0% found this document useful (0 votes)
26 views6 pages

Computer Network

useful

Uploaded by

balajiaditya02
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
26 views6 pages

Computer Network

useful

Uploaded by

balajiaditya02
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 6

UNIT 2 : COMPUTER NETWORKS [ 10 MARKS ]

NETWORK Interconnection of two more devices / people / things


Social Network Mobile Network Computer Network Railway Network Airlines Network
COMPUTER NETWORK Interconnection of two or more computers / computing
devices.
EVOLUTION OF NETWORKING Research project of US Department of Defence to connect
academic and research institutes - called ARPANET
In 1980s high capacity network setup by Early 1990s, ARPANET and NSF Net along with some
NSF to connect more institutes. other networks joined to form the INTERNET
ARPANET – Advanced Research Project Agency
Network
NSF – National Science Foundation / Federation
INTERNET Globally-interconnected network of networks. {WWW is its part}
INTERSPACE A client-server software that allows users to communicate with
{Interspace is what Internet will each other in real time to send and receive data of various types
become} such as data files, video, audio ,textual data , 3-D dynamic content.
INTRANET A local or restricted network within an organization
NEED FOR NETWORKING Resource Sharing ; Communication Medium : Reliability : Cost Factor
TYPES OF NETWORKS – Based on geographical area and data transfer rate [1 mark]
PAN LAN MAN WAN
(Personal Area Network ) (Local Area Network) (Metropolitan Area Network) (Wide Area Network)
Interconnecting few Connects devices in Extended form of LAN, Connects devices, LANs
personal devices like limited area, say office, within the city. Example and WANs across different
laptop, mobile etc. university campus etc. – CableTV network in a parts of country or
Area – 10 meters Area – upto 1 Km town. different countries or
Bluetooth / USB Ethernet Cable, Fibre Area – 30-40 Km continents.
Optics, Wi-Fi etc Example – Internet
NETWORK TOPOLOGIES - pattern of layout or inter-connection between devices ( computer nodes
, printers etc.) in a network. [ 1 mark / 2 marks]

BUS topology STAR topology RING topology MESH topology


Easy to setup ; Centrally controlled ; Easy to setup ; Network can be
Less cable length ; Fault diagnosis easy; Higher rate of data expanded without
Fault diagnosis difficult; Expensive to setup; transmission; affecting existing LAN ;
Not suitable for large If central hub fails, Troubleshooting difficult ; Robust topology;
networks network disrupts. Complex setup

SWITCHING TECHNIQUES How data is transmitted over a network [1/2 Mark]


CIRCUIT SWITCHING Physical connection is setup between source and destination
computers to send data. ( Dedicated data connection required,
Used for phone calls)
MESSAGE SWITCHING Data divided as data-packets is passed from one switching office to
another till it reaches destination. (Store and forward)
PACKET SWITCHING Data is divided in equal-sized packets at source, transmitted via
store and forward way and re-assembled at destination.
(Used to send/receive data over a network, more efficient )

13 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 0 - 2 1
TERMS USED IN DATA COMMUNICATION [ 1 mark – application ]
CHANNEL medium of data transmission from one device/point to another.
{ Example - you view different TV Channels ( broadcast on different
frequencies) , YouTube Channels}
BAND WIDTH Difference between the highest and lowest frequencies ( measured in
terms of "Hertz" like Hz, KHz, MHz etc)
DATA TRANSFER RATE amount of data transferred per second
BAUD RATE measuring unit for data carrying capacity of communcation channel
words used bps (Bits Per Second), Bps ( Bytes per second) , kbps , Kbps etc.
{Note the CAPS 'B' for Bytes, 'b' for bits, you can guess for kbps / Kbps, mbps / Mbps etc }

TRANSMISSION MEDIA [1mark – case study based]


WIRED (Guided) WIRELESS (Unguided)
Twisted Pair Cable ( Ethernet Cable) Infrared – Are electromagnetic radiation for line-of-sight;
Economical and Easy to use Frequency 300 GHz - 400 THz; Range 10-30 meters
stp (shielded twisted pair) , Bluetooth - standard wireless (radio wave) communication
utp (un- shielded twisted pair) protocol uses 2.4 GHz frequency; max range 100 meter
Co-axial Cable Radio wave (frequency range 30 Hz – 300 GHz )
Example = cable TV wire
Optical Fiber Cable Satellite (downlink frequency 1.5 – 20 GHz)
Most reliable, fast transmission, (Uplink frequency 1.6 GHz – 30 GHz)
expensive VERY FAST, EXPENSIVE
Microwave ( frequency range 300 MHz – 300 GHz)
All unguided media = transmitter, receiver and atmosphere
NETWORK DEVICES [1 mark – case study]
MODEM enables a computer to transmit data over telephone
(MODulator DEModulator) lines ; Used to convert digital signals into analog
External modem , Internal modem signals and vice versa.
RJ45 connector Eight-wire connector used to connect computers
(Registered Jack - 45) on LANs, especially Ethernets.
ETHERNET CARD Hardware device that helps in the connection of
(NIC – Network Interface Card) nodes within a network. Physical address of a NIC is
(NIU – Network Interface Unit ) known as MAC address
MAC Address = Media Access Control (6-bytes long → Example 10 : B5 :03 :63:2E:FC)
Address

