0% found this document useful (0 votes)
804 views

Networking and Internet Class 11 Notes

Uploaded by

kavin05032009
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
804 views

Networking and Internet Class 11 Notes

Uploaded by

kavin05032009
Copyright
© © All Rights Reserved
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 11

Networking and Internet Class 11 Notes

Evolution of Networks and Internet


The idea of the Internet was developed in 1969, and since then, it has undergone
a number of technological and infrastructure modifications, as will be explained
below: The idea behind Advanced Research Project Agency Network served as the
basis for the creation of the Internet (ARPANET). The American Department of
Defense created ARPANET.

TCP/IP (Transmission Control Protocol/Internet Protocol) was created in 1970 in


response to the need for communication among multiple heterogeneous
networks. The U.S. National Science Foundation created NSFNET, a large
network, along with many other smaller networks, in 1984 for use in research
and teaching. The network grew significantly once ARPANET and NSFNET were
linked. The TCP/IP protocol (communication rules) served as a glue to join
different heterogeneous networks into a single network. The Internet (a network
of networks) is this large network.

Computer Network
Electronic equipment that exchange data or messages with one another, such as
computers, printers, fax machines, and telephones, are referred to as nodes or
stations.

a. Sender – The node that is responsible for sending the data.


b. Receiver – The node that is responsible for receiving the data.
c. Message – Message is the information or meaningful data that is being
communicated in a structured form.
d. Channel – Channel is the communication medium through which message is
transmitted

A computer network is made up of a number of connected nodes that


communicate over a channel. There are three types of computer network
communication:

1. Simplex
2. half-duplex
3. full-duplex

1. Simplex – Information can only be transmitted in one way in simplex mode. It


is known as a unidirectional mode. The data transferred via numerous fibre
optics and satellites in computer networks is straightforward in nature.

2. Half-duplex – Only one node at a time can broadcast data in the half-duplex
mode, which allows for bidirectional communication between the two nodes. In
low-bandwidth situations, this mode is typically used to transfer files between
nodes.

3. Full-duplex – In full-duplex mode, both communicating parties can send and


receive at the same time. NIC (Network Interface Card) supports full-duplex
mode.

Transmission Medium
The channel of transmission through which data can be sent as a signal from one
node to another is referred to as a transmission medium.

There are two type of transmision medium –

Guided Medium
Unguided Medium

1. Guided Medium – In guided medium, the data transmitted in a cable system


that has a fixed path. for example Co-axil, UTP, Optical fiber cable, etc.

2. Unguided Medium – In Unguided medium, the data transmit through free


space in the form of electromagnetic signal. for example, radio waves, lasers,
micro waves etc.

Network Devices
Repeater – With increase in distance, a signal may become weak and distorted. A
repeater is used to restore the input signal to its original form, so that it can
travel a larger distance.

Hub – A hub joins multiple lines, sometimes known as cable segments, as


opposed to a repeater which links only two wires. A hub has multiple
input/output (I/O) ports, each of which is connected to a single device.

Bridge – In order to create a larger local area network (LAN), smaller LANs can
be combined using bridges, which are multiport devices used to connect two or
more LANs.

Switch – Switches are used to connect individual nodes in the network with one
another, as opposed to bridges, which join two or more LAN segments.

Router – Routers are used to link different networks (LAN or WAN) collectively.
Data from an incoming network is sent to another network via a router. A router
keeps track of different networks’ routing tables. The router chooses which
network the incoming packet should be sent to based on the destination address.

Gateway – A gateway enables communication across networks based on


various protocol systems. Data from one network that uses one protocol is
translated to the outgoing network’s protocol before being forwarded.

Network Types
On the basis of geographical span, network can be broadly categorized as PAN,
LAN, MAN, and WAN.

Personal area network – An individual’s workspace can be connected to a


computer network called a personal area network (PAN) . for example,
connection between PCs and smartphone, PCs and tables, PCs and printer etc.

Local area network – Local Area networks are private networks and can span a
radius of up to 1 Km. They are generally established within a building or campus.
LANs operate at a speed in the range 10 Mbps to 1 Gbps.

Metropolitan Area Network – These networks, which have a radius of up to 50


km, are used to create connections within cities. Resources can be shared more
easily because to MANs, which link different local area networks. a city-based
cable television network, as an example.

Wide Area Network – A WAN typically covers a distance of roughly 1000 km.
They are useful for linking isolated places and for long-distance communication.
They create connections inside a nation or continent. A WAN may be owned and
operated by a number of different companies. It links numerous metropolitan and
local area networks.
Topology
Network topology refers to the positioning of nodes in a network, often known as
their layout. or the arrangement of nodes in a network is called network
topology. there are two type of topologies –

Broadcast – All nodes share the same physical link one node transmit and
other receive. for example, Bus and Ring topologies.
Point to point – Every pair of nodes has a dedicated link. for example,
Star and Mesh topologies.

