Computer Networks Notes
Computer Networks Notes
COMPUTER SCIENCE-XII
UNIT- II, COMPUTER NETWORKS-10 MARKS
Page 1 of 18
Circuit Switching : In this technique ,first the complete physical connection between two computers is
established and then data are transmitted from the source computer to the destination computer. This
technique provides end to end connection between computer before any data can be sent. It is
designed for voice communication.
Message Switching : It is similar to post office mailing system. In this technique, the source computer
sends data or the message to the switching office first, which stores the data in its buffer and then it
looks for a free link to another switching office and then sends the data to this office. This process is
continued until the data are delivered to the destination computers.
In this case the data access time is more because data packets are stored on the disc.
Packet Switching : In this technique, messages are broken into packets and send across the network
and they are collected and assembled at the destination. In this technique, the data access time is less
because the packets are stored in the main memory.
(OR)
In packet switching, a fixed size of data packet that can be transmitted across the network is specified
and then the data packets are sent through switching stations to the final destination. All the packets
are stored in the main memory instead of disk. As a result accessing time of packets is reduced.
Data communication Terminologies :
1. Data channel/Communication Channel/Transmission Media :
The medium through which data are transferred from one location to another.
Different communication media are :
(i) Twisted pair cable
(ii) Coaxial cable
(iii) Optical Fiber Guided Media
(iv) Ethernet cable
(v) Radio Wave
(vi) Micro Wave Unguided Media
(vii) Satellite
(viii) Infrared
2. Baud : It describes the rate of change of signal on the line i.e. how many times (per second) the
signal changes its pattern. ( 1 baud =1 bps (bits per second))
3. Band width : It is the difference between the highest and lowest frequencies of the transmission
channel.
In digital system , Band width is data speed in bps
In analog system, it is measured in Hertz.
4. Data transfer Rate : It represents the amount of data transferred per second by a
communication channel. It is measured kbps( killo bits per second),Kbps( killo bytes per
second),mbps, Mbps, gbps, Gbps, tbps,Tbps.
Transmission Media :
1. Twisted pair cable :
It consists of two identical wires wrapped together in a double helix.
It is used for telephone wiring
Merits :
1. It is very simple.
2. It is easy to install and maintain.
3. It is physically flexible.
Page 2 of 18
4. It has light weight.
5. It can be easily connected.
6. It is very inexpensive (i.e. cheap).
Demerits
1. Low Bandwidth
2. Easily pickup noise signals
3. It is incapable carrying a signal over long distance without the use of repeaters.(100
meter limit)
2. Coaxial cable : It contains two conductors that are parallel to each other.
Merits :
1. The data transmission of coaxial cables are better than of twisted pair cable.
(Higher band width)
2. They are used in cable networks and long distance telephone lines.
3. They are used for broadband transmission.
4. Offer higher bandwidth up to 400 Mbps
Demerits :
1. More expensive than twisted pair cable
2. They are not compatible with twisted pair cables
3. Optical Fibers :
Merits :
1. High bandwidth
2. Noise resistance
3. Zero electrical interference and complete electrical isolation.
4. Information is travelling on a modulated light beam.
5. They are used for broadband transmission where several channels are handled in parallel.
6. It is a secure transmission,
7. It is suitable for harsh industrial environments.
Demerits:
1. High cost (i.e. most expensive)
2. Difficult to install
3. Difficult for solder
4. Connection losses are common problem
5. Connecting two fibers together is a difficult process.
Ethernet Cable : An Ethernet cable is used on a wired networks. It connect devices within a local area
network like PC’s, routers and switches within a local area network. These cables are
limited by length and durability. If a network cable is too long or of poor quality, it won’t
carry a good network signals
Radio Wave :
Merits :
1. Radio wave transmission offers mobility.
2. It is cheaper than other media
3. It offers freedom from land owners right.
4. It penetrate the buildings.
Page 3 of 18
5. It is omnidirectional.
6. It is used for long distance communication.
Demerits :
1. It is an insecure communication.
2. It is susceptible to weather effects like rains, thunder, storms etc.
Micro Wave : it is an electromagnetic wave in the frequency range of about 1 to 300 GHz. It
transmits voice and data at 45 Mbps through the atmosphere. It is unidirectional.
