Open navigation menu
Close suggestions
Search
Search
en
Change Language
Upload
Sign in
Sign in
Download free for days
0 ratings
0% found this document useful (0 votes)
77 views
30 pages
Untitled
Uploaded by
Aritri Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Download
Save
Save Untitled For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
0 ratings
0% found this document useful (0 votes)
77 views
30 pages
Untitled
Uploaded by
Aritri Saha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content,
claim it here
.
Available Formats
Download as PDF or read online on Scribd
Carousel Previous
Carousel Next
Download
Save
Save Untitled For Later
0%
0% found this document useful, undefined
0%
, undefined
Embed
Share
Print
Report
Download now
Download
You are on page 1
/ 30
Search
Fullscreen
Py ye Ghesk ‘| bone —____C964903) 994). Cyan. Cntina)f Gffenien “Aslan Conbitel ‘ajainad indidadd 6h gmp of || Cnbividual wk we exiniad meliye to cohuhionally Rom te pofutolion or LAs of plrysical or trontnl Rarrin of He viefim wing odin Folecommunicilden Seiten hk such os Grheact and nobele phone xakie Carplain! la feluce Setlisn Coyle Cries hrauck of folio Shu) By te nafvork ininfaces oF fe dbo Unk flyer, Cue NIC raimrk jteaface \ cosd) Ras a het Lardoare adiies ond Hot 5 Mic adcless. (2 IPC etoud Aetecel’) adds is a mmercal Mba assiiyed fo each devia froilicipiling h-W.tompuler nehirak Mab uses TH/TP « St ses tow Uodificshin, — @het a natrork ibiipace Wb-hficslion, © rede Or Mecedion nAdieasting . Sch TH kien Ros en Pt es cack serleinin Leyte ard aporobl 2 eed Ga eb) pene Pine (media ciccan corbet) bres Bo ite tein given. Denain Nome ie: Frais name SDS dae as aapet a paslicnler dsebsi ond refresh Me name of Aeramp ke sow aton, a lec fers shore. Donaininames are formed byt subsof ONS. URL Clumiporm Resource docater) o wth addwes St & a specific. Chesackor. Ateing tot makes he reforonee Bf fo a rosewree (websib Shel), ”— St fas thaws foods 2 @ Neck protocol, OHetnane o adlrey OF —- or heseuree focalion, ye BY Mp2 //on. Bxanfl org [rsiki [Mainpage ir : Sn fhe albore Cranfle 2» Atle > protocol . 21. Cxamph. org [usiki > Soot rama Heda tag =x pbnane iid eeE-mail alms ++ a sfecific Cheywalr shiny Hat idostifies specific eneil aecout: St has thon forbs, sparta by @ Symbol. Se Llefifiy tee pas = © Bingen Email Aewien provider's Wedd and a ® user's ideabity - Bs abe@ Yahes.com In above erampl, abe = als Wey ohse.etm 3 provides Tui, . Cer secietNujbig) Web 2-0 + & He commend Sti ef online Fechnology, dy Qrealin user. Zdfradtivily 2 Collabortion mean Powasine a Tehwerk connselivity and enhanced Communication Channel, , 1. Fie classifiation ef infinshen Che sidldig existing cburifcliny 21 Rich Woe, Sxperiinee- (using Aaa) > Dnamie Hb prse. i> Geaahi Mops. aston bts, 3. User as conbributer.Cevalnctlion, Renew 2 Corarunding ), 4+ User pollilbaks om conbunh Sines). \ S. Gosie Trt (no TPR, Coneukk we avaibbh to shark, rouse, __ Padi sFribeda. €:- Wikipedia) vl _—_- i Web ite Leb Sage is am elechrenie document: davicned using HTML. KH Uisplays cofermétion in teat vr grophie form -Hyportink 4 und te Prawns ‘ frem on page to anotir.. f abot sa At of jalited aebgeges ae Beved from _ tpl Heres. Websiby ow acenible via atonb Cr privale LAN Yosh an trhant oddves Known ay URL, Ml prlilicly atetysibl websites celhel why contteh Te tld piel yah (wisi), Wit 3s Ue wth colichin of todad Hearty 44 fap5, Sud tn millions of Coafvters aud LaFay| BaLed Hoag hing Web Brews 2 4 a Sofhson ofpliccdion for actroving, Preserting ancl troverding 2rformilion Susouncss en He Worl Wide ab -\ 2 im-Coegh Chron, Fiefin, dobov’h Ssflren, Shona, Soni < sis Aorachringd ore faa Ghesh. A (%6 cleoesaed ES ele Se in“ 1B the anewst-of digi dts Pranfoad 2. wait bps ( bik Pres_ second!) Kips lila bib fn stems) = loro bps. 7 Hers Sep ee at ane Ain hip Beles ps nt anttah ~ palad cites id oi} A bawd = A bps /s- 2 - Malisane. (Macks of Gmfuly SecwtyD »_Vinwes Wow Freon Howe Spam: 2+ Reflicnty bof FRplicdy ihelh [Hen Sf eplivatng [+ Feely He
