CBSE Class 12 Informatic Practices Computer Networking PDF
CBSE Class 12 Informatic Practices Computer Networking PDF
CBSE Class 12 Informatic Practices Computer Networking PDF
com
A PTE
H
1
R
C
COMPUTER NETWORKING
Learning objectives
Have you ever worked on Internet? Have you ever used an ATM? Have you ever
given the print command on a computer to get the printout on a printer attached
to some other computer? Have you ever transferred songs from your computer to a
cell phone or vice-versa? If the answer to any of these questions is YES, then you
have experienced and utilized the services of a computer network. In this chapter
you will study about various types of computer networks, their benefits, and what
is required to create computer networks.
Puzzle 1
Can you place 10 coins in such a way that they lie in 5 straight lines and on each line there
are exactly 4 coins?
Such situations are faced by the designers of computer networks. They have to think of
various ways of interconnecting the computers so that the specific goals of network setup
are achieved.
1
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Why do we have computer networks? Are there any advantages of networked computers
over stand alone computers? Yes, there are many. A few of these advantages are:
• Resource Sharing
• Cost saving
• Time saving
• Increased storage
Resource Sharing:
In a networked computer lab when print command is given on one computer the
document may be printed by the printer which is attached to some other computer. This
printer is able to print documents from multiple users on the network. It means that the
printer is being shared by more than one users. This is an example of resource sharing,
and this is possible only when the computers are interconnected to form a network.
Similarly other resources like Hard Disk, DVD Drive, and Scanner etc. can also be shared
on a computer network. Software resources like Application Softwares, Anti-Virus tools
etc. can also be shared on computer networks. You can very easily conclude that this
resource sharing also leads to cost-saving.
2
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Let us take one more example of a school. Here we assume that all the computers in the
school are connected to one main computer (called server). After the exams, teachers
have to exchange marks with each other for result preparation. So all the teachers enter
the marks class wise for their respective subjects at one centralized location and from
there the class teachers can copy the marks of their classes and can prepare the result.
This way data is shared on a computer network. Similar is the case with other
computerized organizations also.
Increased Storage:
All these advantages are there for a small organization like a school as well as for big
business organizations and for governments. Today, small as well as big organizations,
and governments keep their data on secured large scale computers called servers. They
share this data with authorized users. This ensures security. Customer care cells of
companies share the resources and data and they also communicate among themselves as
well as with customers with the help of computer networks only.
3
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Networking Hardware
To form a computer network a lot of hardware devices are required. Some of these
devices along with their functionalities are mentioned below :
Transmission Media
Computers on a network are able to share data and other resources. They are also able to
communicate among themselves. To make all this possible there must be some medium
over which the data can travel from one computer to another. A medium of data
transmission over a computer network is called a channel or a transmission medium.
Channels may be guided (wired) or unguided (wireless).
Wired Media
A number of various types of cables are used to transfer data over computer networks.
These are Twisted Pair Cable, Co-axial Cable, and Optical Fiber Cable. Let us know about
these in some details.
Twisted Pair Cable - This is probably the most widely used cable for creating small
computer networks. It contains four twisted pairs covered in an outer shield. These pairs
are colour coded. An RJ-45 connecter is used to connect this cable to a computer. It is of
two types:
UTP (Unshielded Twisted Pair): As the name suggests in UTP cables individual pairs are
not shielded.
4
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
• Due to its thickness (1cm diameter) and less flexibility, it is difficult to install as
compared to twisted pair cable.
Earlier coaxial cable was also used for connecting computers in small networks but now
UTP/STP cables are more commonly used for this purpose.
5
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
• Core - It is the thin glass rod at the center through which the light travels
• Cladding - It is the outer optical material surrounding the core that reflects the
light back into the core
• Buffer coating - It is the plastic coating that protects the cable from damage
and moisture
These optical fibers are arranged in bundles of hundreds and thousands and are protected
by the cable's outer covering, called jacket.
Characteristics of Optical Fiber Cable:
• It can carry data for a very large distance at a stretch.
• Not susceptible to electromagnetic fields
• Specially skilled people are required to install optical fiber cables.
• Till date it is the most expensive and at the same time the most efficient cable
available for computer networks.
Comparison of wired media
6
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Wireless Media
Electromagnetic waves are used for wireless communication over computer networks.
