Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev

Download as pdf or txt
Download as pdf or txt
You are on page 1of 20

x

Get access to all premium tests, videos, and docs in 999/-


Offer Ends in 24:38:25

(/Subscription?
utm_source=top_banner_ad&utm_medium=edurev_website&utm_campaign=Limited_period_offer_banner_top)

Search for anything...


EduRev
(/home)
Courses

Chapter Notes - Ch 8 - Communication and Network


Concepts, Computer Science, Class 12
Created by: Anant Ahuja (/508199?public=tr…

Network
1. The collection of interconnected computers is called a computer networ

Fig: Network

2. Two computers are said to be interconnected if they are capable o


exchanging information.
Need
1. Resource Sharing
2. Reliability
3. Cost Factor
4. Communication Medium
Resource Sharing means to make all programs, data and peripheral
anyone on the network irrespective of the physical location of the reso
user.
Reliability means to keep the copy of a file on two or more different m
one of them is unavailable (due to some hardware crash or any other)
copy can be used. Cost factor means it greatly reduces the cost since
can be shared Communication Medium means one can send messages
the changes at one end are done can be immediately noticed at another
Evolution of Networking
1. ARPANET: In 1969, The US govt. formed an agency named ARPAN
Research Projects Agency NETwork) to connect computers at various un
defense agencies. The main objective of ARPANET was to develop a netw
continue to function efficiently even in the event of a nuclear attack.
Fig: ARPANET

2. Internet (INTERconnection NETwork): The Internet is a worldwi


computer networks. It is not owned by anybody.
3. Interspace:InterSpace is a client/server software program that allows
to communicate online with real – time audio, video and text chat in
environments.
SWITCHING TECHNIQUES
Switching techniques are used for transmitting data across networks.
Different types are :
1. Circuit Switching: In the Circuit Switching technique, first, the comple
transmission path between the source and the destination computers is es
then the message is transmitted through the path. The main advantage of
is guaranteed delivery of the message. Mostly used for voice communication
2. Message Switching: In the Message switching technique, no ph
established between sender and receiver in advance. This technique follows
forward mechanism.
3. Packet Switching: In this switching technique fixed size of p
transmitted across the network.
Fig: Comparison between various switching
techniques

DATA COMMUNICATION TERMINOLOGIES


Data channel :- The information / data carry from one end to an
network by channel. Baud & bits per second (bps) :- It’s used to m
for the information carry of a communication channel.
Measurement Units :- bit
1 Byte= 8 bits
1 KBPS ( Kilo Byte Per Second)= 1024 Bytes
1 Kbps (kilobits Per Second) = 1024 bits
1 Mbps ( Mega bits Per Second )=1024 Kbps
Bandwidth :- It is amount of information transmitted or recei
time.
Transmission media:
1. Twisted pair cable: - It consists of two identical 1 mm thick copper w
and twisted together. The twisted pair cables are twisted in order to reduce
electromagnetic induction.
Advantages:
(i) It is easy to install and maintain.
(ii) It is very inexpensive
Disadvantages:
(i) It is incapable to carry a signal over long distances without the use of rep
(ii) Due to low bandwidth, these are unsuitable for broadband applications.
2. Co-axial Cables: It consists of a solid wire core surrounded by one o
braided wire shields, each separated from the other by some kind of plastic
mostly used in the cable wires.

Fig: coaxial cable

Advantages:
(i) Data transmission rate is better than twisted pair cables.
(ii) It provides a cheap means of transporting multi-channel television s
metropolitan areas.
Disadvantages:
(i) Expensive than twisted pair cables.
(ii) Difficult to manage and reconfigure.
3. Optical fiber: - An optical fiber consists of thin glass fibers th
information in the form of visible light.
Fig: optical fibre

Advantages:
(i) Transmit data over long distance with high security.
(ii) Data transmission speed is high
(iii) Provide better noise immunity
(iv) Bandwidth is up to 10 Gbps.
Disadvantages:
(i) Expensive as compared to other guided media.
(ii) Need special care while installation?
4. Infrared: - The infrared light transmits data through the air and c
throughout a room, but will not penetrate walls. It is a secure med
transmission.
The infrared transmission has become common in TV remotes, automotive
wireless speakers etc.
5. Radio Wave: - Radio Wave an electromagnetic wave with a wavelengt
cm and 30,000m. The transmission making use of radio frequencies is term
radio-wave transmission

