Thursday 18 May 2023

SECOND YEAR ( SEM - IV) , MODULE 1 : COMPONENTS OF COMPUTER NETWORK

Module 1 : Components of computer Network

Module 1 : Components of computer Network

Quiz

 

Wednesday 17 May 2023

What is Information Technology?


What is Information Technology?




Information technology (IT) deals with diverse fields, and each field has its own key focus areas and roles to achieve certain tasks. A few of such areas are discussed below:


WHAT ARE EXAMPLES OF INFORMATION TECHNOLOGY?

 

Categories of technology that fall under the IT umbrella include:

Networking. Two or more computer systems connected wirelessly or by cables, comprise a network.

Compute. Though computing broadly refers to anything in the computer world, here it means data processing, particularly in the main memory of a central processing unit (CPU).

Data Storage. Information has to stay somewhere when it isn’t directly being processed. Storage solutions include devices (such as solid state drives), cloud storage, databases, data lakes, and file systems.

Security. Cyber security helps institutions protect their data and other technological assets from unauthorized access. Data is one of the most important enterprise commodities, and attacks are increasing in frequency

Technical Support. Technology often requires fixing hardware or software issues. Technical support ranges from unlocking a laptop to solving an entire network outage.

Because computer systems are central to information technology management, computer departments within companies and universities are often called IT departments. Some companies refer to this department as IS (Information Systems) or MIS (Management Information System). 

 

WHY IS INFORMATION TECHNOLOGY IMPORTANT?

During the past three to four decades, enterprises have shifted from manual bookkeeping and analog communication to a heavily digital business environment. Almost all business communication is done through electronic devices, and digital data comprises a large segment of all enterprise information. IT manages how all of this technology works, reduces errors, and protects systems from attacks.

IT needs have also increased in remote work environments; enterprises are heavily dependent on devices, networks, and data storage systems. Remote work environments also increase the risk of cyber attacks on endpoint devices because endpoints traditionally have fewer security constraints or aren’t under constant IT supervision. Solutions like mobile device management (MDM) software help enterprises supervise those devices and decrease the ways that threat actors reach enterprise data.


Information technology teams and processes are essential to protect enterprise computer systems, not just endpoint devices. The right software platforms, installed and managed by experienced administrators, help secure business networks and storage systems. Security software solutions include:

 

Threat intelligence—Awareness of possible attacks and weaknesses in IT systems

Intrusion detection and prevention systems (IDPS)—Monitoring computer systems and networks for threats and developing methods to prevent them

Endpoint detection and response (EDR)—Mitigating and stopping cyber attacks on endpoint devices like computers and mobile phones

Security incident and event management (SIEM)—Analyzing log data to find anomalies and alerting administrators of potential threats

Extended detection and response (XDR)—Successor to EDR that combines multiple security solution functions into one platform in order to be more comprehensive


INFORMATION TECHNOLOGY VS. COMPUTER SCIENCE

Information technology is a broader field than computer science because it deals with more than just hardware and networking. As data and technical needs multiply, information technology has come to include data center infrastructures and enterprise big data storage environments as well as computers and networks. Broadly speaking, IT encompasses the entire business computing world.

Because it is a field of science, computer science focuses on the study of computers and computational processes, specifically as they relate to mathematical algorithms. By studying these algorithms, computer scientists can improve computer systems and programs.


Wednesday 3 May 2023

Theory-80.1 :- Dynamic Host Configuration Protocol - Advantages And Disadvantages

DHCP

Dynamic Host Configuration Protocol is a network management protocol that is used to dynamically assign the IP address and other information to each host on the network so that they can communicate efficiently. DHCP automates and centrally manages the assignment of IP address easing the work of network administrator. In addition to the IP address , the DHCP also assigns the subnet masks, default gateway and domain name server(DNS) address and other configuration to the host and by doing so, it makes the task of network administrator easier.