Merits :
1. It is used to wide band communication system( telephone system, television transmission)
2. It is cheaper
3. Easy of communication
4. It offers freedom from land owner right.
5. It can communicate over oceans.
Demerits :
1. It is an insecure communication.
2. It cannot penetrate walls.
3. It has high cost of design, implementation and maintenance.
4. It has limited bandwidth allocation.
5. The signal strength may be reduced due to setting of antenna.
6. It is susceptible to weather effects like rains, thunder, storms etc.
Satellite :
Merits :
1. It covers large area.
2. It is useful for sparsely populated areas.
3. It is a commercial attractive.
4. It is a secure communication.
Demerits :
1. Very high cost
2. High atmospheric losses above 30 GHz limit carrier frequencies.
Note : The other communication Media are Infrared, Laser, Bluetooth, WIFI and Ethernet
Cable( are connect network devices such as MODEM, Router and adapters)
Infrared Waves :
Infrared waves, with frequencies from 300 GHz to 400 GHz, can be used for short-range
communication. They have high frequencies and cannot penetrate walls.
NETWORK DEVICES:
1. MODEM (Modulator-Demodulator) :Modulator convert a digital signal to analog signal and
demodulator convert an analog signal into digital signal.
A Modem is a computer peripheral that allows to connect and communicate with other
computers via telephone lines.
2. RJ-45 (Registered Jack -45) It is an 8 wire connector which is used to connect computers on the
local area network.
Page 4 of 18
3. Ethernet card( LAN card) : It is a hardware device that helps in connection of nodes within a
network.
4. Hub : It is a hardware device used to connect several computers together.
Two types of Hub :
(i) Active Hub: It provide path for the data signals and strengthen the signals
before sending to their destination. They are called repeaters.
(ii) Passive Hub: They have nothing to do with modifying the signals.
5. Switch : A switch is a device that is used to segment networks into different sub networks
called subnets or LAN segments.
6. Repeater : It is a device that amplifies a signal being transmitted on the network. It is used
for long distance transmission (i.e. above 70 meters)
7. Bridge: It is device that is used to connect two networks using in same topology and
same protocols.
8. Router : It is a device that is used to connect two networks using same topology
and different protocols.
9. Gateway: It is a device that is used to connect dissimilar network
( i.e. different topology and different protocols)
WAN: The network spread across the countries is known as WANs. A WAN is a group of computers that
are separated by large distances and tied together. (Example : Internet)
Properties :
a) Span entire countries
b) Use point-to-point link except satellite network
c) Rate of data transmission is slow.
d) Owned by multiple organization.
e) Low reliability(high error rates)
MAN : These are the networks that link computer facilitates within the city or town.( ie. Maximum 20
Kms of Diameter).It is in between LAN and WAN. It is a network that covers an entire city but uses LAN
technology.
Example : An organization can have multiple branches in the same city, One being the headquarter
building and other being normal offices in the same city.
Page 5 of 18
PAN : It is the interconnection of information technology devices within the range of an individual person
i.e. within a range of 10 meters. Example : Wifi, Hotspot, Bluetooth
NETWORK TOPOLOGIES :
The pattern of interconnection of nodes in a network is called the topology.
Types of topologies : 1. Star Topology 2. Bus(Linear) Topology 3. Tree Topology
STAR TOPOLOGY
It consists of a central node (Hub of Star) to which all other nodes are connected by a single path.
Advantages :
i) Short cable length and less cabling cost.(i.e. less installation cost)
ii) Resilient Architecture
iii) Easy to Extend
Disadvantages :
i) Fault diagnosis is difficult.
ii) Fault isolation is difficult.(if a node is faulty on the bus , it must be rectified at the point where
the node is connected to the network)
iii) Repeater configuration
iv) Only a single message can travel at a time.
v) When a message from 2 nodes come on the line, a collision occurs.
vi) A break or short circuit in the cable can halt the whole network.
TREE TOPOLOGY : A variation of bus topology is the tree topology. The shape of the network is that of an
inverted tree with the central root branching and sub branching to the extremities of the network.
Page 6 of 18
Advantages :
i) Easy to extend
ii) Very good for office automation
iii) Stimulates(control) hierarchical flow of data
Disadvantages:
i) Long cable length and more cabling cost
ii) Root dependency
iii) If an intermediate node is faulty, all the nodes after hat node not work.
COMMUNICATION PROTOCOLS :
A protocol means the rules that are applicable for a network. It defines standardized formats for data
packets, techniques for detecting and correcting errors and so on.
(OR)
A protocol is a formal description of message formats and the rules that two or more machines must
follow to exchange those messages.
Types of protocols :
1. HTTP(Hyper Text Transfer Protocol) : is the set of rules for transferring hypertext (i.e. text, graphic,
image, sound, video etc) on WWW (world wide web)
2. FTP(File Transfer Protocol) is a standard for the exchange of files across Internet.
It is used to transfer files from one network/system to another network/system. It goes by the name
ftp followed by address of another site and press enter.
