The document provides tips for answering case study-based questions, including layout suggestions, communication media options, and network protocols. It covers various aspects of networking, mobile technologies, cybercrime, and database management systems. Additionally, it discusses security measures, intellectual property rights, and the evolution of web technologies.
The document provides tips for answering case study-based questions, including layout suggestions, communication media options, and network protocols. It covers various aspects of networking, mobile technologies, cybercrime, and database management systems. Additionally, it discusses security measures, intellectual property rights, and the evolution of web technologies.
‘Tips for CASE STUDY BASED questions.
[Question Hint for Answering
layout Draw block diagram interconnecting blocks, prefer the block or unit
with maximum devices as main to connect other blocks
Topology Write name of topology ~ Star / Bus / Ring etc.
Placement of Server In the unit/block with maximum number of computers
Placement of Hub/Switch In every block / unit
Placement of Repeater ‘As per layout diagram, ifdistance between two blocks is above 90 meter
Cost-effective medium for internet
Broadband / connection over telephone lines
Communication media for LAN
Ethernet (upto 100 meter) / Co-axial cable for high speed within LAN
Cost/Budget NOT an issue inLAN | Optical Fiber
Communication media for Hills Radio wave / Microwave
Communication media for Desert Radio wave
Very fast communication between
two cities / countries
Satellite (avoid it in case economical / budget is mentioned)
Device / software to prevent
Firewall (Hardware and/or Software )
unauthorized access
NETWORK PROTOCOLS : Set of rules for communication among networked devices. These include h
and when a device can send and receive data, how it is packaged, how it reaches its destination,
TCP/IP - Transmission Control Protocol/Internet Protocol. A two-layer protocol
TCP - divides the data into packets for transmitting and re-assembling received packets at the destinati«
IP - responsible for routing the data packets ( to find route/way )
PPP Point-to-Point Protocol - Used for direct communication between two devices, like a compu
connected via phone line to a server (other examples - cellular telephone, fibre optic links ctc)
FTP File Transfer Protocol -Used for transfer of files (upload/download) to or from a remote server.
HTTP HyperText Transfer Protocol- transfer data from one device to another on the world wide web.
HTTP defines how the data is formatted and transmitted over the network.
{ HTTPS - Hypertext Transfer Protocol Secure: advanced and secure version of HTTP. }
Wireless / Mobile Communication protocol: [1 mark case study/ full forms]
GSM = Global System for Mobile Communication. GSM technology is used for transmitting mobile vo
and data services,
{With GSM, all subscriber and wireless provider information is stored on interchangeable modules kno
as SIM (Subscriber Identification Module) cards. }
GPRS = General Packet Radio Service - transmission of IP packets over existing cellular networ
Applications = Multi-media Message Service (MMS), Internet Access via Mobiles and Data Communicati
WLL= Wireless Local Loop is a generic term for an access system that uses wireless links rather tk
conventional copper wires to connect subscribers to the local telephone company’s switch.
MOBILE TELECOMMUNICATION TECHNOLOGIE: [1 mark full form / feature ]
Mobile is a device which is portable. Mobile communication is based on cellular networks.
{A cellular network is radio network - land is divided into areas called cells. The network of cells enab
the mobile devices to communicate even if they are moving from one cell to another via base stations.}
Mobile Systems ( G = Generation)
1G
jo __ | 2G _ 2.56 [| 3G
introduced in late | introduced in early 1990s; | using packet | Adds multi-media facility to
1970s and early | based on GSM technology; | switched domain —_| 2G - allowing video, audio,
1980s; analog | by swapping out the SIM and graphics applications ;
cellular technology | card, users can _ switch {Year 2000 - 2010 }
phones or providers.
used circuit switching ; Both
Only voice facility used GPRS (General | Watching streaming video
available ; based on | voice and data | Packet Radio Service) | or video telephony became
circuit-switched conversations were digitally | in addition to GSM. _ | a reality ( Mobile TV) ;
technology encrypted
Low capacity , poor | Known for paging, SMS, | Services like MMS, | Data rates up to 2 Mbps;
voice links and no | voicemail and fax services | sending _ pictures | Technologies used ~ UMTS,
security through e-mail | EDGE, CDMA
possible‘Threats and prevention from -
Viruses - Vital Information Resource Under Siege; Viruses are small programs that are written
intentionally to damage the data and files on a system; computer slows down; programs malfunction; files
destroyed
Worms - a self-replicating program that runs independently and travels across network connections.
Worms cause more damage.
‘Trojan horse - a kind of virus that looks safe but has hidden effects.
Spam - unwanted bulk mail which is sent by an unauthorized or unidentified person in order to eat the
entire disk space.
PREVENTION - Use anti-virus software; keep computer software updated ; use firewall ; follow safe
browsing practices - using authorization , authentication, keeping passwords safe.
COOKIE = A cookie is a small text file sent by web server to a web browser when a user browses a
website.
FIREWALL = A hardware or software or both that is used to prevent unauthorized access to or from a
computer network;
CYBER CRIME
Cybercrime, or computer-oriented crime, is a
crime in which a computer and internet is used.
Cybercrimes can be against persons or against
property or against the government
Legal system of laws and regulatory aspects
of issues of the internet and World Wide
Web
India IT Act -
"INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] - to protect the field of e-commerce, e-
governance, e-banking as well as penalties and punishments in the field of Cyber Crimes.
‘The above Act was further amended in the form of IT Amendment Act, 2008 [ITAA-2008] in December
2008, Major aspects covered in IT AA-2008 include new sections on offences like cyber terrorism, data
protection, digital signatures, e-Documents (e-governance) etc.
INTELLECTUAL PROPERTY RIGHTS -
Intellectual property rights are the rights given to persons over the creations of their minds.