Frequencies of waves are measured in Hertz (Hz). As the frequencies of electromagnetic
waves change, their properties also change. Based on their frequencies, electromagnetic
waves are categorized into various categories. These categories are (in increasing order
of frequencies): radio waves, microwaves, infrared radiation, visible light, ultraviolet
radiation, X-rays, and Gamma rays.
Electromagnetic Spectrum
Category Long Radio Radiowaves Microwaves Infrared R O Y G B I V Ultraviolet X-Rays Gamma
Rays Visible Light Rays Rays
Frequency Less than 3 x 103 to 3 x 108 to 3 x 1011 to 4.3x1014 to More than 1014
3 9 11 14 14
(Hz) 3x10 3 x 10 3 x 10 4 x 10 7.5x10
Out of these only radio waves, microwaves, and infrared rays are used for wireless
communication. Let us now study about these waves in some details.
7
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
(Recall when you throw a stone in a pond, circular waves are generated and
spread outwards. Similarly, radio waves are generated by the transmitter and
spread in all the directions.)
Micro Waves - Micro waves have a frequency range of 300MHz (0.3 GHz) to 300 GHz. This
range has some overlapping portion (0.3GHz - 3GHz) with radio waves as there is no clear-
cut demarcation between radio waves and micro waves. Microwaves travel in straight
lines and cannot penetrate any solid object. Therefore for long distance microwave
communication, high towers are built and microwave antennas are put on their tops.
Distance between two microwave towers depends on many factors including frequency of
the waves being used and heights of the towers. These waves travel in straight lines and
therefore the sending and receiving antennas have to be aligned with each other.
In the big cities where land is very costly and a lot of formalities have to be completed to
get permission to dig land for cabling, microwave antennas can be put on top of high rise
buildings and communication can be started in a short time.
8
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Micro Wave
Micro Wave
Office 1 Office 2
Micro Wave
Tower
9
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Bluetooth - Bluetooth technology uses radio waves in the frequency range of 2.402 GHz
to 2.480 GHz. This technology is used for short range communication (approx. 10m) in a
variety of devices for wireless communication. Baby monitors, door openers, and cell
phones are some of the devices that utilize Bluetooth communication.
Satellite Link - Satellite links are used for very long distance wireless communication
which may range from intercity to intercontinental. Transmission from the earth to a
satellite is known as uplink. Transmission from a satellite to the earth is known as
downlink. There are multiple micro wave frequency bands which are used for satellites
links. Frequency used for uplink varies from 1.6 GHz to 30.0 GHz and that for downlink
varies from 1.5GHz to 20.0GHz. Downlink frequency is always lower than the uplink
frequency. For example, the uplink frequency is 6.0GHz, and the corresponding downlink
frequency is 4.0 GHz. A communications satellite is a relay station in orbit above the earth
that receives, regenerates, and redirects signals carried on a specific frequency. The
satellite system is very expensive but its area coverage and fringe benefits compensate
for the expenses. Communication satellites are normally owned by governments or by
government approved organizations of various countries
10
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Communication
Satellite
Orbit
Uplink Uplink
Downlink
Downlink
Earth Earth
Station Station
Europe Asia
Communication
Medium
Guided Unguided
(Wired) (Wireless)
11
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Network Devices
Other than the transmission media many other devices are required to form computer
networks. Some of these devices are:
NIC: Any computer which has to be a part of a computer network must have an NIC
(Network Interface Card / Unit) installed in it. A computer communicates with other
computers on a network with the help of an NIC only. Now a days, in most of the PCs and
the laptops, NIC is an integral part of the motherboard.
Socket for
RJ-45
Connector
Hub/Switch
12
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
A Hub is an electronic device that connects several nodes to form a network and
redirects the received information to all the connected nodes in broadcast mode.
Switch: A switch is an intelligent hub. It looks exactly like a hub. It has the same function
as that of a hub: to connect multiple computers/devices in a network. But the difference
between the two is in the way they re-transmit the received information. Unlike a hub,
instead of broadcasting (sending to each device attached to it) the received information,
a switch sends the information selectively only to those computers for which it is
intended. This makes a switch more efficient than a hub.