3. TCP/IP(Transmission Control Protocol/Internet Protocol) : is a collection of protocols that govern
the way data travels from one machine to another across network.
TCP is used breaking of data in various packets.
IP is used to decide the contents of packets
4. PPP/SLIP(Point to Point Protocol/Serial Line Internet Protocol) : It is a communication protocol used
to connect computers to remote networking services including Internet service providers.
It is used to establish a direct connection between two nodes. It is used to connect the Home PC
to the server of ISP through high speed MODEM. It allows a computer to use the TCP/IP protocol and
to be connected directly to the Net using standard voice telephone line and high speed MODEM.
5. VOIP(Voice Over Internet Protocol) : It is a technology that enables voice communications over the
internet through the compression of voice into data packets that can be transmitted over data
networks and then converted back into voice at the other end.
It refers to a way to carry telephone calls over an IP data network
(OR)
It is a communication protocols and transmission technologies for delivery of voice communications
and multimedia sessions over the Internet Protocols network such as Internet.
Page 7 of 18
6. Video Conferencing Protocol : ( H.323 and SIP ) : H.323 is a standard that specifies the components,
protocols and procedures that provide multimedia communication services (i.e. real time audio,
video, and data communications) over packet based networks including Internet.
SIP( Session Initiation Protocol) is used to establish, modify and terminate VOIP telephone calls.
7. Chat Protocol IRC(Internet Relay Chat) : It is a simple, text-based conferencing protocol, involving a
number of users spread across a number of interconnected servers.
8. POP(post office protocols) : It is used to receive e-mail from a remote server over a TCP/IP
connection.
9. POP3(Post Office protocol version 3): It allow an e-mail client to download an e-mail server.
10. SMTP( Simple Mail transfer Protocol) : It is used when e-mail is delivered from an e-mail client to an
e-mail server.
(OR)
It is used when email is delivered from one e-mail server to another.
11. Remote login(Telnet) :Telnet is a network protocol used on the internet or on the local area network
to provide by directional interactive text, orientated communication facility using a virtual terminal
connection.
Telnet is the internet facility that facilitates remote login. It means to connect the network at
remote station without any network.
WIRELESS / MOBILE COMMUNICATION :
It transport electromagnetic waves without using a physical conductor. The signals are broad cast
through air or water.
Different technologies of wireless/Mobile communications :
1. GSM(Global System for Mobile Communications):
It is a digital cellular technology that uses narrow band TDMA (time division multiple
access) which allows 8 simultaneous calls on the same radio frequency. GSM users simply switch SIM
(Subscriber Identification Module) cards.
2. CDMA (Code Division Multiple Access): It is a digital cellular technology that uses spread-spectrum
techniques(i.e. data is sent in small pieces over a number of discrete frequencies available for the use
at any time in the specified range). CDMA does not assign a specific frequency to each user.
3. WLL(Wireless in Local Loop) : It means that the subscriber is connected to the nearest exchange
through a radio link instead of through these copper wires.
It is more secure than wired networks. It consists of user handsets and a base station. It is
used in homes or offices
4. GPRS(General Packet Radio Service): It allows mobile phones to be used for sending and receiving
data over an internet protocol based network. It is used for wireless communication using a mobile
device. With this service we can access the internet, send emails and large data.
5. 1G,2G ,3G,4G and 5G Networks ( ‘G’ for Generation of mobile technology) :
1G supports voice calls and sending texts messaging service.
Page 8 of 18
Semi-Global Roaming
Provided better quality voice calls
It used a bandwidth of 30 to 200 KHz
FIFTH GENERATION(5G) :
5G is set to be as much as 10 times faster than 4G
5G has better coverage area and high data rate at the edge of the cell.
It has low battery consumption.
Availability of multiple data transfer rate.
Around 1 Gbps data rate is easily possible.
Security is more.
Energy efficiency and spectral efficiency are good.
6. Chat : It is the textual conversion between two or more people on a software. (OR) Online textual
talk, in real time , is called chatting. e.g. Facebook, Twiter, Whats App, chat.Yahoo.com
The most common protocol is IRC(Internet Relay Chat)
7. Video Conferencing : It the audio-video conversion between two or more people.
The most common protocols are H.323 and SIP(Session Initiation protocol)
8. Wi-Fi(Wireless Fidelity) : It is used to connect internet without a direct line from our PC to the ISP.
( Distance 100 to 300 Feet or 30 to 100 meters)
Page 9 of 18
9. WiMax( wireless Max) : It is a wireless digital communication system. It can provide broad band
wireless access up to 50 km for fixed station and 5-15 km for mobile station.