Bus Topology

In a bus topology, several nodes are connected by a lengthy cable known as the
backbone cable (or just the backbone) using a connector known as the tap. This
topology requires less cabling and is easy to install and extend the network laid
using it. However, fault detection and isolation is difficult.

Ring Topology

In a ring topology, all devices are connected by a cable that forms a ring. The
intended recipient of the message is reached by way of a one-way transmission of
the intended message. The problem of network is it take longer time to send a
message from one node to another node.

Star Topology
All of the devices in a star topology are connected to the hub, which serves as the
central controller. Any two devices can communicate with each other through the
hub that relays messages. Installation and configuration of the star network are
simple.

Mesh Topology

In a mesh topology, every node in the network is linked to every other node. The
topology offers secure data transfer without any traffic issues because every
conceivable pair of nodes has a dedicated point-to-point connection.

Tree Topology

A hybrid topology that combines bus and star topologies is called tree topology. In
a bus topology, the primary backbone cable functions as the tree’s trunk, and star
networks (and even individual nodes) are connected to it like the tree’s branches.
Identification of computers and users over a network

MAC Address

A network interface controller (NIC) is given a media access control address


(MAC address), which it can use as a network address in
communications inside a network segment. Ethernet, Wi-Fi, and Bluetooth are
just a few of the IEEE 802 networking technologies that frequently employ this
application.

MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By convention, MAC
addresses are usually written in one of the following two formats:
MM:MM:MM: SS: SS:SS
MM-MM-MM-SS-SS-SS

IP Address

Every computer in a network has an additional unique identification code


called an IP Address. The four bytes (or 32 bits) that make up an IP address can
range in value from 0 to 255. A typical IP address appears as follows:
59.177.134.72
IP addresses are typically written in decimal format as a “dotted decimal
number” like the one above to make them simpler for humans to remember.

Domain Name

An Internet physical IP address is linked to an easy-to-remember name known as


a domain name, which is frequently just referred to as a domain. It is the
distinctive name that follows the @ symbol in email addresses and the www.
prefix in web addresses.

Names and Country-Specific Domain Names. For example


Generic Domain Names:
·com – commercial business
·edu – Educational institutions
·gov – Government agencies
·mil – Military
·net – Network organizations
·org – Organizations (nonprofit)

Country Specific Domain Names:


.in – India
·au – Australia
·ca – Canada
.ch – China
.nz – New Zealand
.pk – Pakistan
.jp – Japan
.us – United States of America

Domain Name Resolution

The process of turning a domain name into an IP address is known as domain


name resolution. Since one IP address can correlate to many domain names and
one domain name to one IP address, multiple domain names can simultaneously
be resolved to the same IP address.

Internet and its Terminology

Digital literacy

The capacity to use reading, writing, technological expertise, and critical thinking
to navigate our digital world is known as digital literacy. It involves using
technology to find, assess, and transmit information, including devices like a
smartphone, PC, e-reader, and more.

Internet Services

Network services are programmes that are hosted by servers on a computer


network and offer functionality to network users. The Internet has several uses,
including e-mail, file sharing, remote login, and the World Wide Web (WWW).

Electronic Mail (E-Mail) – A multimedia attachment, such as text,


audio, an image, or a video, may be included with an email in addition to
being a textual message. The email may be sent to one or more intended
recipients by the sender.
File Transfer – FTP is used to transfer files from one computer to
another using a TCP-based network (File Transfer Protocol). Client-
server architecture is the foundation of File Transfer Protocol.
Local hosts (clients) can download or upload files to distant hosts using
FTP (server).
Remote Login (TELNET) –The acronym for this network is TELNET. It is
a client-server programme that enables users to connect to remote
systems while logged in to one system.
World Wide Web (WWW) – The World Wide Web (WWW), also referred
to as the “web,” is a collection of connected information stored on
devices that are dispersed across the Internet.
Internet Protocol Suite

Protocol is set of rule, The common network model and


communication protocol stack used on the Internet and in the majority of other
computer networks is known as the Internet Protocol Suite (IP suite). The IP suite
is largely the global standard for computer-to-computer communication, despite
the existence of alternate networking paradigms.

These sub-tasks or functions are performed by different layers of TCP/IP


mode

Application layer

Data or a message is formed at the sending end and reviewed and processed at
the receiving end. The message that will be sent with the header must likewise be
enclosed by this layer. On this layer, a number of protocols like HTTP (HyperText
Transfer Protocol) and POP3 (Post Office Protocol version 3) operate.