 

Advantages of DHCP

  • It is easy to implement and automatic assignment of an IP address means an accurate IP address.
  • The manual configuration of the IP address is not required. Hence, it saves time and workload for the network administrators.
  • Duplicate or invalid IP assignments are not there which means there is no IP address conflict.
  • It is a great benefit for mobile users as the new valid configurations are automatically obtained when they change their network.
 

Disadvantages of DHCP

  • As the DHCP servers have no secure mechanism for the authentication of the client so any new client can join the network. This posses security risks like unauthorized clients being given IP address and IP address depletion from unauthorized clients.
  • The DHCP server can be a single point of failure if the network has only one DHCP server.

Theory -80 :- Concept Of Dynamic Host Control Protocol.

What is DHCP and how does it work?

The host in any network can be assigned the IP address manually or dynamically. In a small home network having 2 or 3 computers, we can assign the IP addresses manually but imagine a network having hundreds of computer and you have to assign the IP addresses to all of them. It can be a nightmare for network administrators!! No two hosts can have the same IP address and assigning them IP address manually can lead to errors and confusion. So, to resolve this problem DHCP is needed. The DHCP is needed to simplify the assignment of IP addresses on a network. 

 

DHCP


Dynamic Host Configuration Protocol is a network management protocol that is used to dynamically assign the IP address and other information to each host on the network so that they can communicate efficiently. DHCP automates and centrally manages the assignment of IP address easing the work of network administrator. In addition to the IP address , the DHCP also assigns the subnet masks, default gateway and domain name server(DNS) address and other configuration to the host and by doing so, it makes the task of network administrator easier.

 

Components of DHCP


DHCP Server: It is typically a server or a router that holds the network configuration information.

DHCP Client: It is the endpoint that gets the configuration information from the server like any computer or mobile.

DHCP Relay Agent: If you have only one DHCP Server for multiple LAN’s then the DHCP relay agent present in every network will forward the DHCP request to the servers. This because the DHCP packets cannot travel across the router. Hence, the relay agent is required so that DHCP servers can handle the request from all the networks.

IP address pool: It contains the list of IP address which are available for assignment to the client


Subnet Mask: It tells the host that in which network it is currently present.


Lease Time: It is the amount of time for which the IP address is available to the client. After this time the client must renew the IP address.


Gateway Address: The gateway address lets the host know where the gateway is to connect to the internet.


How do DHCP works?


DHCP works at the application layer to dynamically assign the IP address to the client and this happens through the exchange of a series of messages called DHCP transactions or DHCP conversation.


  • DHCP Discovery: The DHCP client broadcast messages to discover the DHCP servers. The client computer sends a packet with the default broadcast destination of 255.255.255.255 or the specific subnet broadcast address if any configured. 255.255.255.255 is a special broadcast address , which means “ this network ”: it lets you send a broadcast packet to the network you’re connected to.

  • DHCP Offer: When the DHCP server receives the DHCP Discover message then it suggests or offers an IP address(form IP address pool) to the client by sending a DHCP offer message to the client. This DHCP offer message contains the proposed IP address for DHCP client, IP address of the server, MAC address of the client, subnet mask, default gateway, DNS address, and lease information.

 


    1. the proposed IP address for DHCP client (here 192.168.1.11)
    2. Subnet mask to identify the network (here 255.255.255.0)
    3. IP of the default gateway for the subnet (here 192.168.1.1)
    4. IP of DNS server for name translations (here 8.8.8.8)

  • DHCP Request: In most cases, the client can receive multiple DHCP offer because in a network there are many DHCP servers(as they provide fault tolerance). If the IP addressing of one server fails then other servers can provide backup. But, the client will accept only one DHCP offer. In response to the offer, the client sends a DHCP Request requesting the offered address from one of the DHCP servers. All the other offered IP addresses from remaining DHCP servers are withdrawn and returned to the pool of IP available addresses.   

  • DHCP Acknowledgment: The server then sends Acknowledgment to the client confirming the DHCP lease to the client. The server might send any other configuration that the client may have asked. At this step, the IP configuration is completed and the client can use the new IP settings.

Popular Posts