GATEWAY → establishes intelligent connection between a local network and external networks
that are completely different.
BRIDGE → connects local networks with same standard but having different types of cables
ROUTER → connects multiple networks with different protocols
ROUTER v/s BRIDGE
Can handle multiple protocols and works Cannot manage multiple protocols and works using
using IP addresses MAC addresses
GATEWAY → establishes intelligent connection between a local and external network
that are completely different
REPEATER → used to re-generate received signal and re-transmit towards destination
TIP - When to suggest use of Repeater? When distance between devices is more than 90 meter
SWITCH v/s HUB
An intelligent device that connects several An electronic device which connects several nodes
nodes for form a network. to form a network.
Sends information only to intended nodes Redirects the information to all the nodes in
broadcast form.
WiFi Card → For wireless communication to send and receive signals between devices

14 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 0 - 2 1
Tips for CASE STUDY BASED questions
Question Hint for Answering
Layout Draw block diagram interconnecting blocks, prefer the block or unit
with maximum devices as main to connect other blocks
Topology Write name of topology – Star / Bus / Ring etc.
Placement of Server In the unit/block with maximum number of computers
Placement of Hub/Switch In every block / unit
Placement of Repeater As per layout diagram, if distance between two blocks is above 90 meter
Cost-effective medium for internet Broadband / connection over telephone lines
Communication media for LAN Ethernet ( upto 100 meter) / Co-axial cable for high speed within LAN
Cost/Budget NOT an issue in LAN Optical Fiber
Communication media for Hills Radio wave / Microwave
Communication media for Desert Radio wave
Very fast communication between Satellite ( avoid it in case economical / budget is mentioned)
two cities / countries
Device / software to prevent Firewall ( Hardware and/or Software )
unauthorized access
NETWORK PROTOCOLS : Set of rules for communication among networked devices. These include how
and when a device can send and receive data, how it is packaged, how it reaches its destination.
TCP/IP – Transmission Control Protocol/Internet Protocol. A two-layer protocol.
TCP - divides the data into packets for transmitting and re-assembling received packets at the destination.
IP - responsible for routing the data packets ( to find route/way )
PPP Point-to-Point Protocol - Used for direct communication between two devices, like a computer
connected via phone line to a server (other examples - cellular telephone, fibre optic links etc)
FTP File Transfer Protocol -Used for transfer of files (upload/download) to or from a remote server.
HTTP HyperText Transfer Protocol- transfer data from one device to another on the world wide web.
HTTP defines how the data is formatted and transmitted over the network.
{ HTTPS - Hypertext Transfer Protocol Secure: advanced and secure version of HTTP. }
Wireless / Mobile Communication protocol: [1 mark case study/ full forms]
GSM = Global System for Mobile Communication. GSM technology is used for transmitting mobile voice
and data services.
{With GSM, all subscriber and wireless provider information is stored on interchangeable modules known
as SIM (Subscriber Identification Module) cards. }
GPRS = General Packet Radio Service - transmission of IP packets over existing cellular networks.
Applications = Multi-media Message Service (MMS), Internet Access via Mobiles and Data Communication
WLL= Wireless Local Loop is a generic term for an access system that uses wireless links rather than
conventional copper wires to connect subscribers to the local telephone company’s switch.
MOBILE TELECOMMUNICATION TECHNOLOGIES: [ 1 mark full form / feature ]
Mobile is a device which is portable. Mobile communication is based on cellular networks.
{A cellular network is radio network - land is divided into areas called cells. The network of cells enables
the mobile devices to communicate even if they are moving from one cell to another via base stations.}
Mobile Systems ( G = Generation)
1G 2G 2.5 G 3G
introduced in late introduced in early 1990s; using packet Adds multi-media facility to
1970s and early based on GSM technology; switched domain 2G - allowing video, audio,
1980s; analog by swapping out the SIM and graphics applications ;
cellular technology card, users can switch {Year 2000 – 2010 }
phones or providers.
Only voice facility used circuit switching ; Both used GPRS (General Watching streaming video
available ; based on voice and data Packet Radio Service) or video telephony became
circuit-switched conversations were digitally in addition to GSM. a reality ( Mobile TV) ;
technology encrypted
Low capacity , poor Known for paging, SMS, Services like MMS, Data rates up to 2 Mbps;
voice links and no voicemail and fax services sending pictures Technologies used – UMTS,
security through e-mail EDGE, CDMA
possible