Repeater: When the data is transmitted over a network for long distances, the data
signal gets weak after certain distance. This distance depends on the data transfer range
of transmission channel being used and can be from a few meters to a few kilometers. If
the signal becomes weak, it cannot reach its destination. Therefore, some device is
required which can re-strengthen the data signal before it gets too weak. Repeater is
such a device. A repeater regenerates the received signal and re-transmits it to its
destination
Gateway: There are a large number of computer networks in this world. As common
examples you can consider your school's computer network, ATM network of a bank, a big
company's computer network spread over a city, etc. There are thousands of computer
networks that exist. These networks use different hardware and software. Many times
these networks need to communicate with each other. For example, companies X, Y, and
Z do business with each other and therefore they want to interconnect their computer
networks. Another example is the internet which contains a large number of different
types of networks spread over the globe. Different networks are sometimes incompatible
13
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
with each other. It is like a group of persons using different languages for conversation.
When two or more networks using different hardware and software have to be
connected, some device is needed which can translate one network's language into the
other's. A gateway is a device, which is used to connect different types of networks. A
gateway is capable of understanding address architectures used in different networks
and seamlessly translate between these address architectures.
Network Topologies
Before we start discussion on network topologies, let us understand the term 'NODE'.
Any device (Computer, Scanner, Printer, etc.) which is directly connected to a computer
network is called a node. Suppose you are working on a PC at your home and then you
connect it to internet. As soon as it becomes a part of internet (which is a computer
network), it becomes a node. Similarly, in your school, all the computers which are linked
to school's computer network are nodes.
Once we know about different communication media and devices to form a computer
network, we can procure these media and devices and start constructing a computer
network. Suppose we have 10 computers and we want to interconnect them to form a
network. How can we interconnect them?
Recall the puzzle given in the beginning of this lesson. Is that not similar to the problem of
connecting nodes in a network?
14
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Bus Topology: In bus topology all the nodes are connected to a main cable called
backbone. If any node has to send some information to any other node, it sends the signal
to the backbone. The signal travels through the entire length of the backbone and is
received by the node for which it is intended. A small device called terminator is attached
at each end of the backbone. When the signal reaches the end of backbone, it is absorbed
by the terminator and the backbone gets free to carry another signal. This prevents the
reflection of signal back on the cable and hence eliminates the chances of signal
interference.
Node Node-Printer Node
Backbone
Terminator Terminator
Node
Node (Server) Node Node
Bus Topology
• It is easy to install.
15
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Star Topology: In star topology each node is directly connected to a hub/switch. If any
node has to send some information to any other node, it sends the signal to the
hub/switch. This signal is then broadcast (in case of a hub) to all the nodes but is
accepted by the intended node(s). In the case of a switch the signal is sent only to the
intended node(s).
Node Node
Hub/
Switch
Node Node
• It is easy to install
Tree Topology: Tree topology is a combination of bus and star topologies. It is used to
combine multiple star topology networks. All the stars are connected together like a bus.
This bus-star hybrid approach supports future expandability of the network
16
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Tree Topology
• Even if one network (star) fails, the other networks remain connected and
working.
Network Protocols
A computer network can be set up after procuring all the required hardware. But the
network devices will be able to communicate with each other only after they know the
rules of communication. Think of a group discussion session where all the participants can
speak. Each participant can speak a lot. But the group discussion can be started and can
be conducted well if each participant knows the rules of discussion. If all the participants
start speaking suddenly and suddenly they stop, or a person stands up randomly and starts
interrupting the discussion, or any such thing happens, the group discussion cannot be
conducted at all. A more complex situation exists in the case of computer networks where
the participating devices have no common sense and they follow each defined rule to the
T. So it is essential that the rules of communication are very well defined. A set of rules is
also known as a protocol.
17
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
There are a number of protocols defined for computer networks. Here we discuss three of
them - HTTP, TCP/IP, PPP.
HTTP (Hyper Text Transfer Protocol): HTTP is used to transfer all files and other data
(collectively called resources) from one computer to another on the world wide web.
When an HTTP client (a browser) sends a request to an HTTP server (web server) , the
server sends responses back to the client. This transfer of requests and responses is done
following HTTP protocol.
PPP (Point to Point Protocol): It is a protocol for direct communication between two
computers, typically a personal computer connected by phone line to a server. Most
Internet service providers (ISPs) use PPP for customer dial-up access to the Internet. PPP
is used over many types of physical networks including cellular telephone, serial cable,
phone line, trunk line, specialized radio links, and fiber optic links.
Know More!
There are a lot of other communication protocols like SMTP, POP, UDP etc. You can
explore the net to find more about these protocols.