legal seam secegrition of Aigitel signdinn - “I ae ” ~> ebecPrenic clecemenks + ‘| Cyber fois Cipher Las opens be all #e legal and regulatory aspects of Onforek and I He wld wide’ cocb, tncluSog dakellecFial Prepoty privoey and fradon ef oper, 1 TPR (Snkliichual Propody Ril) A TP A a bagel conespF chick sufors te erection of Wa mind ancl Per 4c nuiph arn succgnised + Zndusbriak porpety t= snvetions faded), tradenanky inclushaial sigs and gesqraphic cndlections of S000. Copy Risks i= Litowsy ond artistic Sek (e9:. novel, Pan, films, musical eserk, parting, petosraph TV brcadeailns prespan, artish? forfermancs oe). flPiya Clos! oe” (4694039994) 7 fo. Malik. Gumeniclion 3-5 0 ghbally =" Oeecpled shudard fos. cltyiiak callulbn communication G&M Za Jk sfandea\ Laer Gf th 2G Technology 4 allows 3 Bimallentaes calls on the Some rally Aacqmeney. - GPRS C Generel, Pace jualle wake) = Sa packs oriented mobi. dah, sevice en Hk 26 Gnd 3G Cellier Commaniccdlon ystems 7 Ghobat Aystem dex mob Communications . z { © ctl GSM and GPRS, ine TDMA (ine Mivicion Multiph pecs) BB ichralegy, tt G0dS aan ofaedd 00 GSH, oth = _* GSM suppor wsice for and Ciseuit dnt — bed nekpackeh. GPRS Can Ne Hength of as a pocket bh ovdleg on GM. _ GPRS. 3 seplaced by EDGE (BJanced Bala Rates for Globak Baaludion) _ ahi Ros arrage pufermonca about Hret tines Pak of GORS. [= And EDGE G Seeing aspfaced Ay UMTS (36) clehke nerves : Wath de 4G cverdion of GSM being LTE (long term Felten), CEMA Coad Sivision rudipl acces) 3 0 Digital eeblulea teks : «Dt dees net aatign. eRe pals Bh oper RI q WLL (Nidal Local oop) 3.5 an deal opPicodion Io Provide Aeliphens sorsiee fo 0 jameli swsol aria. Te Syston 2} Based ox as Poll- doplex gadis rebsouk FoF Provides Ieeal Febplone— Uke kerwiee -~ _Brenty & Grorp of wiih én andes, Comuch Prough. Rolie Link 3a te nabionh til phere vohirork, : : SMS Chet Message Sewite) = 45 te ability fe send Od racine iz fat ruseees te and Bom mobil plone, suse bedvced ole GM” igihi mobile plan Airlind 5 on oppGcdlion « Ta aS ee te Cig EE ES= SIM CGabseuler ehity anodabe) 3 @ Srafcond tab Shexs dade — fos GSM Cellule. tpl abseilers. cuck alah fncladlas user idby —_ hecalion aad Prox nants.) nehunk cuilesigétion dole, Beastral I —__ eeunity keys, corinch DS and ate ressages Re jae = suey Ae process of Aboing o Mebsife ona web saver To Teh —__& accesible on the Inka, 4 Gel Sik fg refos te He clas of conf rages on Bh Tt = Sah KF on oxenbh ellend -side By A wer's wh Moose. Ot & oo ~ cop edok Bok of Aynamic HTML (DH TM) Bnew pore Taming, Mal = embtranf . ie ‘TavaseupF VBS eupf, : ~__Sun- sith soy: 3 0 wh Gum technology bn while a usesly Sieh Retest & felipe Wy secamng a Soubt disechty on Ye weh Pe Le gereralt Tpramie wh Bags &2- ASL, TSP, Pop. Se = He Bforenet Grier lint Shy Stoipting and Sovve-Sile (aah Scuplis 4 ap A = de Client ade Seubling, “Ye goa bb are aun by Hm view ueb brew Fae 7 thy, tm ewes He SPUE oon ane divclly om He ob Bv__—E % dk fainaiip. cBowndoope Te tower 20 fling Th abl, Ba ~_ 4b Ry Seshise Mefore Bel oR sin raguirnank, = Ate als ey query inte dele shorss . xh An = :Emetl t= Emel 4 sending ank seceivtns mains ra aibanP Fal sactoanhs han, Offi carmaamienhorr | hot t- Brlie Aud ddr COommuntoom, pasa, © Vides Conferoneing te Ot means far % mou peopl Jan, ond Sa kack ~ Che, | for whibbaord and oho, applicabions , A ~ NoionMail t. Ao conbelized sysfem of morning, Aeloplens moiingag > ~ fea dwep aronp of peop.1 Phija Chest a 644051994 hk = ohiy, E29 ison teisom 16,26, 2Gand 4G. co — ‘ aot | ot | — yw Genndien Mobib| 24 Gowen | S* Groowe | PRGenome -=- ~ T Nd, i = bo Techelogy [AMPS (Moone | 15-95,G5M | IMT-20%, LTE, WiMex x Hebik, Plas Ssh) WCDMA . th NM, TACS 6 T_ 7 yh. Mubipe | FDMA TMA, coma | CDMA CDMA address Crime Bivvivon | (Co Givisien seals ‘System otiph acces) oul fR ACD 7 _ Speak * Lag keps lag) 147% Kops BL Mbes 100 Mbps 1 Gee ((Aahe Rak) = HK arb boven! Fargas Vike aly Voice: & Deda eee £ OR Weieg B Data “ike ties | Cane ami) | Gnas at ama Bcd RS Thy Band Ife | Norkpx band | Navees bad | Wide Band Uhm Hide Bod 2 i= _ — Aypdicition| voice Cally | Veice Calls, | Viste Confouncing | High Spock e ‘ Sherk menses, | mabile TV, GPS. [abpieclion, ne Assasins, mobile TV, tL Cea Wearable Aowicoy, , = eh a ‘ = Advantage Simpler vohsork Mubbimedia Tigh seewbhy, | Spd, MIMO” ~ elma fraburss(CMS, [Fnhrmbionoh | technalegy , 93 [Pm Sebel | nscumingy