Networking Notes Class 12th
Networking Notes Class 12th
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
A Computer Network is a collection of interconnected autonomous computing devices in such a
way that they can exchange information or share resources.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Components of a Computer Network
Major components of a Computer Networks are:
a. Host/Nodes ( Such as PC, Laptop, Smartphone )
b. Servers
c. Client
d. Network Hardware ( NIC, Router, Switch, Hub etc.)
e. Communication Channel (Cables, radio links etc.)
f. Software (Protocols, Network Operating System etc.)
g. Network Services (BNS, File Sharing etc)
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Types of Network
A network can be small group of linked computers to a chain of hundreds of computers of
different types spread around the world. Thus network vary in size, complexity and geographical
spread.
1. Types of Network Based on network span or geographical spread, network can be divided
into three basic types:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3.WAN (Wide Area Network)
2.Types of Network Based on Communication Channel:
1.Wireless Computer Network
2.Wired Communication Network
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Types of Network
A network can be small group of linked computers to a chain of hundreds of computers of different
types spread around the world.Thus network vary in size, complexity and geographical spread.
1. Types of Network Based on network span or geographical spread, network can be divided into
three basic types:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3.WAN (Wide Area Network)
2. Based on Component Roles
1. Peer to Peer Network
2. Client/Server Network
2.Types of Network Based on Communication Channel:
1.Wireless Computer Network
2.Wired Communication Network
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Types of Network
A network can be small group of linked computers to a chain of hundreds of computers of
different types spread around the world. Thus network vary in size, complexity and
geographical spread.
1. Types of Network Based on network span or geographical spread, network can be
divided into three basic types:
1. LAN (Local Area Network)
2. MAN (Metropolitan Area Network)
3.WAN (Wide Area Network)
2. Based on Component Roles
1. Peer to Peer Network
2. Client/Server Network
3.Types of Network Based on Communication Channel:
1.Wireless Computer Network
2.Wired Communication Network
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Types of Network
2.Types of Network Based on Communication Channel:
1.Wired Computer Network
2.Wireless Communication Network
1. Wired Network: In wired computer network, the hosts and other devices are interconnected
through wiring or cables.. Most wired computer networks are of LAN type. Most commonly
used wired networks are:
a.Twisted Pair Cable
b. Coaxial Cable (Coax)
c. Fiber Optic Cable ( Optic Fiber Cable)
1. Wireless Network: The computer network that uses air as media for the transmission is
referred to as wireless network.
Most commonly used transmission media are:
a. Microwave
b. Radio waves
c. Satellite
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
NETWORK DEVICES/HARDWARE
1. NIC (Network Interface Card)
2. WiFi Card
3. Hub
4. Switch
5. Bridge
6. Router
7. Gateway
8. Access Point
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
THE CLOUD
The term cloud was coined to refer to the collection of servers. The cloud is a generic term used
for Internet.
Cloud computing is Internet-based computing, whereby shared resources, software, and
information are provided to computers and other devices on demand. The “cloud” represents the
Internet. Cloud computing services are delivered through a network, usually the Internet.
2. Public Cloud
These are the clouds for use by multiple organizations on a sharing basis
4. Hybrid Cloud
When a single organization adopts both private and public clouds for a single application
in order to take advantage of both types of cloud, it is called Hybrid Cloud.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
INTERNET OF THINGS (IoT)
IoT is a technology that connects the things to the Internet over wired or wireless connections.
Here the “Things” refer to every smart device of today’s age i.e. computer, smart phone, home
appliances, wearable, vehicles etc.
IoT allows people and things to be connected Anytime, Anyplace with Anything and Anyone using
Any path/network.
IoT is a phenomenon that connects the things (the smart devices) to the internet over wired or
wireless connections.
4. Software
The software provides the reusable solution for connecting, taking actions and solving
issues that may arise.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Modulation Techniques
Radio waves and microwaves etc are used for carrying data or messages. How these waves carry
messages, is the result of a particular technique called modulation.
