class-xii-unit-ii-computer-networks-2020-21
class-xii-unit-ii-computer-networks-2020-21
com/
CLASS-XII
COMPUTER SCIENCE-PYTHON (083)
UNIT-II COMPUTER NETWORKS
https://pythonschoolkvs.wordpress.com Page 1
CHAPTER-8 COMPUTER NETWORKS
ARPANET: The Advanced Research Projects Agency Network (ARPANET) was an early
packet switching network and the first network to implement the protocol suite TCP/IP. Both
technologies became the technical foundation of the Internet.
WWW: World Wide Web started on 6th August 1991, started by ‘ Berners Lee’ .
• Circuit Switching
• Packet Switching
• Message Switching
https://pythonschoolkvs.wordpress.com Page 2
Packet Switching
Channel: A channel is a separate path through which signals can flow. A channel has a
certain capacity for transmitting information, often measured by its bandwidth in Hz or
its data rate in bits per second.
Bandwidth: Bandwidth refers to the amount of information that can be transmitted over a
network in a given amount of time, usually expressed in bits per second or bps.
Data Transfer Rate: The data transfer rate of a computer network connection is normally
measured in units of bits per second (bps).
https://pythonschoolkvs.wordpress.com Page 3
1 megabit per second (Mbps) = 1000 Kbps or 10002 bps.
Network:- To connect the more than one devices via a medium, is called network.
1. Communication
2. Resource sharing
3. Reduce Cost
Types of Network:
https://pythonschoolkvs.wordpress.com Page 4
1. LAN:
* Large network
* Public
* Example – Internet
4. PAN:
A medium which is used to connect the devices and transfers the data from one device to
another device.
Medium
Wired Wireless
(Guided) (Unguided)
1. Modem
2. Hub
3. Switch
4. Gateway
5. Bridge
6. Router
7. Repeater
8. NIC (Network Interface Card)
9. RJ45 Connector
1. Modem:
The full form of modem is Modulator and demodulator.
A modem is a device or program that enables a computer to transmit data over
telephone or cable lines.
A modem converts analog signal to digital signal and vice- versa.
Modem connects computer to internet.
There are two types of modem:
a. Internal Modem
https://pythonschoolkvs.wordpress.com Page 6
b. External Modem
Telephone pole
Modem
2. Hub:
A network device that contains multiple ports.
Provides multiple connections.
When a packet arrives at one port, it is copied to the other ports so that all
segments of the LAN can see all packets.
Two types of hub :
a. Active Hub
b. Passive Hub
3. Switch:
A switch is called smart hub.
Provides multiple connections
A device that filters and forwards packets between LAN segments.
https://pythonschoolkvs.wordpress.com Page 7
Fig: Switch
HUB SWITCH
4. Gateway:
A gateway is a network point that acts as an entrance to another network.
Used to connect two dissimilar networks.
WAN LAN
5. Bridge:
A device that connects two local-area networks (LANs), or two segments of the same
LAN that use the same protocol, such as Ethernet.
https://pythonschoolkvs.wordpress.com Page 8
LAN-1
LAN-2
6. Router:
A router is a device that forwards data packets along networks. A router is connected
to at least two networks, commonly two LANs or WANs. Routers are located
at gateways, the places where two or more networks connect.
A router acts as a dispatcher, choosing the best path for information to travel so it’s
received quickly.
7. Repeater:
Network repeaters regenerate and amplify the weak signals to transmit the information
for long distance.
https://pythonschoolkvs.wordpress.com Page 9
8. NIC (Network Interface Card): NIC card has a physical address of a system; this
physical address known as MAC address.
A MAC address is a 6- byte address with each byte separated by a colon. First 3-bytes have
Manufacturer id and last 3-bytes represent Card id.
10:BE:05:56:3F:CB
Manufacturer id Card id
9. RJ45 Connector: It is used for connecting computers onto Ethernet-based local area
networks (LAN). RJ stands for Registered Jack. It is a standardize networking interface. 45
is the number of the interface standard. It has 8-pins.
The term Topology refers to the way/layout in which the various nodes or computers of a
network are linked together.