15 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 0 - 2 1
Some terms we need to be familiar with –
FDMA - Frequency Division Multiple Access. CDMA - Code Division Multiple Access.
TDMA - Time Division Multiple Access.
4G Mobile Systems = Based on packet switching only (IP based). { Year 2010 -2020 };
Bandwidth – 100Mhz ; Term used for 4G is MAGIC
Anytime, anywhere Global mobile Integrated wireless Customized
Mobile
Fast transmission support solutions personal service
multimedia 100Mbps – 1Gbps (uses LTE and Wi-Max )

{4G LTE = Fourth Generation Long Term Evolution} 4G can provide better-than-TV quality images and
video-links , supports interactive multimedia, voice and video
5G Mobile Systems = uses orthogonal frequency-division multiplexing (OFDM) framework; radio
millimeter bands in the 30 GHz to 300 GHz range. More faster data transmission than 4G, data rate
from 1 Gb and above { From year 2020 onwards }. Highly interactive multi-media, voice streaming, more
efficient.
Mobile processors =
Like CPU in a computer system, mobile processor receives and executes every command, performing
billions of calculations per second.
Components of Mobile Processors - Mainly the following three -
1. Application Processing Unit = Has the Control Unit of the mobile’s CPU ( Central Processing Unit)
2. GPU ( Graphics Processing Unit) = Assists the CPU for handling the graphics.
3. Communications Processing Unit = for calling and call receiving via the phone’s middleware
A few more components in smartphone’s processors -
a. Camera ISP ( Image Signal Processing) b. Radio and 3G / 4G Modem
c. Memory Controller d. Audio / Video Engine
e-Mail – [1 mark – case study / application ]
e-Mail or email, short for "electronic mail," is the transmission of messages electronically over computer
networks.
e-Mail PROTOCOLS : Email uses multiple protocols within the TCP/IP suite. Some common e-mail
protocols are -
SMTP - Simple Mail Transfer Protocol – used to send emails on the internet
POP3 - Post Office Protocol Version 3 – to receive emails from a remote server to a local email client.
IMAP - Internet Message Access Protocol (IMAP) is a mail protocol used for accessing email on a
remote web server from a local client. { Example - We use MS-Outlook}
Telnet – Used to connect to remote computers over a TCP/IP network (interactive , text- based)
PROTOCOLS FOR CHAT AND VIDEO CONFERENCING:
Online conversations in which you are immediately able to send messages back and forth to one another is
called "chat".
A video conference is a telecommunication technology, which permits two or more people in different
locations to interact via mutual video or audio transmission simultaneously.
VoIP - voice over Internet Protocol, which is a base for all internet communications.
WIRELESS TECHNOLOGIES -
Wi-Fi { "WiFi is a short name for Wireless Fidelity" }
Wi-Fi is a wireless networking technology that uses radio waves to allow computers and other devices to
communicate over a wireless signal.
WiMax WiMAX (Worldwide Interoperability for Microwave Access) is a family of wireless broadband
communication standards. WiMAX systems are expected to deliver broadband access services to
residential and enterprise customers in an economical way.
{ WiFi's range is approx. 30 m. WiMAX range is a radius of 50 km }

NETWORK SECURITY CONCEPTS –

16 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 0 - 2 1
Threats and prevention from –
Viruses – Vital Information Resource Under Siege; Viruses are small programs that are written
intentionally to damage the data and files on a system; computer slows down; programs malfunction; files
destroyed
Worms - a self-replicating program that runs independently and travels across network connections.
Worms cause more damage.
Trojan horse - a kind of virus that looks safe but has hidden effects.
Spam - unwanted bulk mail which is sent by an unauthorized or unidentified person in order to eat the
entire disk space.
PREVENTION – Use anti-virus software; keep computer software updated ; use firewall ; follow safe
browsing practices – using authorization , authentication, keeping passwords safe.
COOKIE = A cookie is a small text file sent by web server to a web browser when a user browses a
website.
FIREWALL = A hardware or software or both that is used to prevent unauthorized access to or from a
computer network;
CYBER LAW CYBER CRIME
Legal system of laws and regulatory aspects Cybercrime, or computer-oriented crime, is a
of issues of the internet and World Wide crime in which a computer and internet is used.
Web Cybercrimes can be against persons or against
property or against the government
India IT Act -
"INFORMATION TECHNOLOGY ACT, 2000" [ITA- 2000] - to protect the field of e-commerce, e-
governance, e-banking as well as penalties and punishments in the field of Cyber Crimes.
The above Act was further amended in the form of IT Amendment Act, 2008 [ITAA-2008] in December
2008. Major aspects covered in IT AA-2008 include new sections on offences like cyber terrorism, data
protection, digital signatures, e-Documents (e-governance) etc.
INTELLECTUAL PROPERTY RIGHTS –
Intellectual property rights are the rights given to persons over the creations of their minds.
Intellectual Property can be – Industrial Property ( Patents , Trademarks) and Copyright.
For example, an invention and an original work of authorship are intellectual property and protected by
the intellectual property right called "patent" and "copyright".
Other examples of Intellectual Property with a view of IPR –
Patents , Trademarks, Plant Varieties, Copyrights, Trade secrets, Industrial Design rights etc.
HACKING CRACKING
Engaging in harmless technical experiments and A method by which a person gains
fun learning activities, using computer unauthorized access to a computer with the
programming skills to intentionally access a intention of causing damage.
computer without authorization.
Types of Hackers – Black Hat Hackers (also known as crackers), White Hat Hackers, Grey Hat Hackers