GloBel meb iNT. access Gnd 3 _. SIM inkodueol Iv = Linx :Ee = WiFi B aie Wiss Fidalidy) Pectmaay, Appicaiow Wireless TAT Romge Loom 80- 90Km. — Gab Jransfor fale uph 54 mbps 40 mbps (pad) ii Chammel bardesiddh 20 Mig i page from | 125" MIB - 20 M3 | — Fephicaion %& wade Fe sowe Seuves A larger 4 fe Rodel on Eds ofowile hark | coped al of Shem bed Eh enboreonnechivily . Provide inert Sowics)el)) | = Canniely pom, a Uaages en, tle 2b ||| aa A compud, gaming [7 Con Bene Rensehoty, | Consol fo rod. mobil flows aad ven sc Niki Spo - _ Wikite 4 4 iy Hat allosss’ cliehtmie Chivers Lo connect & a isueltyy LAN, oReh as Poswodd fohechd, dual may be open Seb || aniy ataay Utthin fle rawgsR Can oceces, He paseuners of WLAN nehiork, \ WiMex = Goan EP bad, wives Bisa bad accan tneleoy _ Bok provilys pafernances of Mates WiFi ath fhe Coverage end G05 (quality of Suwiee) of Cellular wihoorks. TATNE Cifetat malop Eogoge) Ss Soe Taped als Te} Bevebnn ond Lalevion ofa nck fox SUG waite Back wah Pros Cc KML (extent mankenp Besuapg)n O70 Uinguase Tok Kelpte disenie He pranlanp longer~~ | Ee WH : L ——__| OSK - OPEN sycrEm INTERCONNECT) On | lan -~ LOCKL AREA wETORK oo MéN — METROPOLITON _ WAN - — WibE u " ” : — PAN PERSONAL. a x 7 HTML HYPER TEXT MARKUP LANGUAGE DATML DYNAMIE® 5 ee HTTP HYPER TEXT TRANSFER PROTOCOL. FTP FILe TRANSFER — PROTOCOL ae Teeze TRANSHISSION CONTROL PROTOCOL | INbeind Prof ‘ Telnsk Tebbpe Nehiok, : : SHTP Simble Mail Jomsfn Propet s ) PoP Pest Bhi. Profecot L IRE rbernt Relay Char : Vol? Vein Over Dhand Rodeo a ee Wan TMannhouk ihwmk Jyh cond [bes Athy for second; aimlady Woes, Gbes 2 band: 4k achaly ey & we. woh? \ TPR Tehicha propetty, Ri a = rag Mellin Feesss Ls [ ae TP Bihan Profoeot = ;: ONS Donan Nant System, . aa URL Uniform Rescwra Geos : : E-mail tleelenie Maule x e . Gsm Globe System Jor Mobil. a —_ = : | “| Gers Gert facet Rake Savin, | EDGE Erfomces Botn Rotts for Gsitlopa CDMA Cede Bivtion Mellifl heews OHA Pasqnency WLE Hirelss Aocok Loop - oo . : SMs 7 Shout Message Sowia, 8 MMs - Mubkioadin Messaging Senviet« - a SIM. Snbsertbe, Sdimbify Medke : WiFi Wirabs Fidel: a i" WiMoa» —— WOUWide Srhogperabiliy for Micretionre Access WWW Horld Wide Webeae ellen Sst a ~ IPR “adsisce “pepaneT i Alvancih Reenich Prjeck Ngoney ebsesk Point te — Oink Probecol’ peepee XML Exfemsibe Marke Conguage » 2s Bhah “uke? Focile ep —Mopgm _Melvister- Benedtert { { 1 1 1 1 1 CaF Network topologies and types Topology + Topology refers to the way in which the workstations attached to the network are interconnected. The BUS Topology: - The bus topology uses a common single cable to connect all the workstations. Each computer performs its task of sending messages without the help of the central server. However, only one workstation can transmit a message at a particular time in the bus topology. Advantages: (i) Easy to connect and install. )) Involves a low cost of installation time. Gii) Can be easily extended. Disadvantages: (i) The entire network shuts down if there is a failure in the central cable. (ii) Only a single message can travel at a particular time. (iii) Difficult to troubleshoot an error. The STAR Topology: - A STAR topology is based on a central node which acts as a hub. A STAR topology is common in homes networks where all the computers connect to the single central computer using it as a hub, Advantages: (@ Easy to troubleshoot ) A single node failure does not affect the entire network. i) Fault detection and removal of faulty parts is easier. /) In case a workstation fails, the network is not affected. Disadvantages:- (i) Difficult to expand. ) Longer cable is required. iii) The cost of the hub and the longer cables makes it expensive over others. (iv) In case hub fails, the entire network fails. The TREE Topology: - The tree topology combines the characteristics of the linear bus and the star topologies. It consists of groups of star — configured workstations connected to a bus backbone cable. Advantages: i Eliminates network congestion. Gi) The network can be easily extended. (iii) Faulty nodes can easily be isolated from the rest of the network. Disadvantages: (i) Uses large cable length. Gii) Requires a large amount of hardware components