The following factors are considered while selecting a topology:
1. Cost
2. Reliability
3. Scalability
4. Bandwidth capacity
5. Ease of installation
6. Ease of troubleshooting
7. Delay involved in routing information from one node to another.
Types of Topologies
https://pythonschoolkvs.wordpress.com Page 10
1. Bus Topology
It consists of one continuous length of cable (trunk) that is shared by all the nodes in the
network and a terminating resistor (terminator) at each end that absorbs the signal when it
reaches the end of line. Without a terminator the electrical signal would reach the end of
copper wire and bounce back, causing errors on the network.
Data communication message travels along the bus in both directions until it is picked up by
a workstation or server NIC. If the message is missed or not recognized, it reaches the end of
the cabling and dissipates at the terminator. Bus Network Topology requires a multipoint
connection.
Advantages Disadvantages
1. Easy to install and the use for small 1. If the main cable fails the entire network
networks. collapses.
2. Requires less cable 2. Difficult to reconfigure, due to more
connections.
2. Ring Topology
The physical ring Topology is a circular loop of point-to-
point links. Message travel around the ring from node to node
in a very organized manner. Each workstation checks the
message for a matching destination address. If the address
doesn’t match the node simply regenerates the message and
sends it on its way. If the address matches, the node accepts
the message and sends a reply to the originating sender.
Advantages Disadvantages
https://pythonschoolkvs.wordpress.com Page 11
3. Star Topology
The physical star Topology uses a central controlling hub with dedicated legs pointing in all
directions – like points of a star. Each network
device has a dedicated point-to-point link to the
central hub. There is no direct link between these
computers and the computers can communicate via
central controller only.
Advantages Disadvantages
1. Easier to add new node or modify any 1. Central node dependency. If the central
existing node without disturbing network. controller or hub fails, entire system
2. Fast Speed collapses.
3. If any local computer or link fails, the entire 2. Cabling cost is more
system does not collapse 3. Difficult to install
4. Easy fault detection and isolation
5. Central node control
4. Mesh Topology
In mesh topology, each node is connected to every other
node in the network i.e. each node has a dedicated point
to point link to every other node as shown. Dedicated
means that the link carries the traffic only between two
devices it connects.
In this way there exist multiple paths between two nodes
of the network. In case of failure of one path, the other
one can be used.
Advantages Disadvantages
1. It is robust. Failure of one node does not 1. Network installation and reconfiguration
collapse the entire system. difficult.
2. No traffic congestion 2. High cabling cost. If there are n nodes in
3. Dedicated links ensure faster transmission the network then each node has (n-1)
connections.
4. Point to point links makes fault
identification and isolation easier.
https://pythonschoolkvs.wordpress.com Page 12
5. Tree Topology
This topology has Hierarchical structure. This topology connects the node via hubs. Hub,
which is present at top level, is called root hub or active hub. Another hub is called
secondary hub or passive hub.
Advantages Disadvantages
1. New node can be added easily. 1. If the backbone line breaks, the entire
2. Signal can travel for long distance. segment goes down.
3. Isolate and prioritize communication. 2. More difficult to configure
3. Higher cabling cost
6. Hybrid Topology:
It is a composition of more than one topology.
https://pythonschoolkvs.wordpress.com Page 13
8.8 Network Protocol:
Application Layer
Transport Layer
Internet
Network Interface
Each computer has unique address over internet, is called IP address. An IP address is an
identifier for a computer or device on a TCP/IP network.
Two types:
3. FTP (File Transfer Protocol): use to transfer files from one computer to another computer.
5. HTTP( HyperText Transfer Protocol): To transfer the hypertext pages over internet.
8. CDMA: Code Division Multiple Access (CDMA) is a digital air interface standard,
claiming eight to fifteen times the capacity of traditional analog cellular systems.
Each user is separated by a unique code; all users can share the same frequency band.
CDMA is a spread spectrum technology, which means that it spreads the information
contained in a particular signal of interest over a much greater bandwidth than the original
signal.
9. GPRS: General Packet Radio Service is a packet-switching technology that enables data
transfers through cellular networks (wireless). It is used for mobile internet, MMS and other
data communications. In theory the speed limit of GPRS is 115 kbps, but in most networks it
is around 35 kbps.
