Networking and Internet Class 11 Notes
Networking and Internet Class 11 Notes
Computer Network
Electronic equipment that exchange data or messages with one another, such as
computers, printers, fax machines, and telephones, are referred to as nodes or
stations.
1. Simplex
2. half-duplex
3. full-duplex
2. Half-duplex – Only one node at a time can broadcast data in the half-duplex
mode, which allows for bidirectional communication between the two nodes. In
low-bandwidth situations, this mode is typically used to transfer files between
nodes.
Transmission Medium
The channel of transmission through which data can be sent as a signal from one
node to another is referred to as a transmission medium.
Guided Medium
Unguided Medium
Network Devices
Repeater – With increase in distance, a signal may become weak and distorted. A
repeater is used to restore the input signal to its original form, so that it can
travel a larger distance.
Bridge – In order to create a larger local area network (LAN), smaller LANs can
be combined using bridges, which are multiport devices used to connect two or
more LANs.
Switch – Switches are used to connect individual nodes in the network with one
another, as opposed to bridges, which join two or more LAN segments.
Router – Routers are used to link different networks (LAN or WAN) collectively.
Data from an incoming network is sent to another network via a router. A router
keeps track of different networks’ routing tables. The router chooses which
network the incoming packet should be sent to based on the destination address.
Network Types
On the basis of geographical span, network can be broadly categorized as PAN,
LAN, MAN, and WAN.
Local area network – Local Area networks are private networks and can span a
radius of up to 1 Km. They are generally established within a building or campus.
LANs operate at a speed in the range 10 Mbps to 1 Gbps.
Wide Area Network – A WAN typically covers a distance of roughly 1000 km.
They are useful for linking isolated places and for long-distance communication.
They create connections inside a nation or continent. A WAN may be owned and
operated by a number of different companies. It links numerous metropolitan and
local area networks.
Topology
Network topology refers to the positioning of nodes in a network, often known as
their layout. or the arrangement of nodes in a network is called network
topology. there are two type of topologies –
Broadcast – All nodes share the same physical link one node transmit and
other receive. for example, Bus and Ring topologies.
Point to point – Every pair of nodes has a dedicated link. for example,
Star and Mesh topologies.
Bus Topology
In a bus topology, several nodes are connected by a lengthy cable known as the
backbone cable (or just the backbone) using a connector known as the tap. This
topology requires less cabling and is easy to install and extend the network laid
using it. However, fault detection and isolation is difficult.
Ring Topology
In a ring topology, all devices are connected by a cable that forms a ring. The
intended recipient of the message is reached by way of a one-way transmission of
the intended message. The problem of network is it take longer time to send a
message from one node to another node.
Star Topology
All of the devices in a star topology are connected to the hub, which serves as the
central controller. Any two devices can communicate with each other through the
hub that relays messages. Installation and configuration of the star network are
simple.
Mesh Topology
In a mesh topology, every node in the network is linked to every other node. The
topology offers secure data transfer without any traffic issues because every
conceivable pair of nodes has a dedicated point-to-point connection.
Tree Topology
A hybrid topology that combines bus and star topologies is called tree topology. In
a bus topology, the primary backbone cable functions as the tree’s trunk, and star
networks (and even individual nodes) are connected to it like the tree’s branches.
Identification of computers and users over a network
MAC Address
MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By convention, MAC
addresses are usually written in one of the following two formats:
MM:MM:MM: SS: SS:SS
MM-MM-MM-SS-SS-SS
IP Address
Domain Name
Digital literacy
The capacity to use reading, writing, technological expertise, and critical thinking
to navigate our digital world is known as digital literacy. It involves using
technology to find, assess, and transmit information, including devices like a
smartphone, PC, e-reader, and more.
Internet Services
Application layer
Data or a message is formed at the sending end and reviewed and processed at
the receiving end. The message that will be sent with the header must likewise be
enclosed by this layer. On this layer, a number of protocols like HTTP (HyperText
Transfer Protocol) and POP3 (Post Office Protocol version 3) operate.
Transport layer
The message is sent from the application layer to the transport layer, which
appends the source and destination ports of the processes at the two ends. At this
layer, two end-to-end protocols—TCP and UDP—are in use. When timely and
error-free data transport is crucial, TCP (Transmission Control Protocol) is a
dependable connection-oriented protocol that is required.
Internet Layer
The Internet layer receives the segments from the transport layer and adds the
source and destination machine network addresses (also termed IP address). IP,
or Internet Protocol, is utilised at the Internet layer. The format of packets sent
over the Internet is specified by IP.
Link layer
Host to Internet layer is another name for link layer. The header containing the
sender and receiver physical addresses must be included by this layer to the
packet that was received from the Internet layer.
Malwares
Malicious software (programmes) created with the purpose of interfering with
system performance by harming the system, gaining unauthorised access to the
system, or preventing legitimate users from using computing resources are
referred to as malware. Malware includes viruses, worms, and Trojan horses.
Virus – A virus is a software code that may harm your system by overwriting or
corrupting the system files.
Trojan Horse – Trojan Horse is a code that appears to be desirable and useful but
ends up harming the
system. Trojan horse can attach itself with a safe application. For example, it may
be attached to any game downloaded over the Internet. Such an application when
executed creates a backdoor in the system through which a hacker can access the
system.
Eavesdropping
Denial of Service
Phishing
Cyber Crime
Cybercrimes are crimes including theft, fraud, and forgery that involve the
improper use of computers or the Internet. According to the IT Act, cybercrime
is any illegal activity in which a computer is either a tool, a target, or both. These
crimes include some of those listed below –
Firewalls
An organization’s previously set security policies are used to monitor and filter
incoming and outgoing network traffic through a firewall, a network security
device. A firewall is essentially the barrier that stands between a private internal
network and the open Internet at its most basic level.
Antivirus
Viruses and other types of dangerous software can be found and eliminated from
your computer or laptop using an antivirus package. Malicious software, also
referred to as malware, is computer code that can damage your computers,
laptops, and the data they contain.
Password managers
Cyber Law
Cyber laws serve as a deterrent to illicit cybercrime and regulate the systematic
use of e-resources, such as e-business. To prevent cybercrimes and prosecute
those responsible, numerous cyber laws have also been passed. These laws
specify the punishment that will be meted out to those who violate the laws.