12. XML( eXtensible Markup Language) is a markup language that defines a set of rules for encoding
documents in a format which is both human-readable and machine-readable. It is defined by the
Page 10 of 18
W3C's XML 1.0 Specification and by several other related specifications, all of which are free open
standards.( It is a markup language for documents containing structured information.)
14. Web Scripting : The process of creating and embedding scripts in a web page is known as Web-
Scripting. It is of two types : (a) Client Side Script (b) Server Side Script
Client Side Scripts Server side Scripts
1. It enables interaction within a web page 1. It enables the completion or carrying out
task at the server- end and sending the
result to the client end.
2. The client side scripts are downloaded 2. The server side scripts are executed at
and executed at the client end. the server end and the result is sent to
the client end.
3. Depend on browsers 3. Does not depend on browsers
4. Examples : VB script, Java Script, Hyper 4. Example : PHP, Perl, ASP(Active Server
Text Preprocessor(PHP) Pages), JSP(Java Server Pages)
NETWORK SECURITY :
The Various Protection methods for network security are :
1. Authorization
2. Authentication
3. Encrypted Smart cards
4. Biometric System
5. Firewall : The system designed to prevent unauthorized access to or from a private network is
called Firewall.
Firewalls can be implemented in both hardware and software or a combination of both.
6. https: (Hyper Text Transfer Protocol Secure): It is an extension of the HTTP. It is used for secure
communication over a computer network and is widely used on the internet.
7. Cookies : are the messages that a web server transmits to a web browser so that web server can
keep track of the user’s activity on a specific web site.
8. Hackers : is a person who uses a computer to look at and/or change information on another
computer without permission.
9. Crackers : are the malicious programmers who break into computer or network secure systems.
10. Cyber Law : Which refers to all the legal and regulatory aspects of Internet and the
World Wide Web.
Page 11 of 18
(OR)
It is the part of legal system that deals with internet, cyberspace and their respective legal
issues.
11. India’s IT Act 2000 : (Information Technology Act 2000) : Its aim to provide the legal
infrastructure for e-commerce in India by governing the transactions through the Internet and
other electronic medium
12. Cyber Crimes : The crimes committed with the use of computers or relating to computers and a
network, especially through the Internet.
Types of Cyber Crime :
1. Tampering with computer source documents
2. Hacking
3. Phising
4. Spamming
5. Hate crimes
6. Publishing of Information, which is obscene in electronic form
7. Child pornography
8. Accessing protected system
9. Cyber Stalking
10. Cyber Bulling
11. Malicious Software
12. Identity Theft
IPR Issues : ( Intellectual Property Rights) : A right that is had by a person or by a company to have
exclusive rights to use its own plans, ideas, or other intangible assets without the worry of
competition for a specific period of time. These rights can include copyrights, patents,
trademarks and trade secrets.
VIRUSES : Computer virus is a malicious program that damages data and files and causes harm to
the computer system. It can spread with a host program.
Three types of viruses are :
1. File infectors : attach themselves to a program file.
2. Boot sector viruses : install themselves on the beginning tracks of a hard drive.
3. Macro viruses : infect data files
Trojan Horses : A Trojan Horse is a computer program which carries out malicious operations
without user’s knowledge. It damage the computer’s stored data.
It is generally spread through e-mail and exchange of disks and information
between computers. Worms could also spread Trojan horses.
Worms : A worm is a also a malicious program but it copies itself across a network. It is self
contained and does not require a host.It can spread without a host program.
Spam : It refers to electronic junk mail or junk newsgroup posting. One way to help avoid spam
or junk mail is to create a filter that finds and does something to e-mail that we suspect is
Page 12 of 18
spam.
Virus Prevention :
1. Never use a foreign disk or CD without scanning it for viruses.
2. Always scan files downloaded from the internet or other sources.
3. Write protect your disks
4. Use licensed software.
5. Protect our password to prevent unattended modification.
6. Make regular backups
7. Install and use antivirus software.
8. Keep antivirus software up to date
E-COMMERCE:
E-commerce (electronic commerce or EC) is the buying and selling of goods and services, or the
transmitting of funds or data, over an electronic network, primarily the internet. These business
transactions occur either as business-to-business, business-to-consumer, consumer-to-consumer or
consumer-to-business. The terms e-commerce and e-business are often used interchangeably.
The advantages of e-commerce include its round-the-clock availability, speed of access, wide availability
of goods and services to the consumer, easy accessibility and international reach.