Fig: Radio wave


Advantages:
(i) Radio wave transmission offers mobility.
(ii) It is cheaper than laying cables and fibers.
(iii) It offers ease of communication over difficult terrain.
Disadvantages:
(i) Radio wave communication is insecure communication.
(ii) Radio wave propagation is susceptible to weather effects like rains, th
etc.
6. Microwave Wave: - The Microwave transmission is a line of sight
Microwave signals travel at a higher frequency than radio waves and are p
for transmitting data over long distances.
Advantages:
(i) It is cheaper than laying cable or fiber.
(ii) It has the ability to communicate over oceans.
Disadvantages:
(i) Microwave communication is an insecure communication.
(ii) Signals from antenna may split up and transmitted in different wa
antenna which leads to reduce to signal strength.
(iii) Microwave propagation is susceptible to weather effects like rains, th
etc.
(iv) Bandwidth allocation is extremely limited in case of microwaves.
7. Satellite link: - The satellite transmission is also a kind of line of sigh
that is used to transmit signals throughout the world.
Advantages:
(i) Area covered is quite large.
(ii) No line of sight restrictions such as natural mountains, tall building, tow
(iii) Earth station which receives the signals can be fixed position or relative
Disadvantages:-
(i) Very expensive as compared to other transmission mediums.
(ii) Installation is extremely complex.
(iii) Signals sent to the stations can be tampered by external interference.
Network devices:
Modem: A MODEM (MOdulator DEModulator) is an electronic device t
computer to transmit data over telephone lines. There are two types of mod
internal modem and external modem.

Fig: Modem

RJ45 connector: - The RJ-45(Registered Jack) connectors are the plug-in


in the networking and telecommunications applications. They are used
connecting LANs, particularly Ethernet.
Ethernet Card: - It is a hardware device that helps in connection of n
network.
Hub: A hub is a hardware device used to connect several computers toget
be either active or passive. Hubs usually can support 8, 12 or 24 RJ45 ports
Switch: A switch (switching hub) is a network device which is used to
computers or devices on a network. It filters and forwards data packets acr
The main difference between hub and switch is that hub replicates what
one port onto all the other ports while switch keeps a record of the MAC ad
devices attached to it.
Gateway: A gateway is a device that connects dissimilar networks.
Repeater: A repeater is a network device that amplifies and restores si
distance transmission.

Network topologies and types


Topology :
Topology refers to the way in which the workstations attached to the
interconnected.

Fig: Topologies

The BUS Topology: - The bus topology uses a common single cable to c
workstations. Each computer performs its task of sending messages witho
the central server. However, only one workstation can transmit a message
time in the bus topology.
Advantages:
(i) Easy to connect and install.
(ii) Involves a low cost of installation time.
(iii) Can be easily extended.
Disadvantages:-
(i) The entire network shuts down if there is a failure in the central cable.
(ii) Only a single message can travel at a particular time.
(iii) Difficult to troubleshoot an error.

The STAR Topology: - A STAR topology is based on a central node which


A STAR topology is common in homes networks where all the computers c
single central computer using it as a hub.
Advantages:
(i) Easy to troubleshoot
(ii) A single node failure does not affect the entire network.
(iii) Fault detection and removal of faulty parts is easier.
(iv) In case a workstation fails, the network is not affected.
Disadvantages:-
(i) Difficult to expand.
(ii) Longer cable is required.
(iii) The cost of the hub and the longer cables makes it expensive over other
(iv) In case hub fails, the entire network fails.

The TREE Topology: - The tree topology combines the characteristics of


and the star topologies. It consists of groups of star – configured workstati
to a bus backbone cable.
Fig: Tree Topology

Advantages:
(i) Eliminates network congestion.
(ii) The network can be easily extended.
(iii) Faulty nodes can easily be isolated from the rest of the network.
Disadvantages:
(i) Uses large cable length.
(ii) Requires a large amount of hardware components and hence is expensiv
(iii) Installation and reconfiguration is very difficult.
Types of Networks:
LAN (Local Area Network): A Local Area Network (LAN) is a ne
confined to a relatively small area. It is generally limited to a geographic
writing lab, school or building. It is generally privately owned networks o
not more than 5 Km.
MAN (Metropolitan Area Network): MAN is the networks cover a gr
corporate offices or a city and might be either private or public.
WAN (Wide Area Network): These are the networks spread over large
across countries or even continents through cabling or satellite uplinks are
PAN (Personal Area Network): A Personal Area Network is computer netw
around an individual person. It generally covers a range of less than 10 me
Area Networks can be constructed with cables or wirelessly.
Network protocol
1. A protocol means the rules that are applicable for a network.
2. It defines the standardized format for data packets, techniques for
correcting errors and so on.
3. A protocol is a formal description of message formats and the rules tha
machines
4. must follow to exchange those messages.
5. E.g. using library books.
Types of protocols are:
1. HTTP
2. FTP
3. TCP/IP
4. SLIP/PPP
Hypertext Transfer Protocol (HTTP) is a communications protocol for
information on the intranet and the World Wide Web. HTTP is a req
standard between a client and a server. A client is the end-user; the server i
FTP (File Transfer Protocol) is the simplest and most secure way to
over the Internet. The objectives of FTP are:
1. To promote sharing of files (computer programs and/or data).
2. To encourage indirect or implicit use of remote computers.
3. To shield a user from variations in file storage systems among differen
4. To transfer data reliably, and efficiently.
TCP/IP (Transmission Control Protocol / Internet Protocol)
TCP - is responsible for verifying the correct delivery of data from client t
can be lost in the intermediate network. TCP adds support to detect error
and to trigger retransmission until the data is correctly and completely rece
IP - is responsible for moving packet of data from node to node. IP forward
based on a four byte destination address (the IP number). The Internet auth
ranges of numbers to different organizations. The organizations assign g
numbers to departments. IP operates on gateway machines that mo
department to organization to region and then around the world.