Intellectual Property can be - Industrial Property ( Patents , Trademarks) and Copyright.
For example, an invention and an original work of authorship are intellectual property and protected by
the intellectual property right called "patent" and "copyright"
Other examples of Intellectual Property with a view of IPR -
Patents , Trademarks, Plant Varieties, Copyrights, Trade secrets, Industrial Design rights ete.
HACKING CRACKING
Engaging in harmless technical experiments and _| A method by which a person gains
fun learning activities, using computer unauthorized access to a computer with the
programming skills to intentionally access a intention of causing damage.
computer without authorization.
‘Types of Hackers - Black Hat Hackers (also known as crackers), White Hat Hackers, Grey Hat Hackers
WEB SERVICES :
WWW : World Wide Web is a combination of all resources and users on the Internet that are using the
Hypertext Transfer Protocol (HTTP) ;
Sir Tim Berners -Lee (Born in London, UK) is the inventor of WWW.
Website
Collection of webpages
Webpage
Webpage is part of website
Each website has specific internet address
(URL) by which we can access the website
Webpages have hyperlinks to connect one web
page to another in the website
Example - http://cbseacademicnicin/
More examples -
amazon.com, flipkart.com, google.com
Example ~ curriculum_2021.html is a webpage of
the CBSE website.
hitp://cbseacademic.nicin/curriculum 202,.htmi |
All publicly accessible websites collectively
constitute the World Wide WebSome terms we need to be familiar with ~
FDMA - Frequency Division Multiple Access. CDMA - Code Division Multiple Access.
TDMA - Time Division Multiple Access.
4G Mobile Systems
Bandwidth - 100Mh:
jased on packet switching only (IP based), { Year 2010 -2020 };
rm used for 4G is MAGIC
Mobile Anytime, anywhere Global mobile | Integrated wireless Customized
IRimedia | fast transmission support solutions personal service
multimedia | j99Mbps - 1Gbps (uses LTE and Wi-Max)
(4G LTE = Fourth Generation Long Term Evolution} 4G can provide better-than-TV quality images an
video-links , supports interactive multimedia, voice and video
5G Mobile Systems = uses orthogonal frequency-division multiplexing (OFDM) framework; radio
millimeter bands in the 30 GHz to 300 GHz range. More faster data transmission than 4G, data rate
from 1 Gb and above {From year 2020 onwards }. Highly interactive multi-media, voice streaming, me
efficient.
Mobile processors =
Like CPU in a computer system, mobile processor receives and executes every command, perform
billions of calculations per second.
Components of Mobile Processors - Mainly the following three -
1. Application Processing Unit = Has the Control Unit of the mobile’s GPU ( Central Processing Unit)
2. GPU (Graphics Processing Unit) = Assists the CPU for handling the graphics.
3. Communications Processing Unit = for calling and call receiving via the phone's middleware
A few more components in smartphone’s processors -
a. Camera ISP ( Image Signal Processing) b. Radio and 3G / 4G Modem
c. Memory Controller d. Audio / Video Engine
£-Mail- [1 mark - case study / application ]
e-Mail or email, short for "electronic mail,” is the transmission of messages electronically over compu
networks.
¢-Mail PROTOCOLS: Email uses multiple protocols within the TCP/IP suite, Some common e-mail
protocols are -
SMTP - Simple Mail Transfer Protocol - used to send emails on the internet
POP3 - Post Office Protocol Version 3 - to receive emails from a remote server to a local email client
IMAP - Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email ona
remote web server from a local client. { Example - We use MS-Outlook}
Telnet - Used to connect to remote computers over a TCP/IP network (interactive , text- based)
PROTOCOLS FOR CHAT AND VIDEO CONFERENCING:
Online conversations in which you are immediately able to send messages back and forth to one anothe)
called "chat".
Avideo conference is a telecommunication technology, which permits two or more people in different
locations to interact via mutual video or audio transmission simultaneously.
VoIP - voice over Internet Protocol, which is a base for all internet communications.
WIRELESS TECHNOLOGIES -
Wi-Fi {"WiFiis a short name for Wireless Fidelity" }
Wi-Fi is a wireless networking technology that uses radio waves to allow computers and other devices
communicate over a wireless signal
WiMax WiMAX (Worldwide Interoperability for Microwave Access) is a family of wireless broadba
communication standards. WiMAX systems are expected to deliver broadband access services to
residential and enterprise customers in an economical way.
{ WiFi's range is approx. 30 m. WiMAX range is a radius of 50 km }
NETWORK SECURITY CONCEPTS ~WEB BROWSER = Web browser is software program to navigate the web pages on the internet.
Examples - Google Chrome , Mozilla Firefox, Internet Explorer etc.
WEB HOSTING
WEB SERVER
Web hosting is the process of uploading/saving the
web content on a web server to make it available on
WWW (World Wide Web)
‘Aweb server is a computer or a group of computers
that hosts or stores content of website.
Examples - Apache Tomeat, IIS
Web 2.0 =Web 2.0 refers to new generation of dynamic and interactive websites.
HTML (Hyper Text Markup Language)
XML(eXtensible Markup Language)
HTML is used to display the data, text and
images ofa webpage on web browser and focus
ison the format of data displayed.
XML is used to describe the data and focus is on
the content of the data. XML is recommended by
the World Wide Web Consortium (W3C). Itisa
free open standard
HTML tags are predefined
XML tags are not predefined. We can create our
own tags. XML code can also contain HTML tags.
HTML tags are not case sensitive, Example -
or are the same
XML tags are case-sensitive
URL (Uniform Resource Locator)
DOMAIN NAME
URL is unique identifier ofa web page
Domain name is your website name
The most general form of a URL syntax is as follows:
Protocol:// / /