UGC NET COMPUTER SCIENCE
UGC NET COMPUTER SCIENCE
Data Communication
1. Components of a Data Communication System
A data communication system consists of essential elements that enable the exchange of data between devices.
These components include:
1. Message:
2. Sender:
3. Receiver:
4. Transmission Medium:
5. Protocol:
2. Modes of Communication
Simplex Mode:
No return communication.
Advantages:
Disadvantages:
Half-Duplex Mode:
Example: Walkie-talkies.
Advantages:
Full-Duplex Mode:
Advantages:
Disadvantages:
3. Signals
Analog Signals:
Characteristics:
Digital Signals:
Characteristics:
o Square-shaped waves.
4. Channel Characteristics
Noiseless Channels:
Noisy Channels:
Types of noise:
1. Bandwidth:
o Types:
2. Throughput:
3. Latency:
o Components:
Propagation Delay: Time taken for data to travel through the medium.
Transmission Delay: Time taken to push the data onto the wire.
Digital Transmission:
Advantages:
o Noise immunity.
Techniques:
o Non-Return-to-Zero (NRZ).
o Manchester Encoding.
Analog Transmission:
Techniques:
Data Encoding:
Types:
Modulation Techniques:
Types:
1. Baseband Transmission:
o Example: Ethernet.
2. Broadband Transmission:
9. Multiplexing
Types:
1. Guided Media:
o Types:
2. Unguided Media:
o Wireless transmission.
o Types:
1. Causes of Errors:
o Noise.
o Signal attenuation.
o Hardware failures.
2. Types of Errors:
Error Detection:
1. Parity Check:
3. Checksum:
1. Hamming Code:
Network topology refers to the arrangement of devices (nodes) and connections in a network.
Types of Topologies:
1. Bus Topology:
o Advantages:
Easy to extend.
o Disadvantages:
2. Star Topology:
o Advantages:
Centralized management.
o Disadvantages:
3. Ring Topology:
o Advantages:
o Disadvantages:
Troubleshooting is complex.
4. Mesh Topology:
o Advantages:
5. Hybrid Topology:
o Advantages:
o Disadvantages:
Characteristics:
Advantages:
Disadvantages:
o Limited coverage.
Characteristics:
Advantages:
Disadvantages:
o Higher implementation cost than LAN.
o Maintenance complexity.
Characteristics:
Advantages:
Disadvantages:
5. Wireless Networks
Wireless networks use radio waves, microwaves, or infrared signals for communication.
Example: Wi-Fi.
Example: WiMAX.
6. Internet
The Internet is a global network that interconnects millions of private, public, academic, and business
networks.
Key Components:
1. IP Addressing:
Versions:
4. Protocols:
Global connectivity.
Purpose:
Key Features:
Each layer performs specific tasks and communicates with adjacent layers using standardized interfaces.
The OSI (Open Systems Interconnection) Model is a conceptual framework that standardizes network
communication.
1. Physical Layer:
o Functions:
Bit synchronization.
o Functions:
Framing.
3. Network Layer:
o Functions:
4. Transport Layer:
o Functions:
Error control.
5. Session Layer:
o Functions:
Dialog control.
6. Presentation Layer:
o Functions:
7. Application Layer:
The TCP/IP (Transmission Control Protocol/Internet Protocol) Model is a practical framework widely used for the
Internet.
4 Layers of TCP/IP:
2. Internet Layer:
o Functions:
3. Transport Layer:
o Protocols:
4. Application Layer:
Layers 7 4
Versions:
3. Port Address:
Types of Ports:
4. Specific Address:
Used for application-level addressing (e.g., URLs in DNS).
5. Switching Techniques
Types of Switching:
1. Circuit Switching:
o Advantages:
o Disadvantages:
2. Packet Switching:
o Advantages:
o Disadvantages:
3. Message Switching:
4. Cell Switching:
Definition: Framing is the process of encapsulating network data into frames for transmission at the Data
Link layer.
Functions:
Techniques:
Error Detection:
Error Correction:
3. Flow Control
Definition: Manages data flow between sender and receiver to prevent congestion or buffer overflow.
Techniques:
Definition: A flow control mechanism allowing multiple frames to be sent before acknowledgment.
Features:
Definition: A bit-oriented protocol for reliable data transmission at the Data Link layer.
Modes of Operation:
Features:
o Framing.
o Flow control.
Devices avoid collisions by waiting for a free medium and using acknowledgments.
3. Reservation:
4. Polling:
5. Token Passing:
Devices share the same frequency but use unique codes for separation.
7. Network Devices
Switch: Operates at the Data Link layer, forwarding frames based on MAC addresses.
8. Backbone Networks
Purpose:
Definition: Logical grouping of devices into separate broadcast domains within the same physical network.
Advantages:
o Improved security.
1. IPv4 Addressing:
Classes:
Classless (CIDR): Allows variable-length subnet masks for efficient address utilization.
Advantages:
Steps:
Routing Algorithms
Connection-oriented.
Connectionless.
1. Flow Control:
2. Error Control:
3. Congestion Control:
TCP mechanisms:
o Slow Start.
o Congestion Avoidance.
o Fast Recovery.
6. World Wide Web (WWW)
1. Uniform Resource Locator (URL)
Definition: A URL is the unique address used to access a resource on the World Wide Web.