18
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Types of Networks
A computer network may span any amount of geographical area. It can be on a table, in a
room, in a building, in a city, in a country, across continents or around the world. On the
basis of area covered computer networks are classified as:
A PAN
When you have to transfer songs from one cell phone to another, you set up a PAN of two
phones. When files are transferred from a PC to an MP3 player, a PAN is set up between
the two. There can also be multiple devices in PAN. A PAN can be set up using guided
media (USB cable) or unguided media (Bluetooth, Infrared).
19
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Warehouse
Branch Office
Central Office
A Metropolitan Area Network
Factory
20
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
LAN
PC
PC PC
MAN
LAN
A Wide Area Network
21
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
The following table summarizes the characteristics of PANs, LANs, MANs, and WANs.
Parameter
Area Covered Small Area A few meters A city and its Entire country,
(Upto 10m to a few vicinity continent, or
radius) kilometers (Upto 100Km globe
(Upto 10Km radius) (No upper limit)
radius)
Once a network has been set up, the nodes can communicate among themselves. But for
proper communication, the nodes should be uniquely identifiable. If a node X sends some
information for node Y on a network, then it is mandatory that nodes X and Y are uniquely
identifiable on the network. Let us see how this is achieved.
MAC (Media Access Control) address: Each NIC has a universally unique address assigned
to it by its manufacturer. This address is known as the MAC (Media Access Control) address
of the card. It means that a machine with an NIC can be identified uniquely through its
NIC's MAC address. MAC address of an NIC is permanent and does never change.
MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By convention, MAC
addresses are usually written in one of the following two formats:
MM:MM:MM:SS:SS:SS
MM-MM-MM-SS-SS-SS
22
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
The first half (MM:MM:MM) of a MAC address contains the ID number of the adapter
manufacturer. The second half (SS:SS:SS) of a MAC address represents the serial number
assigned to the adapter (NIC) by its manufacturer.
00:A0:C9 : 14:C8:35
The prefix 00:A0:C9 indicates that the manufacturer is Intel Corporation. And the last
three numbers 14:C8:35 are given by the manufacturer (Intel in this example) to this NIC.
IP Address: Every machine in a network has another unique identifying number, called its
IP Address. An IP address is a group of four bytes (or 32 bits) each of which can be a number
from 0 to 255. A typical IP address looks like this:
59.177.134.72
On a network, IP address of a machine, and not the MAC address of its NIC, is used to
identify it. Do you recall IP protocol? IP protocol identifies a machine with its IP address to
route the packets.
MAC address is used only when a specific machine is to be targeted. For example, suppose
we want to block a specific PC to access some network resource. If we use the PCs IP
address, then the PC is not blocked permanently as its IP address may change when it
connects to the network next time. Instead, if the PCs MAC address is used for the
purpose, then the job is done!
23
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Know More!
There are two versions of IP addresses: version 4 (IPv4) and version 6 (IPv6). IPv6
uses 128 bits (IPv4 uses 32 bits) for an IP address. Using IPv4 only 232 (approximately
4 billion) distinct devices can be addressed. In the current scenario and in the near
future, this is a small fraction of the number of objects which need to be allocated
IP addresses. As the human population and also the number of devices which need
to be online (mobile phones, home appliances, personal communication devices,
etc.) is increasing at a very fast pace, IPv4 addresses are being exhausted. To
address this problem IPv6 was developed and it is now being deployed. Using IPv6
2128 (approximately 4 Bn x 4 Bn x 4 Bn x 4 Bn) distinct devices can be addressed. IPv6
also includes an important feature: a set of possible migration and transition plans
from IPv4.There are many other features of IPv6. You can explore the internet and
find more information about IPv6.
IP Address Vs MAC Address: You might wonder how an IP address differs from a MAC
address. In fact, the IP address is assigned by the network administrator or the internet
service provider while the MAC address is assigned by the manufacturer. Thus if a
computer is transferred from one network to another, its IP address gets changed where
as the MAC address remains the same.
From the IP address it is usually possible to track the tentative location of the computer
but this is not the case with a MAC address.
24
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
A domain name usually has more than one parts: top level domain name or primary
domain name and sub-domain name(s). For example, in the domain name cbse.nic.in, in
is the primary domain name; nic is the sub-domain of in; cbse is the sub-domain of nic.