10. WLL: Wireless Local Loop is a system that connects subscribers to the local telephone
station wirelessly.
https://pythonschoolkvs.wordpress.com Page 15
8.9 Mobile Telecommunication Technologies:
Firstly, when wireless generation started, it was analog communication. That generation is
1G. They used various analog modulation for data transfer. Now when the communication
migrated from analog to digital, the foundation of latest communication were led. Hence
came 2G.
1G Technology:
1G refers to the first generation of wireless telephone technology, mobile
telecommunications which was first introduced in 1980s and completed in early 1990s.
It’s Speed was upto 2.4kbps, allowed the voice calls in one country.
It used Analog Signal and AMPS was first launched in USA in 1G mobile systems
Drawbacks:
Poor Voice Quality
Poor Battery Life
Large Phone Size
No Security
Limited Capacity
Poor Handoff Reliability
2G Technology:
2G technology refers to the 2nd generation which is based on GSM.
It was launched in Finland in the year 1991 and used digital signals.
It’s data speed was upto 64kbps.
https://pythonschoolkvs.wordpress.com Page 16
Features include:
It enables services such as text messages, picture messages and MMS (multi media
message).
It provides better quality and capacity.
Drawbacks:
2G requires strong digital signals to help mobile phones work. If there is no network
coverage in any specific area, digital signals would weak.
These systems are unable to handle complex data such as Videos.
3G Technology:
3G technology refer to third generation which was introduced in year 2000s.
Data Transmission speed increased from 144kbps- 2Mbps.
Typically called Smart Phones and features increased its bandwidth and data transfer
rates to accommodate web-based applications and audio and video files.
Features Include:
Providing Faster Communication
Send/Receive Large Email Messages
High Speed Web / More Security
Video Conferencing / 3D Gaming
TV Streaming/ Mobile TV/ Phone Calls
Large Capacities and Broadband Capabilities
11 sec – 1.5 min. time to download a 3 min Mp3 song.
Drawbacks:
Expensive fees for 3G Licenses Services
It was challenge to build the infrastructure for 3G
High Bandwidth Requirement
Expensive 3G Phones.
Large Cell Phones
https://pythonschoolkvs.wordpress.com Page 17
4G Technology:
4G technology refer to or short name of fourth Generation which was started from late
2000s.
Capable of providing 100Mbps – 1Gbps speed.
One of the basic term used to describe 4G is MAGIC.
Features Include:
Mobile Multimedia
Global Mobility Support
Integrated Wireless Solution
Customized Personal Services
Also known as Mobile Broadband Everywhere
The next generations of wireless technology that promises higher data rates and
expanded multimedia services.
Capable to provide speed 100Mbps-1Gbps.
High QOS and High Security
Provide any kind of service at any time as per user requirements, anywhere.
More Security
High Speed
High Capacity
Low Cost Per-bit
Drawbacks:
Battery uses is more
Hard to implement
Need complicated hardware
Expensive equipment required to implement next generation network.
https://pythonschoolkvs.wordpress.com Page 18
The basic difference between 3G and 4G is in data transfer and signal quality.
Technology 3G 4G
E-Mail is a method to send the messages in digital form. E-mail is a message that may
contain text, files, images, or other attachments sent through a network to a specified
individual or group of individuals.
gmail server yahoo server
SMTP
POP3/IMAP
SMTP (Simple Mail Transfer Protocol) is a protocol which is used to transfer the e-mail
from sender side. This protocol is known as push protocol.
POP3 (Post Office Protocol version 3): This protocol is used to access e-mail from the
server to receiver. This protocol is known as pull protocol.
https://pythonschoolkvs.wordpress.com Page 19
IMAP(Internet Mail Access Protocol) : Internet Message Access Protocol (IMAP) is an
Internet standard protocol used by e-mail clients to retrieve e-mail messages from a mail
server over a TCP/IP connection.
VoIP : VoIP (voice over IP) is the transmission of voice and multimedia content over Internet
Protocol (IP) networks. This protocol is used for chat and video conferencing over internet.
