Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
sdd
3. cludes twisted pair cable, Ethernet cable, coaxial cable and optical fibre
whereas wireless transmission media includes microwave, radio wave,
08521satellite, infr ared, Bluetooth, WIFI etc.
Advantages:
1. It is capable of carrying a signal over long distances without amplification.
2. It is simple, low weight, easy to install and easy to maintain.
3. It is least expensive medium for low speed (up to 10 mbps) applications
4. Crosstalk: It isthe bleeding of a signal from one wire to another,it can corrupt the
signal and hence cause network errors. The twisting of wires reduces crosstalk,
Disadvantages:
1. It can easily pick up noise signals.
2. Being thin in size, it is likely to break easily.
3. It is unsuitable for broadband applications.
The STP cable comes with shielding of the individual pairs of wires, which further
protects it from external interference and crosstalk. But STP is heavier and costlier
than UTP and also requires proper grounding at both the ends.
Advantages
1. Data transmission characteristics are better than that of twisted pair.
2. It can be used for broadband communication
3. It offers high bandwidth (up to 400 mbps)
Disadvantages
1. It is expensive as compared to twisted pair cables
The two most common types of cables are Thicknet and Thinnet. Whereas thicknet
is thicker and its cable segments can be up to 500 metreslong , the thinnet on the
other hand is thinner and it can have a maximum segment length of 185 metres.
3.OpticalFibres
This consists of thin glass like material which are so constructed that they carry
light from a source at one end of the fibre to a detector at the other end. The light
sources used are either light emitting diodes (LEDs) or laser diodes (LDs).
Optical fibres offer a very high bandwidth and this makes it capable of multichannel
communication.
Advantages
1. It is immune to electrical and magnetic interference.
2. It is highly suitable for harsh industrial environments.
3. It guarantees secure transmission and has a very high transmission capacity.
4. It can be used for broadband transmission where several channels can be handled
in parallel.
Disadvantages
1. It is difficult to install and maintain since they are quite fragile.
2. It is most expensive of all cables.
3. Connecting two fibres together or even connecting the light source with the cable
is a difficult process. Hence connection loss is a common problem
4. Light can reach the receiver out of phase.
1.Infrared waves:
Advantages
1. Since it is having short range of communication hence it is considered to be a secure
mode of transmission.
2. It is quite inexpensive transmission medium.
Disadvantages
a. It can only be used for short range communication
b. Infrared wave transmission cannot pass through obstructions like walls, buildings
etc.
3.Microwaves:
Advantages
a. No cabling expense
b. It can carry 25000 voice channels at the same time.
c. No cables ,so it offers ease of communication over difficult terrains like hilly areas.
Disadvantages
a. Signals become weak after travelling a certain distance and so require amplification.
To overcome this problem, repeaters are used at regular intervals (25-30 kms). The
data signals are received, amplified and then retransmitted. This makes it a very
expensive mode of communication
b. Installation and maintenance very expensive.
c. Affected by weather conditions like rain, thunderstorms etc.
2.Radiowaves:
Advantages
a. It is easy to communicate through radio waves in difficult terrains since there is no
need of digging and laying cables.
b. Radio waves can travel through long distances in all directions. Also they can easily
pass through obstacles like a building so they can be used for both indoor and
outdoor communication.
Disadvantages
a. Affected by weather effects like rain, thunderstorm etc.
b. Data transmitted through radiowaves is not secure.
Satellite:
Switching techniques:
Switching techniques are used for transmitting data across networks. Three switching techniques are.
1.Circuit switching:
Based on principle of handshaking.
A type of communications in which a dedicated channel (involves connection ,data transfer, terminate
connection) is established between two computers to transmit the data from source computer to
destination computer. Used in telephone communication.
As the connection is dedicated it cannot be used to transmit any other data even if the
channel is free.
It is inefficient in terms of utilization of system resources. As resources are allocated for
the entire duration of connection, these are not available to other connections.
Dedicated channels require more bandwidth.
Prior to actual data transfer, the time required to establish a physical link between the
two stations is too long.
2. Message switching:
A mode of data transmission in which a message is sent as a complete unit and routed via a number
of intermediate nodes(computers) based on stored and then forwarded principle.
Eg.
A teleprinter (teletypewriter, Teletype or TTY) is an electromechanical typewriter that can be
used to send and receive typed messages through various communications channels,
During message routing, every intermediate switch in the network stores the whole message. If the
entire network's resources are engaged or the network becomes blocked, the message-switched
network stores and delays the message until ample resources become available for effective
transmission of the message. So is also called store and forward(store first and forward later, one
jump at a time).