There are only a limited number of top level domains, and these are divided into two
categories: Generic Domain Names and Country-Specific Domain Names. For example:
·mil - Military
.in - India
·au - Australia
·ca - Canada
.ch - China
.pk - Pakistan
.jp - Japan
.us - United States of America
25
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Domain Name Resolution: Domain Name Resolution is the process of getting the
corresponding IP address from a domain name. It happens as follows:
Suppose you mention a URL in the web-browser to visit a website. The browser first
checks your computer to find if the IP address of the server corresponding to the Domain
Name (embedded in the URL) is present. If this address is present then with the help of
this address, the corresponding server is contacted and then the website opens in your
browser. Otherwise the browser sends this domain name to some specific servers (called
domain name servers) to find the corresponding IP address. Once the IP address is known,
the server is contacted and then the website opens in your browser.
Know More!
Network Security
Computer networks are communication highways on which the data travels. Data travels
on a network when an e-mail is sent or received, any transaction is made using a credit or
a debit card, a web site is accessed, chatting is done, or any other work is done on a
network. Data travelling over a network is vulnerable to attacks and thefts. There are
some people who want to illegally access this data for any reason: using a credit/debit
card data for shopping, using a company's data to sell it to some rival company, to find the
kind of web sites a person accesses, or may be hundreds of other reasons. These people
26
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
may sometimes also want to destroy the data on its way, or block the services of some
resources or sites. As the data goes from one point to another point on the Internet, for
example, it may pass through several points along the way, giving other users the
opportunity to access, and even alter it. Even other users on your system may maliciously
transform your data. Unauthorized access to your system may be obtained by intruders,
who then use advanced knowledge to impersonate you, steal information or even deny
your access to your own resources.
Denial of service attacks: A Denial of Service (DoS) attack is an attempt to make one or
more network resources unavailable to their legitimate users. Examples of such attacks
are:
Snooping - Have you ever tried to read someone else's slam book secretly? This is
snooping. Have you ever tried to read what someone else is writing in his/her
letter/email to someone else? This is snooping. Do you think your parents try to secretly
check your mobile phone to find its contents? If yes, then what your parents are doing is
snooping.
27
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
• Using some softwares which keeps track of the activities and data being sent or
received on someone's computer.
Eavesdropping - Do you ever find that when you are talking to someone else, another
person is secretly trying to listen to your talks? What that person is doing is
'eavesdropping'. Have you ever tried to secretly listen to the conversation between two
teachers regarding your class? If yes, then what you have done is 'eavesdropping'.
• By installing some receiver which captures the data while on its way.
Login-Password: By assigning login names and strong passwords to the users of a system,
it can be ensured that only authorized people access a computer. This helps in increasing
the computer as well as network security. A strong password is the one which is easy to
28
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
remember for the user but difficult (almost impossible) for the others to guess
successfully. On the other hand a weak password is generally the name of a person or
organization, the registration number of a vehicle, year of birth of a person and so on. A
weak password can be cracked in a few attempts. Examples of strong passwords may be
raavanisdead (raavan is dead - with spaces removed), 2aur2paanch (name of an old Hindi
movie) or anything like that.
Anti Virus Software: These days anti-virus softwares work against not only the virus but
also against almost all kinds of malware. Therefore by installing a full version legal (not
the pirated one or freeware) anti-virus software network security can be increased.
Think of a hypothetical Educational Society (say XYZ Educational Society) with its head
29
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
office in Chennai (Tamil Nadu) and schools in various parts of the globe. The society is
setting up a new senior secondary school, 'SF School', in Bahadurgarh (Haryana).
The 'SF School' will have 3 computer labs with 30 computers in each, 1 Accounts office
with 3 computers, 1 Administrative block with 5 computers, and 1 Principal's office with 1
computer. Let us see how a computer network can be set up in the school.
First of all we can draw a rough sketch of the school with computers at various locations
as follows:
Computer Lab1, Computer Lab2, Computer Lab3, Administrative Block, Accounts Office.
These LANs can be set up in STAR topology using UTP cable (economical, reliable, and
easily available). For this 1 switch (with suitable number of ports) will be required in
each of these buildings. More than one switches can be used in computer labs if a switch
with more than 30 ports is not available.
Two internet connections (broadband for high speed) can be procured in Administrative
Office. Two connections should be procured from two different ISPs so that
(i) Internet connection in Administrative office can be kept separate from the
other Computer labs where students may do a lot of experimentation.
(ii) If one internet connection is not working, the other can be used in case of
urgent requirements.