1. Virus
2. Worms
3. Trojan Horse
4. Cookies
5. Spams
6. Spyware
7. Adware
1. Virus: A virus is a piece of program code that attaches itself to legitimate program code,
and runs when the legitimate program runs. It can then infect other programs in that computer
or network.
A virus can be repaired, and its damage can be controlled by using good backup procedure.
2. Worms: A worm does not perform any destructive actions, and instead, only consumes
system resources to bring it down. A virus modifies a program; a worm however does not
modify a program. Instead it replicates itself again and again.
https://pythonschoolkvs.wordpress.com Page 20
3. Trojan horse: A Trojan horse is a hidden piece of code, like a virus. A virus modifies
information whereas A Trojan horse attempts to reveal confidential information to an
attacker.
4. Cookies: A cookie is just one or more pieces of information stored as text strings in a text
file on the disk of the client computer (i.e. the web browser).
5. Spam: irrelevant or unsolicited messages sent over the Internet, typically to large numbers
of users, for the purposes of advertising, phishing, spreading malware, etc.
6. Spyware - Software that may be installed as part of another program. It may also be
installed when a user visits a website with malicious code or when an already running process
loads and installs it. This program is designed to report on what the user does to the program
creator.
8.14 Firewall:
A firewall is a device (or software feature) designed to control the flow of traffic into and
out-of a network. In general, firewalls are installed to prevent attacks.
Hardware Firewall:
https://pythonschoolkvs.wordpress.com Page 21
Software Firewall:
Inspects each individual “packet” of data as it arrives at either side of the firewall.
Determines whether it should be allowed to pass through or if it should be blocked.
Types of Firewall:
8.15 HTTPS:
HTTPS stands for Hypertext Transfer Protocol Secure. It is the protocol where encrypted
HTTP data is transferred over a secure connection. HTTPS does encryption of data between
a client and a server, which protects against eavesdropping, forging of information and
tampering of data.
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of
the Indian Parliament notified on 17 October 2000. It is the primary law in India dealing
with cybercrime and electronic commerce.
The original Act contained 94 sections, divided in 19 chapters and 4 schedules. The laws
apply to the whole of India. Persons of other nationalities can also be indicted under the law,
if the crime involves a computer or network located in India.
The Act provides legal framework for electronic governance by giving recognition
to electronic records and digital signatures.
https://pythonschoolkvs.wordpress.com Page 22
Commission of cybercrime may be divided into three basic groups:
Individual
Organisation
Society at Large
Against Individual
Harassment via Emails
Cyber Stalking
Dissemination of obscene material
Defamation
Hacking/Cracking Indecent Exposure
Computer Vandalism
Transmitting a Virus
Network Trespassing
Unauthorized Control over Computer System
Hacking/Cracking
Against Organisation
Hacking & Cracking
Possession of unauthorized Information
Cyber- Terrorism against Government Organization
Distribution of Pirated Software Etc
8.17 Cyber Law: Cyber law or Internet law is a term that encapsulates the legal issues
related to use of the Internet. It is less a distinct field of law than intellectual property or
contract law, as it is a domain covering many areas of law and regulation.
8.18 Cyber Crime: Criminal activities carried out by means of computers or the Internet.
Intellectual Property Rights: Intellectual property rights (IPR) is the term applied to the
legal protection afforded to innovative and creative materials. It allows owner of IPR to
gain from the use of the material and thereby to encourage innovation and creativity.
https://pythonschoolkvs.wordpress.com Page 23
IPR Issues:
o Copyright law
o The law of confidence
o Patent law
o Design law
o Trademarks
o Copyright and computer programs
o Database copyright and the database right
o Criminal offences
8.21.1 WWW: World Wide Web is an information system where websites and webpages
are interconnected and accessible through URL. It is also known as Web.
8.21.2 HTML: HTML is the standard markup language for creating Web pages.
<html>
<head>
<title>My first web page</title>
</head>
<body>
<h1> My First Heading </h1>
<p> My first paragraph </p>
</body>
</html>
8.21.3 XML :
S.
HTML XML
No.