and hence is expensive. (ii) Installation and reconfiguration is very difficult. { ' { 1 1 t 1 1 1 i | t t t t Types of Networks: LAN (Local Area Network): A Local Area Network (LAN) is a network that is confined to a relatively small area, It is generally limited to a geographic area such as writing lab, school or building. It is generally privately owned networks over a distance not more than 5 Km. MAN (Metropolitan Area Network): MAN is the networks cover a group of nearby corporate offices or a city and might be either private or pub) WAN (Wide Area Network): These are the networks spread over large distances, say across countries or even continents through cabling or satellite uplinks are called WAN.i i i { 1 t t 1 1 t { ' t { 1 t { 1 ' 1 t 1 1 ' { { t t { 1 t ' 1 t { 1 ' 1 1 ' 1 | ' | ' { 1 t 1 | 1 t 1 { inchs PAN (Personal Area Network): A Personal Atea Network is computer network organist siti individual person, It generally covers a range of less than 10 meters. Personal Area Networks can be constructed with cables or wirelessly Network protocol + A protocol means the rules that are applicable for a network, + Ihdefines the standardized format for data packets, techniques for detecting and correcting errors and so on + A protocol is a formal description of message formats and the rules that two or more machines rust follow to exchange those messages. + Eg using library books. Types of protocols are: HTTP FIP TCP/IP SLIPIPPP Hypertext Transfer Protocol (HTTP) is a communications protocol forthe transfer of information on the intranet and the World Wide Web, HTTP isa request/response standard between a client and a server. A client isthe end-user; the server isthe website, FTP (File Transfer Protocol) is the simplest and most secure way to exchange files over the Intemet. The objectives of FTP are: To promote sharing of files (computer programs and/or data). To encourage indirect or implicit use of remote computers. To shield a user from variations in file storage systems among different hosts. To transfer data reliably, and efficiently, ‘TCPAP (Transmission Control Protocol / Internet Protocol) TCP - is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds supporto detect errors or lost data and to trigger retransmission until the data is correctly and completely received, TP - is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address (the IP number). The Internet authorities assign ranges of numbers to different organizations. The organizations assign groups oftheir mumbers to departments. IP operates, ‘on gateway machines that move data ftom department to organization to region and then around the world. Telnet- Itis an older internet utility that lets us log onto remote computer system. It also facilitates for terminal emulation purpose. Terminal emulation means using a pe like a mainframe computer through networking. Wireless/Mobile Computing Wireless communication is simply data communication without the use of landlines, Mobile computing means that the computing device is not continuously connected to the base or central network. 1. GSM(Global System for Mobile communication): itis leading digital cellular system. In covered areas, cell phone users can buy one phone that will work any where the standard is supported. It uses narrowband TDMA, which allows eight simultaneous calls on the same radio frequency. 2, CDMA(Code Division Multiple Access): it is a digital cellular technology that uses spread- spectrum techniques. CDMA does not assign a specific frequency to each user. Instead every channel uses the full available spectrum. 17vcist ote” 3, WLL(Wireless in Local Loop) : WLL is a system that connects subseribers (0 1 telephone network using radio signals as a substitute for other connecting media. 4, Email(Electronic Mail): Email is sending and receiving messages by computer. 5. Chat: Online textual talk in realtime , is called Chatting. = © Video Conferencing: a two way videophone conversation among multiple participants is called video conferencing. 7. SMS(Short Message Service): SMS is the transmissi ‘mobile pone, fax machine and ot IP address. 8. 3G and EDGE: 3G is a specification for thet communication technology. 