Payment Transactions through E-Commerce
(1) Online Banking : Online banking, also known as internet banking, e-banking or virtual banking, is
an electronic payment system that enables customers of a bank or a financial institution to
conduct a range of financial transactions through the financial institution’s website.
Example : NEFT ( National Electronic Fund Transfer), RTGS (Real Time Gross Settlement)
(2) Mobile Banking : Mobile banking is a service provided by a bank or a financial institution that
allows its customers to conduct a range of financial transactions remotely using a mobile device
such as a mobile phone or tablet, and using software, usually called an app, provided by the
financial institution for the purpose. Payment Apps and Services Payment apps are also referred
to as Mobile Wallets. There are many payment apps available in the market which are very
efficient to use and convenient to handle. The following are some of the wallets which are
frequently used in the market. (1) Google Wallet (2) Apple Passbook (3) Paytm Wallet (4)
Freecharge Wallet (5) MobiKwik Wallet (6) PayU (7) Square Wallet (8) PayPal (9) Dwolla (10)
Venmo (11) Bharat Interface for Money (BHIM) App The online mode of payment has brought
about a drastic change to marketing.
Solved Questions :
1. What are the advantages of E-commerce applications?
Ans. The advantages of e-commerce include its round-the-clock availability, speed of
access, wide availability of goods and services for the consumer, easy accessibility and
international reach.
Page 13 of 18
as a mobile phone or tablet, and using software, usually called an app, provided by the
financial institution for the purpose.
3. Name any two e-commerce website in India.
Ans : Flipkart.co and amazon.in
Page 14 of 18
Write the Full form of the following :
Page 15 of 18
NOTE : (For Case Studies Questions)
1. SERVER/MODEM : will be installed at the place that contains maximum number of computers.
2. HUB/SWITCH : will be installed at each Blocks/Building/Offices
3. REPEATER : will be installed in the cable layout when distance is more than 70 meters
4. Types of Network : PAN : Distance up to 10 meters
LAN : Distance up to 10 Kilo Meters
MAN: Distance up to 20 Kilo Meters in the same city
WAN : Different cities(Entire Country/World)
5. Name the technology/Media/Communication Channel :
For LAN/MAN : Economical ------------ Twisted Pair Cable/Ethernet Cable
For Fast/High Speed/Secure ---------- Optical Fiber Cable
6. Cable Layout/Topology :
Place of Maximum No. of Computers
(Q.1) BAJAJ AUTO LTD , is planning to start their offices in four major cities in INDIA.The company has
planned to set up their head office in KOLKATA in three locations and have named as “Sales office”,
Head office” and “HRD office”. The company’s regional offices are located at New Delhi, Kanpur and
Jaipur. A rough layout of the same is as follows :
INDIA
KOLKATA
HRD Office
Page 16 of 18
The Number of Computers install in each of their offices are :
( i) Suggest the network type (out of LAN, MAN,WAN) for connecting each of the following set of their
offices :
Head office and Sales Office
Head office and New Delhi Office
(ii) Which device will you suggest to be procured by the company for connecting all
the computers within each of their offices out of the following devices ?
MODEM
Switch/Hub
Repeater
(iii) Suggest a cable /wiring layout for connecting the company’s local offices located
in KOLKATA
(iv)Name the communication media will you suggest to be produced by the
company for connecting their local offices in KOLKATA for fast communication
(Q.2) Knowledge Supplement Organisation has set up its new center at Mangalore
for its office and web based activities. It has 4 blocks of buildings as shown
in the diagram below:
BLOCK A
BLOCK B
BLOCK D
BLOCK C
NUMBER OF COMPUTERS
BLOCK A 25
BLOCK B 150
BLOCK C 60
BLOCK D 20
Page 17 of 18
1) Suggest a cable layout of connections between the blocks and topology.
2) Suggest the most suitable place (i.e. block) to house the server of this
organization with a suitable reason.
3) Suggest the placement of the following devices with justification
(i) Repeater
(ii) Hub/Switch
4) The organization is planning to link its front office situated in the city in a hilly
region where cable connection is not feasible, suggest an economic way to
connect it with reasonably high speed?
(Q.3) G.R.K. International Inc. is planning to connect its Bengaluru office setup with its Head Office in
Delhi. The Bengaluru Office G.R.K. International Inc. is spread across an area of approx. 1 Square
Killometer, consisting of 3 blocks : Human Resource, Academic and Administration.
You as a network expert have to suggest answers to the five quaries (i) to (v) raised by them.
Bangalure Office Setup
Administration Academics
Page 18 of 18