Transport layer

The message is sent from the application layer to the transport layer, which
appends the source and destination ports of the processes at the two ends. At this
layer, two end-to-end protocols—TCP and UDP—are in use. When timely and
error-free data transport is crucial, TCP (Transmission Control Protocol) is a
dependable connection-oriented protocol that is required.

Internet Layer

The Internet layer receives the segments from the transport layer and adds the
source and destination machine network addresses (also termed IP address). IP,
or Internet Protocol, is utilised at the Internet layer. The format of packets sent
over the Internet is specified by IP.

Link layer

Host to Internet layer is another name for link layer. The header containing the
sender and receiver physical addresses must be included by this layer to the
packet that was received from the Internet layer.

Cyber Threats and Cyber Security

Malwares
Malicious software (programmes) created with the purpose of interfering with
system performance by harming the system, gaining unauthorised access to the
system, or preventing legitimate users from using computing resources are
referred to as malware. Malware includes viruses, worms, and Trojan horses.

Virus – A virus is a software code that may harm your system by overwriting or
corrupting the system files.

Worm – A worm is often received via network, and it automatically keeps on


creating several copies of itself on the hard disk thereby flooding the hard disk.
When a worm is received as an email attachment, it is automatically forwarded to
the recipients leading to network congestion.

Trojan Horse – Trojan Horse is a code that appears to be desirable and useful but
ends up harming the
system. Trojan horse can attach itself with a safe application. For example, it may
be attached to any game downloaded over the Internet. Such an application when
executed creates a backdoor in the system through which a hacker can access the
system.

Eavesdropping

The act of surreptitiously or covertly listening to another person’s private


discussion or communications without that person’s agreement is known as
eavesdropping. Telephone lines, cellphone networks, email, and instant
messaging are all used for eavesdropping.

Denial of Service

A cyberattack known as a denial-of-service (DoS) attack renders a system or


network resource inaccessible to its users by temporarily or permanently
interrupting services.

Phishing

The practise of stealing a user’s personal information through fraudulent mail is


known as phishing.
These emails either include embedded forms that request personal information
from you or include links to web pages that might ask you for it.

Cyber Crime

Cybercrimes are crimes including theft, fraud, and forgery that involve the
improper use of computers or the Internet. According to the IT Act, cybercrime
is any illegal activity in which a computer is either a tool, a target, or both. These
crimes include some of those listed below –

1. Cyber bullying – Harassment or bullying inflicted through the use of


electronic or communication devices such as computer, mobile phone,
laptop, etc.
2. Cyber stalking – Use of electronic communication by a person to follow a
person or attempts to contact a person to foster personal interaction
repeatedly despite a clear indication of disinterest by such person.
3. Online Job Fraud – An attempt to defraud people who need employment
by giving them a false hope/ promise of better employment with higher
wages.
4. Vishing – To seek personal information like Customer ID, Net Banking
password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
5. SMSing – Use of mobile phone text messages to lure victims into calling
back on a fraudulent phone
number, visiting fraudulent websites or downloading malicious content
via phone or web.
6. SIM Swap Scam – Getting a new SIM card against a registered mobile
number
7. Credit card (or debit card) fraud – An unauthorized use of another’s
credit or debit card information for the purpose of purchases or
withdrawing funds from it.
8. Identity theft – Dishonestly making use of the electronic signature,
password or any other unique
identification feature of any other person.
9. Spamming – Persuading a recipient to buy a product or service, or visit a
website via email, SMS, MMS
where he can make purchases.
10. Ransomware – The victim is asked to pay the demanded ransom to get
his device decrypts.

Network Security Tools and Services

Network layer security

TCP/IP protocols may be secured with cryptographic methods and security


protocol like Secure Sockets Layer (SSL).

Firewalls

An organization’s previously set security policies are used to monitor and filter
incoming and outgoing network traffic through a firewall, a network security
device. A firewall is essentially the barrier that stands between a private internal
network and the open Internet at its most basic level.

Antivirus

Viruses and other types of dangerous software can be found and eliminated from
your computer or laptop using an antivirus package. Malicious software, also
referred to as malware, is computer code that can damage your computers,
laptops, and the data they contain.

Password managers

A password manager is a piece of software that aids in organising and storing


passwords. In order to access their complete password database from top to
bottom, users of password managers typically need to generate a master
password, which should be a single, extremely strong password.

Cyber Law

Cyber laws serve as a deterrent to illicit cybercrime and regulate the systematic
use of e-resources, such as e-business. To prevent cybercrimes and prosecute
those responsible, numerous cyber laws have also been passed. These laws
specify the punishment that will be meted out to those who violate the laws.

You might also like