Está en la página 1de 12

INFORMATICS

PRACTICES CLASS 12

COMPUTER
NETWORKING
CHAPTER 1 NOTES
Informatics Practices (Theory)
Class-XII
Chapter Wise Marks Distribution

Ch.No. Chapter Name Marks

1. Coumputer Networking 08
2. Open Source Concepts 02
Java Revision –I
3. (Programming Fundamentals) 10
Java Revision -II
4. (GUI Swing Controls) 08
Java Revision -III
5. (Class & Objects) 01
6. JAVA Classes and Libraries 01
7. Concept of Inheritance 01
8. Database Connectivity 01
Web Application
9. Developments
01
10. HTML-I (Basic Tags)
11. HTML-II (Advance Tags) 01
12. Introduction to XML 01
13. MySQL Revision 18
02
14. Database Transaction
Advance SQL
15. (Grouping & Table Joins) 08

16. Tables & Integrity Constraints 02

17. IT Applications 05

TOTAL 70
CHECKLIST
COMPUTER NETWORKING / NETWORK/ NEED OF
NETWORKING / APPLICATION OF NETWORK

ELEMENTARY TERMINOLOGY OF NETWORKS

NETWORK TOPOLOGIES

TYPES OF NETWORKS

TRANSMISSION MEDIA / COMMUNICATION MEDIA /


COMMUNICATION CHANNEL

NETWORK DEVICES

NETWORK SECURITY

PROTOCOLS

INTERNET / INTERNET APPLICATION


NETWORK SECURITY CONCEPT
IMP FULL FORMS

NOTE : This notes is made with the help of support


material, school notes, reference books,
marking scheme of papers and 10 % of mine
notes.
COMPUTER NETWORKING
Computer Networking : A computer network is a set of two or more
interconnected computer and a set of hardware devices.
Network : A network can be define as a interconnected collection of
autonomous computer.
Need Of Networking :
1. Resource sharing
2. File and data sharing
3. Communication media
Application Of Networks :
1. Sharing of data, services and resources
2. Access to remote databases
3. Communication facilities
Elementary Technology Of Networks :
1. Nodes (Workstation) : The term nodes refers to the computer that
are attached to a network and are seeking to share the resources.

2. Server : A computer that facilitates the sharing of data, software and


hardware resources in the network.

3. Network Interface Unit (NIU) : An interpreter that helps establish a


connection between the serves and workstations.

4. Media Access Control (MAC) Address :


• It refers ti the physical address assigned by NIC manufacturers.
• It is unique 6 byte address separated by colons.
• e.g. 10:B5:03:63:2E:FC

5. IP Address :
• An IP address is an identifier for a computer or a device on a TCP-IP
network.
• IP address uses a 4 bytes numeric format.
• e.g. 216.27.61.231

6. Domain name : It is a unique name or identifiction that helps to create


the path to open a website.
• www
• Name describing the website's purpose.
• TLD (Top Level Domain) such as .com, .net, .in etc.

Domain name resolution(DNS) : It refers to the process of obtaining


corresponding IP Address from a domain name.

Network Topology :
1. Bus Topology Or Linear Topology : In this topology a single length
of the transmission medium is used onto which the various nodes are
attached.
Advantages :
• Short cable length.
• Simple wiring layout.
• Easy to extend.
Disadvantages :
• Fault diagnosis is difficult.
• Fault isolation is difficult.
• Nodes must be intelligent.

2. Ring Topology or Circular Topology: In a ring topology each node


is connected to two and only two neighboring nodes.
Advantages :
• Short cable length.
• No wiring closet space requires.
• Suitable for optical fibers.
Disadvantages:
• Node failure causes network failure.
• Difficult to diagnose faults.
• Network reconfiguration is difficult.

3. Star Topology: A start topology is designed with each node


connected directly to the server via hub or switch.
Advantages :
• Ease of service.
• One device per connection.
• Simple access protocols
Disadvantages :
• Long cable length.
• Difficult to expand.
• Central node dependency.

4. Tree Topology : A tree topology can be viewed as a collection of


star networks arranged in a hierarchy. This tree has individual peripheral
nodes.

5. Mesh Topology : In this topology each nose is connected to more


than one node to provide an alter-native route in the case the host is
either down or too busy.
Types Of Networks :
1. PAN ( Personal Area Network ) : Refers to a small network of
communication cable IT enabled devices.

2. LAN ( Local Area Network ) : Small computer networks that are


confined to a localized area.
e.g. In an office, a building, or a factory.

3. MAN ( Metropolitan Area Network ) : These are spread over a city.


e.g. Cable TV Networks.

4. WAN ( Wide Area Network ) : These are spread across countries


and facilitate fast exchange of information at lesser costs and high
e.g. Internet speeds.

Transmission Media ( Communication Media / Communication


Channel ) : It is a networks refers to the connecting media through which
different computer in a network are interconnected together.
It is divided into two categories :

1. Guided Media ( Wired technologies ) : When the computer in a


network are interconnected through a wire or cable then such a medium
is categorized under wired technology.

