Monitor and control incoming and outgoing network traffic based on predefined security
rules. Firewalls provide granular control over what can and cannot access the network.
Gateways
Repeaters
Receive a signal and retransmit it at a higher level or power, or onto the other side of an
obstruction.
Bridges
Connect multiple network segments. Bridges are smarter hubs that only pass data to the destination
port.
Client Server
20
In a client-server model, the client sends requests for services or resources, and the server provides
those services or resources.
Client:
Role: The client is the requesting party. It initiates communication by making requests for data
or services.
Devices: Can be personal computers, smartphones, tablets, or any device capable of accessing
a network and running client software (e.g., web browsers, email clients).
Responsibilities:
o Requesting data or services from the server.
o Displaying the data or providing the service to the user.
o Running the application (e.g., web browser, email client) that interfaces with the server.
Characteristics:
o May request and consume services without storing or processing large amounts of data.
o Clients can be thin (relying heavily on server resources) or thick (performing some
processing locally).
Server:
Role: The server is the provider. It responds to client requests by offering resources, services,
or processing power.
3. Client-Server Interaction
1. Request-Response:
o The client sends a request to the server, usually over the network (e.g., using HTTP for
web browsing).
o The server processes the request and sends a response back to the client.
Example: A user in a web browser (client) types a URL (request), and the web server responds
with the requested web page (response).
Communication media
Communication media is the means used to send and receive information, and the internet is a modern
form of communication media. Some examples of communication media used on the internet include:
Social media: A powerful communication medium that has become an integral part of people's lives
21
Types of Networks :
A computer network is a system that connects many independent computers to share
information (data) and resources. The integration of computers and other different devices allows
users to communicate more easily. A computer network is a collection of two or more computer
systems that are linked together. A network connection can be established using
either cable or wireless media
Personal area network (PAN): The smallest and simplest network, PANs connect devices within a
person's range, typically no more than 10 meters. Most PANs are wireless and use infrared technology
for short-range connectivity.
Local area network (LAN): LANs connect devices within a limited geographical area, such as a
school, office building, or hospital. LANs use links like wires, Ethernet cables, fiber optics, or Wi-Fi
to transmit data quickly.
Wide area network (WAN): WANs cover larger areas, such as states, countries, and large cities.
Metropolitan area network (MAN): A large computer network that spans across a city.
Campus area network (CAN): A collection of interconnected LANs, used by larger entities like
universities and governments.
DNS :
An application layer protocol defines how the application processes running on different systems, pass
the messages to each other.
o DNS is a directory service that provides a mapping between the name of a host on the network
and its numerical address.
o DNS is required for the functioning of the internet.
o Each node in a tree has a domain name, and a full domain name is a sequence of symbols
specified by dots.
o DNS is a service that translates the domain name into IP addresses. This allows the users of
networks to utilize user-friendly names when looking for other hosts instead of remembering
the IP addresses.
o For example, suppose the FTP site at EduSoft had an IP address of 132.147.165.50, most
people would reach this site by specifying ftp.EduSoft.com. Therefore, the domain name is
more reliable than IP address.
DNS is a TCP/IP protocol used on different platforms. The domain name space is divided into three
different sections: generic domains, country domains, and inverse domain.
Network Topology :
Network topology refers to the arrangement or structure of how different devices (nodes) and
components in a network are connected and how data flows between them. The topology defines the
physical or logical layout of the network, and it directly impacts the network's performance,
scalability, and reliability.
Description: In bus topology, all devices are connected to a single central cable (the bus). Data
sent by any device travels in both directions along the bus.
Characteristics:
o Simple and cost-effective for small networks.
o All devices share the same communication medium.
o Performance degrades as more devices are added.
o If the central bus fails, the entire network is affected.
Advantages:
o Easy to implement and extend.
o Less cabling compared to other topologies.
Disadvantages:
o Difficult to troubleshoot.
o Can be slow with increased traffic.
o Limited scalability.
Description: In star topology, each device is connected to a central node (often a hub or
switch). The central node acts as a mediator, and data is sent through the central node to reach
other devices.
Characteristics:
o Centralized structure makes management and troubleshooting easier.
o Each device is only connected to the central hub, not directly to other devices.
o If the central hub fails, the entire network is affected.
Advantages:
o Easy to add new devices without affecting the rest of the network.
o High performance due to direct connections between devices and the central hub.
o Simple to troubleshoot.
Disadvantages:
o Requires more cabling than bus topology.
o If the central hub fails, the entire network goes down.