Modulation is a process of changing the characteristics of the wave to be transmitted, i.e.,
the carrier wave, by superimposing the message signal of a high-frequency signal.
A carrier wave by itself doesn’t carry much information, to include a message, another wave, a
message signal that carries the data to be transmitted, needs to be imposed on top of the carrier
signal.This process is termed as modulation.
The super imposing of message signal and carrier wave results into a new wave called the
modulated wave.
Many devices (nodes) are connected with one wireless network. If multiple nodes on the same
network transmit data at the same time, it leads to a condition called collision and data gets lost. In
a computer network, collision is a specific condition that occurs when two or more nodes on a
network transmit data at the same time.
It is something like when two or more people are quarrelling with each other and speaking at the
same time, but no one is listening to no one.
The type of communication which is two way communication where sending and receiving takes
place simultaneously, is called FULL DUPLEX communication.
The type of communication which is one way communication where either sending or receiving
only one takes place at the same time, is called HALF DUPLEX communication.
If collision occurs, wireless network can not detect in a wireless network it cannot listen while
transmitting means wireless network uses Half Duplex communication medium. Thus, for wireless
networks, strategies are adopted that avoid collision rather than detecting it. Wireless networks
implement it using a special protocol called CSMA/CA (Carrier Sense Multiple Access/Collision
Avoidance).
Wired network used collision detection methods such as CSMA/CD (Carrier Sense Multiple
Access/Collision Detection) as wired networks are FULL DUPLEX and hence can receive item
while transmitting.
The ACK signal is generated by the receiver node, only if the data frame is received in valid form
withing a specific time frame.
If the sender node does not receive ACK in specified time, it considers it as a failed
transmission and retransmits the data.
In this method, the sender node first sends an RTS signal to its receiver. Receiver confirms the
readiness to receive by sending a CTS signal to the sender as well as all other nodes.
a. Other nodes upon receiving a CTS will now not transmit (will wait) as they now know
that some transmission is taking place and communication channel is busy.
b.The sender node upon receiving a CTs goes ahead with transmission
Once the transmission ends, the receiver node sends ACK signal to all nodes.
a.The sender node takes ACK as confirmation of successful transmission.
b. Other nodes take ACK signal as end of transmission and can resume their work.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Error Checking (Error Detection)
While transmitting data over network, some error may occur and data may get corrupted. This
means that intended data has not reached the receiver node and hence it is an error.
The error may be of the following types:
1. Single-bit error: If only one bit of the transmitted data got changed from 1 to 0 or from 0 to 1.
2. Multi-bit error: If two or more nonconsecutive bits in data got changed from 0 to 1 or 1 to 0.
3. Burst Error: If two or more consecutive bits in data got changed from 0 to 1 or 1 to 0.
To avoid such errors in transmission, Error Detection or Error Checking methods are used in
computer networks that ensure if the received packet is error free or not.
The most commonly used methods are:
1. Single Dimensional Parity Checking
2. Multi Dimensional Parity Checking
3. Checksum
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Error Checking (Error Detection)
To avoid such errors in transmission, Error Detection or Error Checking methods are used in
computer networks that ensure if the received packet is error free or not.
The most commonly used methods are:
1. Single Dimensional Parity Checking
2. Multi Dimensional Parity Checking
3. Checksum
This is an enhanced version of single dimensional parity checking technique. This technique works
with multiple data units simultaneously.
Let’s understand it with an example:
Supposer data to be transmitted is:
11010001, 0010000, 00111100, 10010001
Steps:
a. Arrange the data being sent a table:
1 1 0 1 0 0 0 1
0 0 1 0 0 0 0 0
0 0 1 1 1 1 0 0
1 0 0 1 0 0 0 1
b. add the parity bit.
1 1 0 1 0 0 0 1
0 0 1 0 0 0 0 0
0 0 1 1 1 1 0 0
1 0 0 1 0 0 0 1
Steps:
c. Now the data will be transmitted.
d. Again, at receivers end, we need to calculate the parity bit and if it matches, the data transfer is
successful otherwise not.