30
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Server (if any) of the school may be placed in Administrative block so that it remains safe
(physically) and a firewall can be set up so that the whole network remains safe from any
kinds of virus or intrusion attacks.
There is no need to do any extra efforts or expenses to link the school to its head office.
This can be taken care of using the internet connections.
SUMMARY
• A computer network is a collection of interconnected computers and other
devices which are able to communicate with each other.
• Communication Media are the links over which the data is sent from one node
to another over a network.
• Hardware devices used to form a network are: Cables, NIC, Hub, Switch,
Repeater, and Gateway.
• Repeaters are used to regenerate the signal which gets weakened during its
transmission. Repeater are generally used to connect two networks which are
more than 80 m apart.
31
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
• Denial of service, snooping and intrusion are some common threats for network
security.
Future Trends
4G Technology
The scenario of how computers are networked is changing very fast. Before full
implementation of a technology, a new technology is visible at the horizon. One
such new technology is 4G. 4G stands for fourth generation of mobile technology.
Change from one generation to another involves a major advancement in the
technology used. 1G technology was used in the first mobile phones. 1G used
analog radio signals. 1G was introduced in 1980s and continued until 1992 when
2G was introduced. 2G technology used a digital format and introduced text
messaging. 2G also introduced data services for mobiles, starting with SMS. 3G
technology has introduced more efficient ways of carrying data, making it
possible to have faster web-services, live chat, fast downloading, video
conferencing etc. over mobile phones. Today we are living in the world of 3G.
Soon, 4G will rule the mobile market. Unlike previous generations of mobile
technology, 4G mobile technology will be used for internet access on computers
also, and it will be totally wireless! 4G will provide internet access, high quality
streaming video and "anytime, anywhere" voice and data transmission at a much
faster speed than 3G. The "anytime, anywhere" feature of 4G is also referred to
as "MAGIC" (Mobile multimedia; Anytime/anywhere; Global mobility support;
Integrated wireless solution; Customized personal services).
32
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Cloud Computing
This is an emerging area of demand based resource sharing, resulting into drastic
saving of energy and cost. This is also referred to as 'Green IT'.
EXERCISES
MULTIPLE CHOICE QUESTIONS
1. Which of the following topologies is a combination of more than one topologies?
a. Bus b. Tree
c. Modem d. Microwaves
33
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
7. Snooping is
8. A repeater
a. PANs b. LANs
a. A URL b. An IP address
2. What is meant be communication channels? Give two examples of guided media and
two examples of unguided media.
a. Setting up a LAN
g. Communication within a city and its vicinity where cost of cabling is too high.
34
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Factory A
Administrative
Sales Office
Office
Factory B
35
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
Factory A to Factory B 50 m
Administrative Office 15
Factory A 25
Factory B 18
Sales Office 15
1. Suggest a cable layout of connections between the buildings so that each building is
directly connected to Administrative Office.
2. Suggest the most suitable place (i.e. building) to house the server of this production
unit with a suitable reason.
(i) Repeater
(ii) Hub/Switch
4. The Administrative office of this unit is to be linked with the head office situated in
Patiala (Punjab). What will be the most economical way to do this? Justify your
answer.
36
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
LAB EXERCISES
1. Find the IP addresses of at least five computers in your school.
2. Find the MAC addresses of at least 2 computers in your lab. Then verify their
manufacturer's name on the net.
3. Find the layout of LAN in your school's labs. If you think some modifications can be
done in the layout, note these down in your notebook.
• All the computers in the school should have internet access. (The school does
not want to have any other new internet connection.)
• For internet access a computer should be dependent only on one point and not
on multiple points. It means that if the internet connection is active, any
computer should be able to access it directly irrespective of whether some
other computer in the school is ON or OFF.
• Any two computers in the school should be able to communicate with each
other irrespective of whether any other computer in the school is ON or OFF.
The job of each team is to design a layout for this new network structure. Each team
has to specify
37
Downloaded from www.studiestoday.com
Downloaded from www.studiestoday.com
COMPUTER NETWORKING
• How the design will be able to fulfill all the mentioned requirements.
2. Find the average price and specifications of each of the following network devices in
the market: Switch , Cable (UTP), LAN Card. Each team has to specify:
• Different types of switches available in the market, their prices, and number of
ports.
• Names of brands of UTP Cable available in the market, along with their prices.
• Different types of LAN cards available in the market along with their prices.
38
Downloaded from www.studiestoday.com