3G promises increased bandwidth, stationary. : EDGE(Enhanced Data rates for Global Evolution ) is a radio based high speed mobile data standard Network Security Concepts: : Viruses: Viruses are programs which replicate and attach to other programs in order to corrupt the executable codes, Virus enters the computer system through an external source and become destructive. Worms: Worms are also self- replicating programs that do not create multiple copies of itself on one computer but propagate through the computer network. Worms log on to computer systems using the username and passwords and exploit the system. Trojan horse: - Though itis a useful program, however, a cracker can use it to intruide the computer system in order to exploit the resources. Such a program can also enter into the computer through an e~ ‘mail or free programs downloaded through the Internet. ‘Spams: Unwanted e-mail (usually of a commercial nature sent out in bulk) ‘Cookies: Cookies are the text messages sent by a web server to the web browser primarily for identifying the user. Firewall: A firewall is used to control the traffic between computer networks. It intercepts the packets between the computer networks and allows only authorized packets to pass. Cyber Law: Cyber law refers to all the legal and regulatory aspects of Internet and the World Wide Web. Cyber Crimes: Cyber crime involves the usage of the computer system and the computer network for criminal activity. Hael Web Services: WWW: The World Wide Web or W3 or simply the Web is a collection of linked documents or pages, stored on millions of computers and distributed across the Internet. HTML (Hyper Text Markup Language): HTML is a computer language that describes the structure and behavior of a web page. This language is used to create web pages. XML (eXtensible Markup Language):- Extensible Markup Language (XML) is a meta language that helps to describe the markup language. HTTP (Hyper Text Transfer Protocol):- A protocol to transfer hypertext requests and information between servers and browsers. Domain Names: A domain name is a unique name that iden name of the server where the web pages reside. URL:- The Uniform Resource Locator is a means to locate resources such as web pages on the Internet. URL is also a method to address the web pages on the Internet, There are two types of URL, namely, absolute URL and relative URL. : Website: A collection of related web pages stored on a web server is known as a website. Web browser: A software application that enables to browse, search and collect information from the Web is known as Web browser. Web Servers: The web pages on the Internet are stored on the computers that are connected to the Internet. These computers are known as web servers. jon of short text messages to and from a third generation of mobile communication of mobile up to 384 Kbps when a device is Hacking is an unauthorized access to computer in order to exploit the resources. es a particular website and represents the us(Cait Web Hosting: - Web Hosting or website hosting i the service to st, store and matali eweeeste rn the World Wide Web, Web Scripting: - The process of creating and embedding scripts in a web page is known as Web Scripting. Types of Scripts:- (i) Client Side Scripts: - Client side scripts supports interaction within a webpage. E.g. VB Script, Java Script, PHP (PHP"S Hypertext Preprocessor) (ii) Server Side Seripts:- Server side ser OPENSOURCHTERMINOLOGIES 1 Free Software: The S/W’s is freely accessible and can be freely used changed improved copied and distributed by all and payments are needed to make for free Siw. Open Source Software: S/w whose source code is available to the customer and it can be modified and redistributed without any limitation OSS may come free ‘of cost but nominal charges thas to pay nominal charges (Support of S/W and development of S/W). (O FLOSS (Free Libre and Open Source Software) : Siw which is free as well as open source S/W. (Free S/W + Open Source S/W). D_ GNU (GNU’s Not Unix) : GNU project emphasize on the freedom and its objective is to create a ‘system compatible to UNIX but not identical with it, 0. FSF (Free Software Foundation) : FSF is a non -profit organization created for the purpose of the free s/w movement. Organization funded many s/w developers to write free software. 