1 1 0 0 1 0 0 1
0 0 1 0 0 0 0 0
0 0 1 1 1 1 0 0
1 0 0 1 0 0 0 1
Advantages:
(i) It is more efficient than single dimensional parity technique.
(ii) It can detect multiple bit errors also.
Disadvantages:
(i) It can’t detect compensating multiple bit errors.
(ii) It can’t detect 4 or more bit errors in some cases.
1 1 0 1 0 0 0 1
0 0 1 0 0 0 0 0
0 0 1 1 1 1 0 0
1 0 0 1 0 0 0 1
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Error Checking (Error Detection)
To avoid such errors in transmission, Error Detection or Error Checking methods are used in
computer networks that ensure if the received packet is error free or not.
The most commonly used methods are:
1. Single Dimensional Parity Checking
2. Multi Dimensional Parity Checking
3. Checksum
The Checksum technique is used to ensure data integrity at the receiver end when data is being
transferred from source to destination. It is the sum of data bits calculated from digital data. It is an
error checking method which ensured data integrity. Before going ahead, one may
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
TCP / IP
TCP stands for Transmission Control Protocol. It is a communication standard that is responsible
for exchanging messages over network. TCP is the most commonly used protocol withing digital
network communications and ensures end-to-end data delivery.
TCP organizes data so that it can be transmitted between a server and a client. It also
guarantees the integrity of the data being communicated over a network. Before it transmits data,
TCP establishes a connection between sender and receiver and ensures that this connection is live
until communication is done.
An alternative to TCP is UDP (User Datagram Protocol), which is used to establish low-
latency connection between applications and speed up transmission but is less reliable but less
expensive.
IP stands for Internet Protocol. It is the method for sending data from one device to another
across the internet. IP is responsible for defining how devices exchange packets of data with each
other.
IP is the main protocol withing the internet layer of the TCP/iP. It’s main purpose is to
deliver data packets from source to destination.
TCP and IP are separate protocols that work together to ensure data is delivered to its intended
destination within a network. IP obtains and defines the address—the IP address—of the
application or device the data must be sent to. TCP is then responsible for transporting data and
ensuring it gets delivered to the destination application or device that IP has defined.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Addresses on a Network
A URL (Uniform Resource Locator) is an address of a file / resource on the internet. The elements
of URL are:
1.The type of server viz. http, https,ftp
2.The name/address of the server on the Internet
3.The associated files on the server
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
IP Address
Any device connected to the internet contains a unique address called IP Address (Internet
Protocol). The IP address is nothing but unique series of numbers, which uniquely identifies a
computer on the internet. It is something like mobile number, means every mobile has some
specific mobile number.
Each IP address is a series of four numbers separated by dots. For example 216.27.61.137 is an IP
address having four number separated by (.) dots. This representation of IP address is called dotted
decimal form but the computer will internally convert them into Binary Format.
Dotted Decimal Form: 216.27.61.137
Binary Form: 11011000.00011011.00111101.10001001
There are two versions of Internet Protocol.The first one is IPv4and the newer one is IPv6.
1. IPv4 (Internet Protocol Version 4) : This the most widely deployed Internet Protocol used to
connect devices to the Internet. It uses 32 bit address scheme and allows 232 address i.e. over
4 billion addresses. Even this much IP addresses will be consumed soon as the number of
devices connected with the internet (Laptop/IPad/Mobile/Gaming) are increasing at a very
rapid speed.