Telnet-
It is an older internet utility that lets us log on to remote computer s
facilitates for terminal emulation purpose. Terminal emulation means usi
mainframe computer through networking.
Wireless/Mobile Computing
Wireless communication is simply data communication without the use
Mobile computing means that the computing device is not continuously co
base or central network.

Fig: Mobile computing


1. GSM(Global System for Mobile communication): it is leading d
system. In covered areas, cell phone users can buy one phone that will wo
the standard is supported. It uses narrowband TDMA, which allows eight
calls on the same radio frequency.
2. CDMA(Code Division Multiple Access): it is a digital cellular techno
spreadspectrum techniques. CDMA does not assign a specific frequency
Instead ,every channel uses the full available spectrum.

3. WLL(Wireless in Local Loop) : WLL is a system that connects subs


public switched telephone network using radio signals as a substitu
connecting media.
4. Email(Electronic Mail): Email is sending and receiving messages by c
5. Chat: Online textual talk in real time , is called Chatting.
6. Video Conferencing: a two way videophone conversation am
participants is called video conferencing.
7. SMS(Short Message Service): SMS is the transmission of short tex
and from a mobile pone, fax machine and or IP address.
8. 3G and EDGE: 3G is a specification for the third generatio
communication of mobile communication technology. 3G promises increas
up to 384 Kbps when a device is stationary.
EDGE(Enhanced Data rates for Global Evolution ) is a radio bas
mobile data standard.

Network Security Concepts:


Viruses: Viruses are programs which replicate and attach to other progra
corrupt the executable codes. Virus enters the computer system throug
source and become destructive.
Fig: Virus

Worms: Worms are also self- replicating programs that do not create mul
itself on one computer but propagate through the computer network. Wo
computer systems using the username and passwords and exploit the system
Trojan horse: - Though it is a useful program, however, a cracker can us
the computer system in order to exploit the resources. Such a program can
the computer through an email or free programs downloaded through the In
Spams: Unwanted e-mail (usually of a commercial nature sent out in bulk)
Cookies: Cookies are the text messages sent by a web server to the
primarily for identifying the user.
Firewall: A firewall is used to control the traffic between computer
intercepts the packets between the computer networks and allows on
packets to pass.
Cyber Law: Cyber law refers to all the legal and regulatory aspects of In
World Wide Web.
Cyber Crimes: Cyber crime involves the usage of the computer sys
computer network for criminal activity.
Hacking: Hacking is an unauthorized access to computer in order t
resources.