Advantages:
Disadvantages:
Because the messages are fully packaged and saved indefinitely at every intermediate node,
the nodes demand substantial storage capacity.
Message-switched networks are very slow as the processing takes place in each and every
node, which may result in poor performance.
This technique is not adequate for interactive and real-time processes, such as multimedia
games and voice communication.
3. Packet switching: Packet-switched describes the type of network in which relatively small units of
data called packets are routed through a network based on the destination address contained within
each packet. Breaking communication down into packets allows the same data path to be shared
among many users in the network. Used in satellite communication
Eg: Asynchronous Transfer Mode (ATM)
Half Duplex:
Single Wire used for sending and receiving but not simultaneously.Example of half
duplex is a walkie- talkie in which message is sent one at a time and messages are
sent in both the directions.
Full Duplex:
Single wire used for sending and receiving simultaneously. Example of Full Duplex is
a Telephone Network in which there is communication between two persons by a
telephone line, through which both can talk and listen at the same time.
Types of Networks:
Network Topologies:
A network topology is the pattern in which nodes (i.e., computers, printers, routers
or other devices) are connected to a local area network.
Network topologies are categorized into the following basic types:
1. Bus
Bus topology is also known as Linear Topology. In this type of topology, each node
attaches directly to a common cable which acts as the backbone and therefore
functions as a shared communication medium onto which various nodes are
attached.
3. Ring Topology:
A ring topology is a network configuration in which device connections create a
circular data path. Each networked device is connected to two others, like points on
a circle.
1) This type of network topology is very organized. Each node gets to send the
data when it receives an empty token. Also in ring topology all the traffic flows in
only one direction at very high speed.
2) Even when the load on the network increases, its performance is better than
that of Bus topology.
3) There is no need for network server to control the connectivity between
workstations.
4) Additional components do not affect the performance of network.
5) Each computer has equal access to resources.
1) Each packet of data must pass through all the computers between source and
destination. This makes it slower than Star topology.
2) If one workstation or port goes down, the entire network gets affected.
3) Network is highly dependent on the wire which connects different components.
4) MAU’s and network cards are expensive as compared to Ethernet cards and
hubs.
4.Tree Topology
Tree topology is a combination of bus and star topology. The network looks like an
inverted tree.It integrates multiple star topologies together onto a bus. In its
simplest form, only hub devices connect directly to the tree bus.
4. Mesh Topology
A mesh topology is a network topology in which all the network nodes are
individually connected to most of the other nodes. There is not a concept of a
central switch, hub or computer which acts as a central point of communication to
pass on the messages.
Network Devices:
RJ-45
RJ-45 , short form of Registered Jack - 45 , is an eight wired connector that is used
to connect computers on a local area network(LAN), especially Ethernet.
Ethernet Card
Hub:
Hub is a networking device which is used to connect multiple network computers,
hub just does the work of data forwarding. Placed in each block / room/lab to
facilitate network facility.
Switch:
Like a hub, a switch also works at the layer of LAN (Local Area Network) but you can
say that a switch is more intelligent than a hub. While hub just does the work of
data forwarding, a switch does ‘filter and forwarding’ which is a more intelligent way
of dealing with the data packets.. Placed in each block / room/lab to facilitate
network facility.
Router:
A Router is a network device that works like a bridge to establish connection
between two networks but it can handle networks with different protocols.
A router is a network device which is responsible for routing traffic from one to
another network.
Bridge:
A bridge is a device that connects a local area network (LAN) to another local area
network that uses the same protocol.
If a router connects two different types of networks, then a bridge connects two
sub-networks which belongs to same network. You can think of two different labs or
two different floors connected by a bridge.
Modem:
A modem stands for (Modulator / Demodulator),It converts digital to analog signals
and vice a versa .Modulation means converting digital signal to analog signals and
demodulationanalog to digital. Provides efficient network when placed with server
block
Gateway:
Both gateway and router are used to regulate network traffic between two or more
separate networks. Gateways regulate traffic between two dissimilar networks, while
routers regulate traffic between similar networks.
Repeater:
A repeater is an electronic device that receives a signal , amplifies it and then
retransmits it on the network so that the signal can cover longer distances.
Place repeaters wherever the distance between the connection points are greater
than 70 mts
Protocol: A special set of rules that two or more machines on a network follow to
communicate with each other.
Questions:-
SMTP
1)SMTP stands for Simple Mail Transfer Protocol that allows transmission of email
over the Internet. It only works for outgoing messages. You must be online to
receive mail using SMTP..SMTP has a disadvantage that if the destination computer
is not online, mails cannot be received eg: Microsoft Outlook.
updated version of the SMTP protocol called ESMTP (Extended Simple Mail Transfer
Protocol) for sending a picture or music file.