2. IPv6 (Internet Protocol Version 6) : This is a new Internet addressing system which has been
developed keeping in view the increasing demand for internet addresses. IPv6 uses 128 bit
Internet addressing and hence will allow 2128 Internet addresses. Now the total number of
Internet addresses supported by IPv6 is: 340282366920938000000000000000000000000 ☺
IPv4 Address
IPv4 version uses the format x.x.x.x where x is an octet and these must be between 0 and
255. The octets are divided by . (dot) or periods. So, in IPv4 there are 4 octets divided by 3 periods.
Some of the IPv4 addressing scheme may look like:
5.6.7.8
02.103.104.105
20.118.64.125
198.116.1.1
IPv6 Address
IPv6 address can use the following two formats:
a. Normal (Pure IPv6 addressing format) 2. Dual (IPv6+IPv4)
1. Normal (Pure IPv6 addressing format)
This consist of eight segment with the following format:
y: y: y: y: y: y: y: y
Here y represents a segment and can be any hexadecimal value from 0
to FFFF and it is separated by : (colon) sign.
IPv6 Address
Example:
2002:ad8:4444:3333:2222:1111:5555:4444 (Contains all 8 segments)
: : (implies that all 8 segments are zero)
2002:ad8: : (implies last 6 segments are zero)
: :5555:4444 (implies first 6 segments are zero)
2002:ad8: :5555:4444 (implies 4 middle segments are zero)
2002:0ad8:0001:0000:0000:0cd9:c08a:0201
can be compressed as:
2002:ad8:1::cd9:c08a:201
IPv6 Address
IPv6 address can use the following two formats:
a. Normal (Pure IPv6 addressing format) 2. Dual (IPv6+IPv4)
2. Dual (IPv6+IPv4)
In this addressing scheme, both the versions are combined together and the format
becomes like:
y: y: y: y: y: y: x. x. x. x
Here the first six segments are IPv6 and last 4 segments are IPv4.
So, the first six may contain values from 0-FFFF and last 4 from 0-255.
Example: 2002:ad8:1111:3333:5555:6666:2.3.4.5
: : 11.12.13.14 (implies all six IPv6 segments are zero)
2002:ad8:1111: : 5.4.3.1 (implies middle three are zero)
Notes By: Anand Sir,YouTube Channel: CODEITUP
NET WORKING
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
The Domain Name and DNS
The URL (Uniform Resource Locator) of a website is also known as its domain name. It is the
unique name of the website. It can’t be duplicate.A domain name may look like:
www.codeitup.in
1. Here www represents world wide web which is usually fix (exception case msn.com).
2. codeitup is the name describing the name of the website
3. TLD (Top Level Domain), here .in is TLD. There are many other TLD such as .com, .net, .org, .edu,
.ca, .in, jp etc.
A domain name is also known as DNS name i.e., Domain Name System name.
In order to reach a website, its address is required i.e. the domain name as a domain name is much
easier to remember. But in order to reach a computer/server on internet, it’s IP address is
required. So this Domain Name needs to be changed with respective IP address which is done
through the process of Domain Name Resolution. Domain Name Resolution refers to the process
of obtaining corresponding IP address.
Now a days wireless communication is the most demanding one and many technologies are based
on cellular / wireless connectivity protocol such as 2G, 3G, 4G and now 5G is on the way.
1. 2G GSM (Global System for Mobile Communication) (1992’s) – The Second Generation
It was introduced in 1992’s and is a fully digital technology having speed upto 250 Kbps. It
provides data as well as voice call option. It’s frequency lies between 900Mhz and 1800Mhz.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Basic Networking Tools
While working on Internet, we may come across many problems. To overcome these problems, we
have some tools or simple networking commands which can be used to sort out the issue and
detect the issue.
The commands are as follows:
1. PING – This command is used to check whether an IP address on a website is responding or
not.
To use it you need to run this command to Command Prompt in Windows OS.
C\>ping 198.14.1.2 OR C:\>ping codeitup.in
3. NSLOOKUP
This command is used to display the default DNS server name and address (IP address).
When users type domain names into the URL bar in their browser, DNS servers are
responsible for translating those domain names to numeric IP addresses, leading them to
the correct website.
4. IPCONFIG Command: This command is used to display detailed information about the network
we are connected to.This command can be used as:
c:\>ipconfig OR c:\>ipconfig/all
The ipconfig will display basic details while ipconfig/all will display detailed information
about the network we are connected to.