Description: In ring topology, devices are connected in a circular fashion, where each device
connects to exactly two others. Data travels in one direction (unidirectional) or both directions
(bidirectional) around the ring.
Characteristics:
o Data travels in a continuous loop.
o Each device acts as a repeater to boost the signal, helping data reach its destination.
o A failure in one device or connection can disrupt the entire network.
Advantages:
o Simple and predictable data flow.
o Can work well in smaller networks.
Disadvantages:
o One failure can disrupt the entire network.
o Difficult to add or remove devices without affecting the rest of the network.
Description: In mesh topology, each device is connected to every other device in the network,
providing multiple paths for data to travel. This type of topology can be fully connected or
partially connected.
Characteristics:
o High redundancy and fault tolerance.
o If one link fails, data can take an alternate path.
o Typically used in large, high-performance networks that require reliability.
Advantages:
o Very fault-tolerant; high redundancy.
o Excellent for large-scale or mission-critical networks.
o Provides high reliability and speed.
Disadvantages:
o Expensive and complex to set up.
o Requires a large amount of cabling for full mesh networks.
o Difficult to maintain and expand.
Example: Large enterprise networks, wide-area networks (WANs) for high-availability systems.
Description: Tree topology is a combination of star and bus topologies. It consists of groups of
star-configured networks connected to a central bus backbone.
Characteristics:
o Hierarchical structure, where each "branch" can have multiple levels.
o Easy to scale by adding new branches.
o Each node is connected to a central backbone.
Advantages:
o Scalable and flexible.
o Fault isolation is easier compared to bus and ring topologies.
Disadvantages:
o If the central backbone fails, communication between devices in different branches will
be interrupted.
o Requires more cabling than star topology.
Example: A large corporate network with multiple departments, each using different topologies.
Ethernet :
Ethernet is defined as a networking technology that includes the protocol, port, cable, and
computer chip needed to plug a desktop or laptop into a local area network (LAN) for speedy data
transmission via coaxial or fiber optic cables
Simplicity: Ethernet is a simple technology that is easy to understand and use. It does not
require specialized knowledge or expertise to set up and configure, making it accessible to a
wide range of users
FDDI
FDDI is a high-speed, fiber-optic-based network standard used primarily for local area networks
(LANs)
1. Transmission Medium:
o FDDI uses fiber optic cables as the transmission medium, providing high bandwidth
and immunity to electromagnetic interference (EMI).
o It typically uses multimode fiber, though single-mode fiber can also be used for longer
distances.
2. Speed:
o FDDI supports data transfer speeds of up to 100 Mbps.
3. Topology:
o FDDI networks use a dual ring topology, with two fiber rings (primary and secondary)
that provide redundancy and fault tolerance.
o If one ring fails, the data can still be transmitted in the opposite direction using the
second ring, ensuring continuous network operation.
4. Token Passing:
27
o FDDI uses a token-passing method for media access control (MAC). In this method, a
token (a special data frame) circulates around the network, and the device holding the
token can transmit data. This prevents collisions and ensures orderly data transmission.
5. Reliability:
o The dual ring design and fault-tolerant features make FDDI highly reliable. The
network can automatically recover from failures in one of the rings.
6. Distance:
o FDDI supports long-distance transmission of up to 200 kilometers (124 miles) using
single-mode fiber.
7. Usage:
o FDDI was widely used in the 1990s as the backbone for large enterprise networks, but
it has been largely replaced by Gigabit Ethernet and 10-Gigabit Ethernet due to their
lower cost and higher speeds.
ATM :
1. Cell-based Transmission:
o ATM is cell-based, meaning it breaks data into fixed-size packets known as cells. Each
cell is 53 bytes long, consisting of a 5-byte header and a 48-byte payload.
o This fixed-size structure makes it easier to handle different types of data (e.g., voice,
video, and data) in a consistent manner.
2. Speed:
o ATM can support data rates ranging from 25 Mbps to over 100 Gbps, making it
suitable for high-throughput applications.
3. Quality of Service (QoS):
o ATM allows for high-quality service guarantees (such as low latency and jitter),
which is ideal for applications like voice and video conferencing where timing is
crucial.
o It supports different traffic classes (e.g., Constant Bit Rate (CBR), Variable Bit Rate
(VBR), Unspecified Bit Rate (UBR), and Available Bit Rate (ABR)) to optimize
network resources based on the type of data.
4. Connection-Oriented:
28