Mutipurpose Internet Mail Extension(MIME) is a supplementary protocol that allows
non ASCII data to be sent through SMTP
Remote Access Protocol :used for connection with remote machines , e.g. Telnet
: is an internet utility that lets you log onto remote computer system.
1.Chatting:
online textual talk,in real time, is called chatting.
Whtsapp, Internet Messenger, MSN Messenger are some commonly used chat
programs. Internet Relay Chat (IRC) protocol is used for chatting.
2. SMS (Short Message Service) is the transmission of short message to and from a
mobile phone, fax machine etc. SMSC- Short Message Service Center.
3. Video Conferencing: A two way video phone conversation among multiple
participants is called video conferencing. Protocol used is SIP (Session Initiation
Protocol) and H.323
Wi-Fi (Wireless Fidelity) which lets you connect to the internet without a
direct line from your PC to the ISP(Internet Service Provider). Things required
are Broadband internet connection, wireless router and a laptop, mobile etc.
Range: 100 yards (covers a coffee shop, one floor of office building, one
home)
Throughput : 11 Mbps
Security: Limited
WWW (World Wide Web): Is a set of protocols that allows you to access any
document on the net through a naming system based on URL.
DNS (Domain Name System) The characters based naming system by which
servers are identified is known as DNS.
Eg: .com , .net , .edu , .in etc
URL (Uniform Resource Locator) : Web address of the web page written on
the address bar of the browser is known as the uniform resource locator (URL
Eg. https://www.youtub.com
https://www.exam.com/CBSE.html
DNS: www.exam.com
URL: https://www.exam.com/CBSE.html
Web hosting :Web hosting is the process of uploading/saving the web content
on a web server to make it available on WWW. In case a individual or a
company wants to make its website available on the internet, it should be
hosted on a web server.
Web browser :Web browser is software program to navigate the web pages
on the internet.
Web2.0:Refers to the added features and applications that make the web
more attractive, support easy online information exchange like vedio sharing
websites, social networking website etc..
Client side scripting : supports interactions within a web page. On some web
pages the contents change in response to an action done by the user, for
example a click from the mouse or a key press from a keyboard action.
EgVBscript, JavaScript
Server side scripting: supports execution at server end. Some web pages use
applications running on the server to generate the web content. Such pages
use server-side scripting language. Web page display the current time and
date, forums, submission forms, shopping carts etc., use server-side scripting.
ASP,JSP, PHP are examples of server-side scripting languages.
Eg: VBscript ,Javascript Eg: PHP, JSP, ASP, ASP.Net, Ruby, Perl
EXERCISE
1. Neha wants to upload and download files from/to a remote internal server.
Write the name of the relevant communication protocol, which will let her do
the same. FTP
2.Meha wants to upload hypertext document on the internet. Write the name of
protocol, which will let her do the same. HTTP
3. This protocol is used for communication between two personal computers
using a serial interface and connected by a phone line. Write the name of the
protocol. PPP (Point-to-Point Protocol)
4.This protocol is used to transfere mail over internet. What is the name of the
protocol? SMTP
5.Thisprotocolisusedtoimplementremotelogin.Whatisthenameoftheprotocol? Remote
Access Protocol.
6.This protocol is used for chatting between two groups or between two individuals.
Write the name of the protocol. Internet Relay Chat (IRC)
7.This protocol is used to transfer of voice using packet switched network. Write the
name of the protocol. VoIP
8.Explain Remote Access Protocol.
9.Why we need VoIP protocol?
10. Differentiate between FTP and HTTP.
11. Differentiate between VoIP and IRC.
18. Write the basic hardware requirements for VoIP.
19. Why TCP/IP based applications are considered to be stateless?
20. FTP is based on Client/Server principle. Explain.
a)TDMA(Time Division Multiple Access) which allows eight simultaneous calls on the
same radio frequency.
b) CDMA (Code Division Multiple Access)
- a digital cellular technology in which each user’s signal is spread over the entire
bandwidth by unique spreading code. At the receiver end , the same unique code is
used to recover the signal.
c)FDMA Frequency Division Multiple Access :It stands for Frequency Division
Multiple Access. In this, each user utilizes a portion of the frequency bandwidth
available. Each user has its own frequency domain.
d) WLL/ WiLL (Wireless in Local Loop): is a system that connects subscribers to the
public switched telephone network using radio signals as a substitute for other
connecting media.
1G:
-based on the analog cellular technology.