5. WHOIS Command : This command is used to get some information about a specific domain
name such as who registered it, when the domain will expire and many other things.
To check the pinging time, download speed, upload speed we use a website called speedtest.net.
We have other options also, but speedtest.in one of the best way which is available to get the
aforesaid information.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Protocols Used on Network
Protocols are the set of rules that are used to transfer data on Internet from one place to another
place. There are various types of protocols used over networks such as http, POP, IMAP, SMTP, VoIP
etc.We need to learn them one by one.
CODEITUP
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Network Topology
Bus topology is a way to connect various devices on network via single cable and hence
called as Linear Bus Topology.
Advantages of Bus Topology
1. It is cost effective.
2. Cable required is least
3. Used in small networks.
4. It is easy to understand.
5. Easy to expand joining two cables together.
Disadvantages of Bus Topology
1. Cables fails then whole network fails.
2. If network traffic is heavy or nodes are more the performance of the network decreases.
3. Cable has a limited length.
4. It is slower than the ring topology.
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Ring Topology
Ring Topology is a way of connecting various devices on network in such a manner that it
forms the shape of a ring. In this topology, each node has exactly two neighbours.
Advantages of Ring Topology
1. Transmitting network is not affected by high traffic or by adding more nodes, as only the nodes
having tokens can transmit data.
2. Cheap to install and expand
Disadvantages of Ring Topology
1. Troubleshooting is difficult in ring topology.
2. Adding or deleting the computers disturbs the network activity.
3. Failure of one computer disturbs the whole network.
Star Topology is a way to connect all the devices on the network using a Hub through cable.
This Hub is the central point for the network and all other devices are connected to this.
Advantages of Star Topology
1. Fast performance with few nodes and low network traffic.
2. Hub can be upgraded easily.
3. Easy to troubleshoot.
4. Easy to setup and modify.
5. The affected node fails, rest of the nodes work smoothly.
Disadvantages of Star Topology
1. Cost of installation is high.
2. Expensive to use.
3. If the hub fails then the whole network is stopped because all the nodes depend on the hub.
4. Performance is based on the hub that is it depends on its capacity
Notes By: Anand Sir,YouTube Channel: CODEITUP
NETWORKING
Mesh Topology
Mesh Topology is a way to connect devices on the network in which all the devices are
connected to each other. Mesh Topology has n(n-1)/2 physical channels to link n devices.
Advantages of Mesh Topology
1. Each connection can carry its own data load.
2. It is robust.
3. Fault is diagnosed easily.
4. Provides security and privacy.
Disadvantages of Mesh Topology
1. Installation and configuration is difficult.
2. Cabling cost is more.
3. Bulk wiring is required.
In Tree Topology, all the computer are connected like the branches of a tree. In Computer
Networking, tree topology is known as a combination of a Bus and Start network topology.
The main advantages of this topology are better flexibility and scalability.
Advantages of Tree Topology
1. It is a combination of bus and star topology
2. It provides high scalability, as leaf nodes can add more nodes in the hierarchical chain.
3.Other nodes in a network are not affected, if one of their nodes get damaged
4. It provides easy maintenance and fault identification.
Disadvantages of Tree Topology
1. Large cabling is required as compared to star and bus topology.
2. On the failure of a hub, the entire network fails.
3.Tree network is very difficult to configure than other network topologies.
A hybrid topology is a type of network topology that uses two or more differing network
topologies. These topologies can include a mix of bus topology, mesh topology, ring topology,
star topology, and tree topology.
Ques 21: Which of the following UnGuided Medium has highest range
of transmitting data?
a. Microwave
b. Radio Waves
c. Satellite
d. None of these
Ques 24: NIC card has a unique address which is called ................... ?
Ques 37: Wait time for an information to be sent is called BEB and it
stands for .................................. ?
Ques 45: IPv4 address is divided into .............. octets and ..................
periods?