Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
Chapter Notes - CH 8 - Communication and Network Concepts, Computer Science, Class 12 Class 12 Notes - EduRev
(/Subscription?
utm_source=top_banner_ad&utm_medium=edurev_website&utm_campaign=Limited_period_offer_banner_top)
Network
1. The collection of interconnected computers is called a computer networ
Fig: Network
Advantages:
(i) Data transmission rate is better than twisted pair cables.
(ii) It provides a cheap means of transporting multi-channel television s
metropolitan areas.
Disadvantages:
(i) Expensive than twisted pair cables.
(ii) Difficult to manage and reconfigure.
3. Optical fiber: - An optical fiber consists of thin glass fibers th
information in the form of visible light.
Fig: optical fibre
Advantages:
(i) Transmit data over long distance with high security.
(ii) Data transmission speed is high
(iii) Provide better noise immunity
(iv) Bandwidth is up to 10 Gbps.
Disadvantages:
(i) Expensive as compared to other guided media.
(ii) Need special care while installation?
4. Infrared: - The infrared light transmits data through the air and c
throughout a room, but will not penetrate walls. It is a secure med
transmission.
The infrared transmission has become common in TV remotes, automotive
wireless speakers etc.
5. Radio Wave: - Radio Wave an electromagnetic wave with a wavelengt
cm and 30,000m. The transmission making use of radio frequencies is term
radio-wave transmission
Fig: Modem
Fig: Topologies
The BUS Topology: - The bus topology uses a common single cable to c
workstations. Each computer performs its task of sending messages witho
the central server. However, only one workstation can transmit a message
time in the bus topology.
Advantages:
(i) Easy to connect and install.
(ii) Involves a low cost of installation time.
(iii) Can be easily extended.
Disadvantages:-
(i) The entire network shuts down if there is a failure in the central cable.
(ii) Only a single message can travel at a particular time.
(iii) Difficult to troubleshoot an error.
Advantages:
(i) Eliminates network congestion.
(ii) The network can be easily extended.
(iii) Faulty nodes can easily be isolated from the rest of the network.
Disadvantages:
(i) Uses large cable length.
(ii) Requires a large amount of hardware components and hence is expensiv
(iii) Installation and reconfiguration is very difficult.
Types of Networks:
LAN (Local Area Network): A Local Area Network (LAN) is a ne
confined to a relatively small area. It is generally limited to a geographic
writing lab, school or building. It is generally privately owned networks o
not more than 5 Km.
MAN (Metropolitan Area Network): MAN is the networks cover a gr
corporate offices or a city and might be either private or public.
WAN (Wide Area Network): These are the networks spread over large
across countries or even continents through cabling or satellite uplinks are
PAN (Personal Area Network): A Personal Area Network is computer netw
around an individual person. It generally covers a range of less than 10 me
Area Networks can be constructed with cables or wirelessly.
Network protocol
1. A protocol means the rules that are applicable for a network.
2. It defines the standardized format for data packets, techniques for
correcting errors and so on.
3. A protocol is a formal description of message formats and the rules tha
machines
4. must follow to exchange those messages.
5. E.g. using library books.
Types of protocols are:
1. HTTP
2. FTP
3. TCP/IP
4. SLIP/PPP
Hypertext Transfer Protocol (HTTP) is a communications protocol for
information on the intranet and the World Wide Web. HTTP is a req
standard between a client and a server. A client is the end-user; the server i
FTP (File Transfer Protocol) is the simplest and most secure way to
over the Internet. The objectives of FTP are:
1. To promote sharing of files (computer programs and/or data).
2. To encourage indirect or implicit use of remote computers.
3. To shield a user from variations in file storage systems among differen
4. To transfer data reliably, and efficiently.
TCP/IP (Transmission Control Protocol / Internet Protocol)
TCP - is responsible for verifying the correct delivery of data from client t
can be lost in the intermediate network. TCP adds support to detect error
and to trigger retransmission until the data is correctly and completely rece
IP - is responsible for moving packet of data from node to node. IP forward
based on a four byte destination address (the IP number). The Internet auth
ranges of numbers to different organizations. The organizations assign g
numbers to departments. IP operates on gateway machines that mo
department to organization to region and then around the world.
Telnet-
It is an older internet utility that lets us log on to remote computer s
facilitates for terminal emulation purpose. Terminal emulation means usi
mainframe computer through networking.
Wireless/Mobile Computing
Wireless communication is simply data communication without the use
Mobile computing means that the computing device is not continuously co
base or central network.
Worms: Worms are also self- replicating programs that do not create mul
itself on one computer but propagate through the computer network. Wo
computer systems using the username and passwords and exploit the system
Trojan horse: - Though it is a useful program, however, a cracker can us
the computer system in order to exploit the resources. Such a program can
the computer through an email or free programs downloaded through the In
Spams: Unwanted e-mail (usually of a commercial nature sent out in bulk)
Cookies: Cookies are the text messages sent by a web server to the
primarily for identifying the user.