-only had voice facility
- uses circuit-switched technology, radio towers for transmission
-drawbacks is low capacity, poor voice links and no security.
2G:
-used digital signals for transmissions of voice.
- can send both voice and data
- supports both circuit switching and packet switching
- GSM technology used, SIM card and GPRS were used.
- services like MMS, sending pictures through e-mail became possible.
3G:
- Adds multimedia facilities to 2G phones by allowing video, audio, and graphics
applications.
- Supports both circuit switching and packet switching
-The idea behind 3G is to have a single network standard instead of the different
types adopted in the US, Europe, and Asia. 3G mobile systems are also known as
Universal Mobile Telecommunications System (UMTS)
4G:
- uses packet switching only.
- provide speeds up to 100 Mbps while moving and 1Gbps while stationary.
- It is a wireless access technology.
- 4G can provide better-than-TV quality images and video-links.
Virus:a computer virus is a type of malicious code or program written to alter the
way a computer operates and that is designed to spread from one computer to
another.It attaches itself to the host program not independent standalone program,
requires a host for starting its process.
Trojan horse: ATrojan horse is a program that contains hidden malicious functions.
Trojan Horse trick users into installing them by appearing to be legitimate programs.
Spam: The term spam means endless repetition of worthless text. In other words,
unwanted messages or mails are known as Spam.
Cookies: when a user browses a website,the web server sends a text file to the web
browser called cookie. It generally contains details about the website.
Cyber Law: Cyber law is an attempt to integrate the challenges presented by human
activity on the internet with legal system of laws applicable to the physical world.
Intellectual property rights (IPR) Issues: Intellectual property rights are the rights
given to an individual over the invention of their own. They usually give the creator
an exclusive right over the use of his/her creation for a certain period of time.
Hacking: The term was used for people who engaged themselves in harmless
technical experiments and fun learning activities.
Hackers Crackers
A Hacker is a person who is extremely They are called criminals because they
interested in exploring the things and intend to cause harm to security,
helps workings of any computer system stealing very useful data and using it in
or networking system. hackers are wrong ways. Eg. stealing account
expert programmers, called Ethical information and credit card numbers,
Hackers . also fall into this category.
Intellectual property: a product of intellect that has commercial value, including copy
writing property such as literacy or artistic work etc.
Computer science Network Test Date: 09-11-2017
16. The device/computers that control traffic within your company's network or at
your local Internet Service Provider (ISP) ??
17. Name two wireless transmission media which used line of sight communication.
18. which transmission medium can carry 25000 voice channels at the same time.
19. which topology is a combination of bus and star topology?
20. walkie- talkie is an example of which communication mode?
Types of software:
Proprietary software: we pay for this s/w and may be supplied on disks or
downloaded from internet. E.g. Msoffice ,Ms windows.
Freeware:its free of cost and usually bundled up with some OS. E.g. MS interet
explorer is bundlued up with MS operating system. You cannot modify it so not
open source s/w. e.g. MS Paint
Shareware: s/w for trial purpose that user is allowed to try for free, for a specific
period of time. Downloaded from internet , after trial period the s/w needs to be
purchased. E.g Antivirus S/w
Open source software: OSS gives freedon to run, modify, and even re-distribute it. It
can be free used but not free of cost.
e.g Python, C++.
Free software: Freely accessible and freely used, modified, copied or distributed by
anyone. s/w code may or may not be accessible. E.g My SQL.
wASaw
Other Network Terms: [ Refer after model]
Buff er
Cache
A group of memory locati ons set aside for temporary storage ofdata, especially
frequently-used data or data needing high speedretrieval by the CPU.
Dial-up Line
Download
Flooding
Traffi c-passing technique used by switches and bridges in which traffi c received
on an interface is sent out all of the interfaces of that device except the interface
on which the informati on was originally received.
Handshake
Terminator
Typically, a resistor placed at the end of a bus to prevent the refl ecti on of signals.
Upload
The acti vity of transferring a file from a user’s computer system to a remote
system.
Phishing
Packet: A packet is, generally speaking, the most basic unit that is transfered over a
network. When communicating over a network, packets are the envelopes that carry your
data (in pieces) from one end point to the other.
Port: A port is an address on a single machine that can be tied to a specific piece of
software. It is not a physical interface or location, but it allows your server to be able to
communicate using more than one application.
NAT: NAT stands for network address translation. It is a way to translate requests that are
incoming into a routing server to the relevant devices or servers that it knows about in the
LAN.
BLOG: a blog is a Web page that serves as a publicly accessible personal journal for an individual.
Typically updated daily, blogs often reflect the personality of the author.