1D OSI (Open Source Initiative) : Open source software organization dedicated to cause of promoting open source software it specified the criteria of ‘OSS and its source code is not freely available. © W3C(World Wide Web Consortium) ; W3C is responsible for producing the software standards for World Wide Web, D Proprietary Software: Proprietary Software is the s/w that is neither open nor freely available, normally the source code of the Proprietary Software is not available but further distribution and modification is possible by special permission by the supplier. (0 Freeware: Freeware are the software freely available , which permit redistribution but not modification (and their source code is not available). Freeware is distributed in Binary Form (ready to run) without any licensing fees. (Shareware: Software for which license fee is payable after some time limit, its source code is not available and modification to the software are not allowed. 0 Localization: localization refers to the adaptation of language, content and design to reflect local cultural sensitivities .e.g. Software Localization: where messages that a program presents to the user need to be translated into various languages. CD Internationalization: Opposite of localization. supports execution at server — end. E.g. ASP, JSP, PHP a 0 Linux : Linux is a famous computer operating system . popular Linux server set of program — LAMP(Linux, Apache, MySQL, PHP) Mozilla : Mozilla is a free internet software that includes + aweb browser + anemail client + an HTML editor + IRC client Apache server: Apache web server is an open source web server available for many platforms such as BSD, Linux, and Microsoft Windows etc.s COMPUTER SCIENCE CLASS XII (2017-18) UNIT 5: COMMUNICATION AND NETWORK CONCCEPT Network: A computer network is a set of computers connected together for : the purpose of sharing resources. Each computer on the network is called a node : v Advantages for Networking 1. Resource sharing ~ All programs, data and peripherals are available to _f~ y everyone irrespective of the location of the resource and the user. = S oy 2. Reliability ~ Backup copy of a file is kept on different machines, which is available in case of hardware crash or any other problem, 3. Cost factor —Cost is reduced since the resources can be shared 4, Communication Medium - Changes done by a user on a shared resource are conveyed to all Disadvantages of Networking ‘Threat to data: A computer network may be used by unauthorized users to steal or corrupt the data and even to deploy computer virus or worms on the network. , 2. Difficult to set up: Evolution of Networking: ARPANET (Advanced Research Projects Agency NETwork): In 1969, The US govt. formed an agency named | ARPANET to connect computers at various universities and defense agencies. The main objective of ARPANET was to develop a network that could continue to function efficiently even in the event of a nuclear attack. Internet (INTERconnection NETwork}: The Internet is a worldwide network of computer networks. It is not cewned by anybody, Interspace: is a client/server software program that allows multiple users to communicate online with real ~ time audio, video and text chat in dynamic 3D environments. Switching Techniques: Switching techniques are used for transmitting data across networks. Different ways of sending data across the network are: [Greut Switching: Packet Switching: | } | * Firstthe complete end-to-end | * Using the TCP protocol a single large message is divided into | transmission path is a sequence of packets of size limits from 128 to 4096 bytes, established between the + Each packet is independent and has the address of sender | source and the destination and destination. computers, ‘+ The IP (Internet protocol) does the routing for the packets * Then the message is It keeps track of all the different routes available to the : transmitted through the path, destination. If one route is not available it finds the alternate q | + The main advantage of this route to the destination. technique is guaranteed ‘+ Atthe