WEB SERVICES :
WWW : World Wide Web is a combination of all resources and users on the Internet that are using the
Hypertext Transfer Protocol (HTTP) ;
Sir Tim Berners -Lee (Born in London, UK) is the inventor of WWW.
Website Webpage
Collection of webpages Webpage is part of website
Each website has specific internet address Webpages have hyperlinks to connect one web
(URL) by which we can access the website page to another in the website
Example - http://cbseacademic.nic.in/ Example – curriculum_2021.html is a webpage of
More examples - the CBSE website.
amazon.com, flipkart.com, google.com http://cbseacademic.nic.in/curriculum_2021.html
All publicly accessible websites collectively
constitute the World Wide Web
17 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 0 - 2 1
WEB BROWSER = Web browser is software program to navigate the web pages on the internet.
Examples - Google Chrome , Mozilla Firefox, Internet Explorer etc.
WEB HOSTING WEB SERVER
Web hosting is the process of uploading/saving the A web server is a computer or a group of computers
web content on a web server to make it available on that hosts or stores content of website.
WWW (World Wide Web). Examples – Apache Tomcat , IIS
Web 2.0 =Web 2.0 refers to new generation of dynamic and interactive websites.
HTML (Hyper Text Markup Language) XML(eXtensible Markup Language)
HTML is used to display the data, text and XML is used to describe the data and focus is on
images of a webpage on web browser and focus the content of the data. XML is recommended by
is on the format of data displayed. the World Wide Web Consortium (W3C). It is a
free open standard.
HTML tags are predefined XML tags are not predefined. We can create our
own tags. XML code can also contain HTML tags.
HTML tags are not case sensitive. Example - XML tags are case-sensitive
<HTML> or <html> are the same

URL (Uniform Resource Locator) DOMAIN NAME


URL is unique identifier of a web page Domain name is your website name
The most general form of a URL syntax is as follows:
Protocol:// <domain name> / <directory path>/<object name>
For example - https://www.example-site.com/sql/sql_intro.asp
( Domain Name System / Domain Name Resolution - when the user types a domain name, the
domain names are translated into Internet Protocol (IP) addresses. The computers or machines, access
websites based on IP addresses )

UNIT III – DATABASE MANGEMENT (20 Marks )


A DBMS or database management system is Database = Collection of inter-related tables and
a software used to create and manage other objects.
databases.
{manage = insert new records, display, DBMS = DB + MS ,
modify, delete , provide access control etc. } DataBase + software to handle the DB
RDBMS = RDBMS = database is Examples of popular RDBMS –
Relational Database organised in the form of MySQL, Oracle, Sybase, DB2
Management System relations (i.e. tables)
TERMINOLGY ( RDBMS) [1 mark / 2marks ]
Table : CUSTOMER
Cust_Id CNAME AADHAR_NO ADDRESS PHONE
C01 ANUJ KUMAR 345612348912 GAUTAM VIHAR 8765432190
CO3 NEHA SINGH 367823458904 RANI BAGH 7722334673
CO4 NAREN GARG 453627980423 MAHESH NAGAR 6345612566
CO7 BHARAT VERMA 516782245679 MALVIYA NAGAR 9818624567
Primary Key - An attribute or Candidate Key- An attribute Alternate Key - The candidate
set of attributes that uniquely or set of attributes that can key which is not chosen as
identify a record in a become primary key of the primary key
table/relation table/relation
e.g. - in table customer(cust_id, e.g. - customer(cust_id, cname, e.g. in table customer(cust_id,
cname, aadhar_no, address, aadhar_no, address, phone) , cname, aadhar_no, address,
phone) , the attribute cust_id is the attribute cust_id and phone) , the attribute cust_id is
primary key aadhar_no are candidate keys chosen as primary key,
then aadhar_no will be
alternate key

18 | K V S – R e g i o n a l O f f i c e , J A I P U R | S e s s i o n 2 0 2 0 - 2 1

You might also like