1 HyperText Markup Language. eXtensible Markup Language.
5 HTML has its own predefined tags. Uses custom tags defined by the user.
HTML is not strict if the user does not use the XML makes it mandatory for the user the close
6
closing tags. each tag that has been used.
7 HTML does not preserve white space. XML preserves white space.
XML is about carrying information hence
8 HTML is about displaying data, hence static.
dynamic.
Domain names are used to identify one or more IP addresses. Domain names are used in
URLs to identify particular web page.
URL http://www.kvongcbrd.com/english-results.htm
Domain Name kvongcbrd.com
Web Page english-results.htm
Protocol http
Every domain name has a suffix that indicates which top level domain (TLD) it belongs to.
There are only a limited number of such domains. For example:
gov - Government agencies
edu - Educational institutions
org - Organizations (nonprofit)
mil - Military
com - commercial business
net - Network organizations
in - India
th – Thailand
https://pythonschoolkvs.wordpress.com Page 25
Because the Internet is based on IP addresses, not domain names, every Web server require
a Domain Name System (DNS) server to translate domain names into IP addresses.
8.21.5 URL: Uniform Resource Locator. It is the global address of documents and other
resources on the World Wide Web.
8.21.6 Website: Collection of web pages which are interlinked to one another. These pages
are hypertext pages and link between pages is known as hyperlink.
8.21.7 Web browser: It is application software though which user can access internet.
Example: internet explorer, Google chrome, Mozilla Firefox, opera, UC browser
8.21.8 Web Server: A web server is a system that uses HTTP to accept request and serve the
web pages as response to users. Every web server has IP address.
8.21.9 Web Hosting: Web hosting is a service that allows organizations and individuals to
post a website on to the Internet.
A web host, or web hosting service provider, is a business that provides the technologies and
services needed for the website or webpage to be viewed in the Internet. Websites are hosted,
or stored, on special computers called servers.
8.21.10 Web Scripting: Programming languages which are used to design dynamic web
pages, are known as web scripting languages. There are two types of web scripting languages:
1. Client Side Scripting: The programming language which executes on client side is
known as client side scripting.
There are several languages that can be used for server-side programming:
PHP (Hypertext Preprocessor )
https://pythonschoolkvs.wordpress.com Page 26
ASP (Active Server Pages)
Java and JSP( Java Server Pages)
Python
8.21.11 Cloud Computing: Sharing the resources over internet. A user can access
hardware and software remotely on a network or internet by paying some money or free.
Example: Google drive, One drive etc.
8.21.12 Web 2.0 : The second stage of development of the Internet, characterized
especially by the change from static web pages to dynamic web pages and the growth of
social media.
8.21.13 VoLTE: Voice over Long-Term Evolution (VoLTE) is a standard for high-speed
wireless communication for mobile phones and data terminals.
8.22 E-Commerce:
E-Commerce stands for electronic commerce. E-commerce means buying and selling of
goods, products and services over the internet. Transactions through internet or electronic
media is also a part of e-commerce.
There are four types of transactions in e-commerce:
i. Business to Business (B2B)
ii. Business to Customer(B2C)
iii. Customer to Business(C2B)
iv. Customer to Customer(C2C)
A. Online Banking
B. Mobile Banking
C. Payment Apps and services (e-Wallet, UPI)
A. Online Banking: Online Banking used different types of methods to make the payment.
It includes Internet Banking and payment using Debit/Credit Cards.
Internet Banking: It is a simple way of paying for online purchases directly from the
customer’s bank. Net banking does not require the user to have a card for payment purposes
but the user needs to register with his/her bank for the net banking facility. While completing
the purchase the customer just needs to put in their net banking userid and password.
Payment using Debit/Credit Card: It is similar to internet banking. To make the transaction
using debit/credit card, a user should know the card number, name on the card, CVV/CVN
number, Valid through etc.
C. Payment Apps and Services: A user has to create an account with these apps. It is a
prepaid account that allows a customer to store multiple credit cards, debit card and bank
account numbers in a secure environment. This eliminates the need to key in account
information every time while making payments. Once the customer has registered and created
E-Wallet profile, he/she can make payments faster.
https://pythonschoolkvs.wordpress.com Page 28