destination, the TCP protocol re-assembles the delivery of the message. packets into the complete message. ‘* Mostly used for voice * Ifany packets are lost or damaged, a request is sent to ; ‘communication. retransmit the same message. | F J Communication terminologies: Communication Channel (Transmission media): 1s a medium through which a message is transmitted to its intended destination. Communication channel can be wired (Guided) or Wireless (Unguided). i Page 1 of 14Tet Stl tay Jit Ee let Pelsrtt SS ae a a a UNIT S: COMMUNICATION AND NETWORK CONCCEI Bandwidth: Is a range of frequencies within a Sandwidth is expressed in Hz, KHz, and MHz Data transfer rate: DTR is the amount of data in digital form that is m given time on a network. Data rates are often measure COMPUTER SCIENCE CLASS X11 (2017-18) joved from one place to another in 2 'd in megabits (million bits) or megabytes (million given band that is used for transmitting an analog signal bytes) per second. bps bits per second Bps bytes per second \ Kbps _kilobits per second KBps kilo bytes per second Mbps megabits per second MBps megabytes per second Gbps _ gigabits per second GBps gigabytes per second f Tops _terabits per second TBps tera bytes per second y Wired Media (Guided media) i [Twisted pair cable Co-axial Cables Optical fiber ure Is J— conper wire ! ow, 8 }— Insulation an“ — et Soe” 1 — Wire Mesh —— butter]? ee } Insulation It consists of two identical 1 mm thick copper wires insulated and twisted together. The twisted pair cables are twisted in order to | reduce crosstalk and, lectromagnetic induction It consists of a solid wire core surrounded by one or more foil or braided wire shields, each separated from the other by some kind of plastic insulator. It is mostly used in the cable wires, ‘An optical fiber consists of thin glass fibers that can carry information in i the form of visible light. if Very Inexpensive Expen: than twisted pair cables, ‘Very Expensive as compared to q Easy to install and maintain Difficult to manage and reconfigure, other guided media. ay ‘Need special care and training while installation ‘Attenuation is very high. Itis incapable to carry a signal over long distances (only 100m) without | the use of repeaters. ‘Attenuation is low. Data transmission rate is better than twisted pair cables. Carries signal up to 150m to 500 m Attenuation is very low. Transmit data over very long distance with high security, \ | Due to low bandwidth, these are | unsuitable for broadband applications Moderate bandwidth It provides a cheap means of transporting multi-channel television signals around metropolitan areas. Very High Bandwidth is up to.10- Gbps. Data transmission speed is very high. ‘Low noise immunity, Susceptible to electromagnetic interference Higher noise immunity than twisted pair. Less Susceptible to electromagnetic interference Immune to noise as light rays are unaffected by electrical noise. Net. Susceptible to electrom interference. Ethernet cable : tis also called a Cat 5 cable, is used to connect devices together within a local area network, Two pai Page 2 of 14 (Green and Orange) are used for transmitting and receiving packets respectively while the other (Blue and Brown) are used in VoIP and PoC {Push to Talk over Cellular) it consists of 4 pairs ( 8 wires) of unshielded twisted paircable and delivers data transmission rate of 1 Gbps. jCOMPUTER SCIENCE, CLASS XI (2017-18) UNIT 5: COMMUNICATION AND NETWORK CONCCEPT. Wireless Media (Unguided media) infrared Wave | Transmission Radio Wave Transmission | Micro Wave Transmission Short Range Communication: Infrared waves can travel from a few centimetres to several | meters.