Firewall: A firewall is used to control the traffic between computer
intercepts the packets between the computer networks and allows on
packets to pass.
Cyber Law: Cyber law refers to all the legal and regulatory aspects of In
World Wide Web.
Cyber Crimes: Cyber crime involves the usage of the computer sys
computer network for criminal activity.
Hacking: Hacking is an unauthorized access to computer in order t
resources.
Web Services:
WWW: The World Wide Web or W3 or simply the Web is a collect
documents or pages, stored on millions of computers and distributed across
HTML (Hyper Text Markup Language):- HTML is a computer
describes the structure and behavior of a web page. This language is used
pages.
XML (eXtensible Markup Language):- Extensible Markup Languag
meta language that helps to describe the markup language.
HTTP (Hyper Text Transfer Protocol):- A protocol to transfer hype
and information between servers and browsers.
Domain Names: A domain name is a unique name that identifies a part
and represents the name of the server where the web pages reside.
URL:- The Uniform Resource Locator is a means to locate resources such
on the Internet. URL is also a method to address the web pages on the Inter
two types of URL, namely, absolute URL and relative URL.
Website: A collection of related web pages stored on a web server is known
Web browser: A software application that enables to browse, searc
information from the Web is known as Web browser.
Web Servers: The web pages on the Internet are stored on the comp
connected to the Internet. These computers are known as web servers.
Web Hosting: - Web Hosting or website hosting is the service to ho
maintain the websites on the World Wide Web.
Web Scripting: - The process of creating and embedding scripts in a web
as Web
Scripting. Types of Scripts:-
(i) Client Side Scripts: - Client side scripts supports interaction within a
VB Script, Java Script, PHP (PHP‟S Hypertext Preprocessor).
(ii) Server Side Scripts: - Server side scripting supports execution at
E.g. ASP, JSP, PHP
OPEN SOURCE TERMINOLOGIES
Free Software: The S/W’s is freely accessible and can be freely used chan
copied and distributed by all and payments are needed to make for free S/W
Open Source Software: S/w whose source code is available to the custom
be modified and redistributed without any limitation .OSS may come fr
nominal charges has to pay nominal charges (Support of S/W and developm
FLOSS (Free Libre and Open Source Software) : S/w which is free a
source S/W. ( Free S/W + Open Source S/W).
GNU (GNU’s Not Unix) : GNU project emphasize on the freedom and its
create a system compatible to UNIX but not identical with it.
FSF (Free Software Foundation) : FSF is a non –profit organization c
purpose of the free s/w movement. Organization funded many s/w devel
free software.
OSI (Open Source Initiative) : Open source software organization dedi
of promoting open source software it specified the criteria of OSS and its
not freely available.
W3C(World Wide Web Consortium) : W3C is responsible for p
software standards for World Wide Web.
Proprietary Software: Proprietary Software is the s/w that is neither o
available, normally the source code of the Proprietary Software is not
further distribution and modification is possible by special permission by th
Freeware: Freeware are the software freely available , which permit redi
not modification (and their source code is not available). Freeware is
Binary Form (ready to run) without any licensing fees.
Shareware: Software for which license fee is payable after some time lim
code is not available and modification to the software are not allowed.
Localization: localization refers to the adaptation of language, content
reflect local cultural sensitivities .e.g. Software Localization: where me
program presents to the user need to be translated into various languages.
Internationalization: Opposite of localization.
Upgrade (/Subscription?utm_medium=website&utm_source=upgrade_btn_cnt_page_ftr&utm_campai
U P N E XT >
(https://edurev.in/studytube/CBSE-Sample-Question-Paper-Computer-Science-2017-1/5fde550c-55c2-4ae5-846
courseId=-1)
C O N T E N T D E TA I L S
Views: 90.9K Rating: 4.8 (1316) Nov 29, 2016 Class 12 (/search/Class 12)
Download
SHARED BY
what are the components required for networking Related: Chapter Notes - C... more (/question/977283/what-are
required-for-networking-Re)
1 Answer
what is ethernet Related: Chapter Notes - Ch 8 - Communication and Network... more (/question/1363094/what-
Chapter-Notes-Ch-8-Commu)
1 Answer
what is spyway Related: Chapter Notes - Ch 8 - Communication and Network C... more (/question/1109128/wha
-Chapter-Notes-Ch-8-Communi)
1 Answer
are these note sufficient for cbse exam? Related: Chapter Notes - Ch 8 - C... more (/question/1108537/are-these
cbse-exam--Related--)
1 Answer
What is PPP Related: Chapter Notes - Ch 8 - Communication and Network Conc... more (/question/891049/Wha
Chapter-Notes-Ch-8-Communicat)
1 Answer