(I) Twisted Pair Cable ( Ethernet Cable ) : The most common form of
wiring in data communication application is the twisted pair cable.
Advantages :
• It is simple.
• It is easy to install and maintain.
• It has a low weight.
Disadvantages :
• Its low bandwidth capabilities make it unsuitable for broadband
applications.
• It supports maximum data rates 1 Mbps without conditioning and 10
Mbps with conditioning.
• Because of high attenuation, it is incapable carrying a signal over long
distances without the use of repeaters.

(II) Coaxial Cable : The coaxial cable has high electrical properties and
is suitable for high speed communication.
Advantages :
• Data transmission characteristics of coaxial cable better than those of
twisted pair cable.
• Offer higher bandwidths-upto 400 Mbps.
• The coaxial cables can be used for broadband transmission.
Disadvantages :
• Expansive compared to twisted pair cables.
• The coaxial cable are not compatible with twisted pair cables.

(III) Optical Fibers :


Advantages :
• The Optic cables can be used for broadband transmission.
• It guarantees secure transmission and has a very high transmission
capacity.
• It is highly suitable for harsh industrial environment.
Disadvantages :
• Connection problem are common problems.
• They are the most expensive of all cables.
• A light source to a fiber is a difficult process.
2. Unguided Media ( Wire Less Technologies) : When the computer in
a network are interconnected and transmitted through waves which are
traveled through air, water or vacuum then such medium is categorized
under wire less technologies.

(I) Radio Wave :


Advantages :
• It offers freedom from land acquisition rights that are required for
laying, repairing the cables.
• It offers ease of communication over difficult terrain.
• Radio wave transmission offers mobility.
Disadvantages :
• Radio wave communication is an insure communication.
• Radio wave propagation is susceptible to weather effects like rains
thunder storms etc.

(II) Satellite :
Advantages :
• The area coverage through satellite transmission is quite large.
• The heavy usage of intercontinental traffic makes the satellite
commercial attractive.
• Satellite can cover large areas of the Earth.
Disadvantages :
• High atmospheric losses above 30 GHz limited carrier frequencies.
• The high investment.
• Over crowding of available bandwidths due to low antenna gains.

OTHER UNGUIDED MEDIA(not so Imp but you should know)


(III) Infrared
(VI) Laser
(V) Bluetooth.
Network Devices :
1. MODEM( Modulator Demodulator) : Modem is a device that converts
digital to analog signals such as the telephone.

2. RJ–45 Connector : The RJ-45 is a single line jack for digital


transmission over ordinary phone wire. It is a 8 wire connector
which is commonly used to connect computers on the LAN(especially
Ethernets).

3. Hub : Hub is a device used to connect several computers together.

4. Switches : Switches are smart hubs that send data directly to the
destination rather than everywhere within network.

5. Repeaters :It is an electronic device that receives a signal and


transmits it. It is used to extend transmission so that the can cover
longer distance.

6. Bridge : A bridge is a device that lets you link two networks together.
Bridge are smart enough to know which computer are on which side of the
bridge.

7. Router : A device that works like a bridge but can handle different
protocols, is known as router.

8. Gateway : It is an network device which is used to connect dissimilar


networks.

Network Security :
1. Snooping : Snooping refers to unauthorized access of someone else's
data, email, computer activity, or data communication.

2. Eavesdropping : Eavesdropping is the act of secretly listening,


intercepting someone else's private communication, data, information.
3. Denial-of-service ( DOS ) : Denial-of-service attacks are those attacks
that prevent the legitimate users of the system.

Network Security Measures :


1. Authorization : Authorization is a security mechanism used to
determine user/client access to system resources, including computer
programs, files, services, data and application features.

2. Firewall : It prevent unauthorized access to or from a private network


is called firewall.

3. Intrusion Detection : Intrusion detection is the way of sensing when a


system or network is being used inappropriately.

Protocols :
1. http ( Hyper Text Transfer Protocol)
2. FTP ( File Transfer Protocol )
3. TCP/IP ( Transmission Control Protocol )
4. PPP ( Point To Point Protocol )

Internet : The internet has gained popularity and emerged as an


important and efficient means of communication. The internet is
world wide network of networks.

Internet Application :
1. E-mail ( Electronic Mail )
2. SMS ( Short Message Service )
3. Video Conferencing
4.Voice Mail
5.Chat
Network Security Concept :
1. Cookies : It is also called known as browser coolies or tracking
coolies. Cookies are small often incrypt text files located in a
text files located in a browser directories.They are used by web
developers to helps users to navigate their website.

2. Cyber Law : Cyber law is a term that encapsulates legal issues


related to use of internet.

3. Hacker : A hacker is a someone who seeks and exploits weakness in


a computer system or computer network. Hacker obtains advanced
knowledge of operating system and programming language.

4. Cracker : A cracker is also called black hat hacker. A cracker is an


individual with extensive computer knowledge whose purpose is to
breach internet security or gain access to the software without paying
royalties.

Other Such Imp Full-Forms :


1. ODP ( Open Distributed Processing )
2. GSM ( Global System For Mobile Communication )
3. CDMA ( Code Division Multiple Access )
4. MODEM ( Modulator Demodulator )
5. WLL ( Wireless Local Loop )

También podría gustarte