Web Services:
WWW: The World Wide Web or W3 or simply the Web is a collect
documents or pages, stored on millions of computers and distributed across
HTML (Hyper Text Markup Language):- HTML is a computer
describes the structure and behavior of a web page. This language is used
pages.
XML (eXtensible Markup Language):- Extensible Markup Languag
meta language that helps to describe the markup language.
HTTP (Hyper Text Transfer Protocol):- A protocol to transfer hype
and information between servers and browsers.
Domain Names: A domain name is a unique name that identifies a part
and represents the name of the server where the web pages reside.
URL:- The Uniform Resource Locator is a means to locate resources such
on the Internet. URL is also a method to address the web pages on the Inter
two types of URL, namely, absolute URL and relative URL.
Website: A collection of related web pages stored on a web server is known
Web browser: A software application that enables to browse, searc
information from the Web is known as Web browser.
Web Servers: The web pages on the Internet are stored on the comp
connected to the Internet. These computers are known as web servers.
Web Hosting: - Web Hosting or website hosting is the service to ho
maintain the websites on the World Wide Web.
Web Scripting: - The process of creating and embedding scripts in a web
as Web
Scripting. Types of Scripts:-
(i) Client Side Scripts: - Client side scripts supports interaction within a
VB Script, Java Script, PHP (PHP‟S Hypertext Preprocessor).
(ii) Server Side Scripts: - Server side scripting supports execution at
E.g. ASP, JSP, PHP
OPEN SOURCE TERMINOLOGIES
Free Software: The S/W’s is freely accessible and can be freely used chan
copied and distributed by all and payments are needed to make for free S/W
Open Source Software: S/w whose source code is available to the custom
be modified and redistributed without any limitation .OSS may come fr
nominal charges has to pay nominal charges (Support of S/W and developm
FLOSS (Free Libre and Open Source Software) : S/w which is free a
source S/W. ( Free S/W + Open Source S/W).
GNU (GNU’s Not Unix) : GNU project emphasize on the freedom and its
create a system compatible to UNIX but not identical with it.
FSF (Free Software Foundation) : FSF is a non –profit organization c
purpose of the free s/w movement. Organization funded many s/w devel
free software.
OSI (Open Source Initiative) : Open source software organization dedi
of promoting open source software it specified the criteria of OSS and its
not freely available.
W3C(World Wide Web Consortium) : W3C is responsible for p
software standards for World Wide Web.
Proprietary Software: Proprietary Software is the s/w that is neither o
available, normally the source code of the Proprietary Software is not
further distribution and modification is possible by special permission by th
Freeware: Freeware are the software freely available , which permit redi
not modification (and their source code is not available). Freeware is
Binary Form (ready to run) without any licensing fees.
Shareware: Software for which license fee is payable after some time lim
code is not available and modification to the software are not allowed.
Localization: localization refers to the adaptation of language, content
reflect local cultural sensitivities .e.g. Software Localization: where me
program presents to the user need to be translated into various languages.
Internationalization: Opposite of localization.

Related Document: CBSE Sample Question Paper Computer Science - 2017


(https://edurev.in/studytube/CBSE-Sample-Question-Paper-Computer-Sci
1/5fde550c-55c2-4ae5-846f-fab29d4cd972_p?courseId=-1)

Previous Doc (https://edurev.in/studytube/Chapter-7-Boolean-Algebra--Chapter-Notes--Class-12/2386

Download this Doc Join discussion (/group/29/Class-12)

Upgrade (/Subscription?utm_medium=website&utm_source=upgrade_btn_cnt_page_ftr&utm_campai

Next Doc (https://edurev.in/studytube/CBSE-Sample-Question-Paper-Computer-Science-2017-1/5fde

U P N E XT >
(https://edurev.in/studytube/CBSE-Sample-Question-Paper-Computer-Science-2017-1/5fde550c-55c2-4ae5-846
courseId=-1)

CBSE Sample Question Paper Computer Science - 2017 - 18 (https://edurev.in/studytube


Question-Paper-Computer-Science-2017-1/5fde550c-55c2-4ae5-846f-fab29d4cd972_p?c
Doc | 15 pages
< PREVIOUS
(https://edurev.in/studytube/Chapter-7-Boolean-Algebra--Chapter-Notes--Class-12/238677ed-448e-47c8-97b6-c
courseId=-1)

Chapter 7 - Boolean Algebra, Chapter Notes, Class 12, Computer Science


(https://edurev.in/studytube/Chapter-7-Boolean-Algebra--Chapter-Notes--Class-12/238677
97b6-c4ed71b6e87f_t?courseId=-1)
Doc | 9 pages

C O N T E N T D E TA I L S

Views: 90.9K Rating: 4.8 (1316) Nov 29, 2016 Class 12 (/search/Class 12)

Download

SHARED BY

Anant Ahuja (/508199?public=t…

QUESTIONS & ANSWERS

Need something else?

DISCUSSION ON CHAPTER NOTES - CH 8 - COMMUNICATION AND NETWORK CONCEPTS, COMPUTER S


(HTTPS://EDUREV.IN/QUESTION/1608720/EXPLAIN-THE-FUNCTION-OF-SERVER-AND-CLIENT-IN-A-NET)

Share your opinion in a comment...


R E L AT E D Q U E S T I O N S

what are the components required for networking Related: Chapter Notes - C... more (/question/977283/what-are
required-for-networking-Re)

1 Answer

what is ethernet Related: Chapter Notes - Ch 8 - Communication and Network... more (/question/1363094/what-
Chapter-Notes-Ch-8-Commu)

1 Answer

what is spyway Related: Chapter Notes - Ch 8 - Communication and Network C... more (/question/1109128/wha
-Chapter-Notes-Ch-8-Communi)

1 Answer

are these note sufficient for cbse exam? Related: Chapter Notes - Ch 8 - C... more (/question/1108537/are-these
cbse-exam--Related--)

1 Answer

What is PPP Related: Chapter Notes - Ch 8 - Communication and Network Conc... more (/question/891049/Wha
Chapter-Notes-Ch-8-Communicat)

1 Answer

About Us (/aboutus) EduRev App (/android) Copyright - 2015-19


FAQs (/faq) Pricing (/subscription)

You might also like