Structure:
2. Domain Name: Identifies the server hosting the resource (e.g., www.example.com).
3. Path: Specifies the exact location of the resource on the server.
Example: /docs/index.html
4. Port (Optional): Specifies the communication port (default ports are 80 for HTTP and 443 for HTTPS).
5. Query String (Optional): Parameters passed to the server.
Example: ?id=123
Definition: DNS is a hierarchical naming system used to translate domain names into IP addresses and vice
versa.
Components:
Hierarchy:
Name to Address:
Address to Name:
o Reverse DNS lookup maps an IP address back to its domain name.
Architecture Overview:
User Agents (UA): Applications like Gmail, Outlook used to compose, send, and read emails.
4. Email Protocols
Features:
Features:
o Downloads emails to the client and usually deletes them from the server.
Purpose: Allows retrieval and management of emails while keeping them on the server.
Features:
5. TELNET
Definition: TELNET (Telecommunication Network) is a protocol for remote login and command execution.
Features:
Definition: FTP is used to transfer files between a client and a server over a network.
Features:
Modes:
Uses:
3. Secret-Key Algorithms
Definition:
Symmetric cryptographic algorithms where the same key is used for both encryption and
decryption.
Faster but less secure for large-scale systems due to key distribution challenges.
Examples:
1. DES (Data Encryption Standard):
o 56-bit key; now considered insecure.
2. AES (Advanced Encryption Standard):
o Secure and widely used; key sizes of 128, 192, or 256 bits.
3. RC4:
o Stream cipher; used in wireless security (e.g., WEP, WPA).
4. Blowfish:
o Fast and secure; used in password storage.
4. Public-Key Algorithms
Definition:
Asymmetric cryptographic algorithms using two keys: a public key (encryption) and a private key
(decryption).
Enables secure communication over insecure channels.
Examples:
1. RSA (Rivest-Shamir-Adleman):
o Based on factoring large prime numbers.
o Used in SSL/TLS for secure web communication.
2. Diffie-Hellman:
o Key exchange protocol.
o Establishes a shared secret over an insecure channel.
3. ECC (Elliptic Curve Cryptography):
o Efficient and secure for small devices.
5. Digital Signature
Definition:
A cryptographic mechanism to verify the authenticity and integrity of digital data.
Combines public-key cryptography and hash functions.
Components:
1. Signing:
o Sender encrypts the hashed message using their private key.
2. Verification:
o Receiver decrypts the signature using the sender's public key and compares it with the
computed hash.
Applications:
Authenticating emails (PGP, S/MIME).
Securing software distribution.
Verifying identity in e-commerce.
7. Firewalls
Definition:
A network security device or software that monitors and controls incoming and outgoing traffic
based on predefined rules.
Types:
1. Packet-Filtering Firewalls:
o Inspects packets based on headers (IP, ports, protocols).
2. Stateful Firewalls:
o Tracks active connections and applies rules accordingly.
3. Proxy Firewalls:
o Intermediates between users and external networks.
4. Next-Generation Firewalls (NGFW):
o Incorporates advanced features like intrusion prevention and application-level inspection.
Functions:
1. Block unauthorized access.
2. Monitor and log network traffic.
3. Protect against DoS/DDoS attacks.
8. Mobile technology
1. GSM (Global System for Mobile Communications)
Definition:
GSM is a standard for mobile communication widely used for voice and data services.
Key Features:
1. Digital Communication: Uses Time Division Multiple Access (TDMA) for channel access.
2. Frequency Bands: Operates in 900 MHz, 1800 MHz, and 1900 MHz bands.
Architecture:
o Components:
o Components:
Mobile Switching Center (MSC): Core network element for routing calls.
Definition:
CDMA is a channel access method where multiple users share the same frequency band using unique codes.
Key Features:
2. Soft Handoff:
4. No SIM Requirement:
Services:
1. Voice Services:
2. Data Services:
3. Supplementary Services:
1. Mobile Device:
2. Communication Network:
3. Middleware:
4. Mobile Applications:
Middleware:
Functions:
1. Data synchronization.
3. Session management.
Gateway:
Functions:
1. Protocol translation.
2. Load balancing.
3. Content adaptation.
Mobile IP:
Key Elements:
4. Tunneling:
o Comprises layers such as Radio Resource Management, Mobility Management, and Call Control.
Definition:
Types:
Applications:
1. Global communication.
2. GPS navigation.
Wireless Topologies:
1. Ad Hoc:
o Peer-to-peer communication.
2. Infrastructure:
3. Mesh:
Definition:
Cellular networks divide geographic areas into cells, each served by a base station.
Features:
1. Frequency reuse.
Definition:
Features:
1. Dynamic topology.
Wireless Transmission:
1. Radio Waves:
2. Microwaves:
3. Infrared:
Definition:
Techniques:
o Satellite-based.
2. Cellular Network Triangulation:
3. Wi-Fi Positioning:
12. GPRS (General Packet Radio Service) and SMS (Short Messaging Service)
GPRS:
1. Definition:
2. Features:
SMS:
1. Definition:
2. Features:
1. Cloud Computing
Definition:
Cloud computing delivers computing services such as servers, storage, databases, networking, software,
and analytics over the internet ("the cloud").
6. Database Storage
Definition:
Database storage in cloud computing involves storing structured or unstructured data in cloud-hosted
databases.
Examples:
Amazon RDS, Google Cloud Spanner, MongoDB Atlas.
Advantages:
1. Scalability and performance optimization.
2. Automated backups.
3. Real-time analytics.