(Approx. Sm ) Long Range ‘Long Range Communication : Radio | Communication waves can cover distances | Microwave signals travel ranging from a few meters | at a higher frequency than (in walkie-talkies) upto | radio waves and are used Very Long Range Communication : Satellite, is a relay station in orbit above the earth that receive from one end of Infrared uses point to point communication, both transmitter and receiver should be placed in line of sight of each waves are propagated in | Microwaves towers all directions. Therefore _| transmitting and receiving sending and receiving antennas need to be antennas donot have to_| properly aligned. be aligned. Radio waves covering an entire city | for transmitting data over | earth (uplink) several miles or regenerates, and redirects kilometres. signals to other end of earth (downlink). | Line of Sight Propagation: / Omnidirectional: Radio | Line of Sight Propagation: | Line of Sight Propagation Since microwave signals cannot bend around the curvature of earth. Satellite act as a relay between the transmitting other and there should not | can easily bend along earth stations covering the} be any obstacle in- mountains and reach, entire surface of earth between. valleys. ji | | Cannot Penetrate Soli Objects : Infrared waves can propagate throughout 2 room but could not cross the walls of the room, so that the remote does not interfere with appliances in other room Penetrates Solid Objects: | Cannot Penetrate Solid Radio receivers can catch | Objects: High towers are the signal inside buildings | built and microwave also. Thus it can be used | antennas are put on their for both indoor and tops so that signal does outdoor-communication | not get blocked by building structures Cannot Penetrate Solid Objects: Signals can get blocked by solid material or objects such as rocks, wood or solid building structures Inexpensive mode of communic: Infrared communication is ‘@ common, inexpensive, and easy to use wireless communication | technology. Very Expensive: Placing the satellite into orbit involves very high cost. Installation is extremely, complex. But, satellite communication is very economical keeping in id the fact that the devices can communicate | therefore information | passed to one device is not leaked to another device Secure : Ata time only two Ata time only two Inexpensive mode of Very Expensive mode of communication ‘communication: Signals Radio waves are the most | become weak after economical way travelling as it gets of communicating. itis | absorbed by atmosphere. cheaper than laying cables | So repeaters are used at and fibres. regular intervals (25-30 km). Towers are expensive to build, | Insecure: Radio wave Insecure: Microwave communication is insecure | communication is an communication, insecure communication. Multiple channels are available. It can carry 25000 voice channels at the same time. Insecure: Signals satellite are broadcasted | to all receivers, so necessary security ‘measures have to be taken to prevent tampering of data, Page 3 of 14COMPUTER SCIENCE | CLASS NIL (2017-18) UNIT S: COMMUNICATION AND NETWORK CONCCEPT [ Could not be used for long | Communication over ‘Communication over No restrictions of difficult | and difficult terrains difficult terrains: Since no | difficult terrains: Since no | terrains such as natural i} 7 cables are to be laid down | cables are to be laid down. mountains, tall building, and no digging is to be and no digging is to be towers etc. done, it offers ease of done so it offers ease of 1 communication over communication over difficult terrains like hilly difficult terrains like hilly. 7 areas. areas ¥ Not Susceptible To Susceptible To Weather: | Susceptible To Weather: Susceptible To Weather | Weather Conditions Radio wave propagation is | Microwave propagation is | Transmission is affected by: susceptible to weather susceptible to weather weather conditions like | effects like rains, thunder | effects like rains, thunder | rain, thunderstorm etc. storms ete. storms etc, USES: TV remotes, USES: Cordless phones, USES: It is used for long USES: Communicate Cordless mouse, and AW and FM radio distance telephonic. anywhere in the world Intrusion detectors, broadcast, Garage door | communications. a ‘ automotive garage doors, | openers etc. Hilly region, — wireless speakers etc. I Network devices: ig Peo | Modem (MOdulator DEModulator) is an electronic device which converts digital es 4 | signals into analog signals for transmission over telephone lines (Modulation). At , she receiving end, a modem performs the reverse function and converts analog signal into digital form (Demodulation) A modem can also amplify a signal so that it can travel a long distance without attenuation. | RI-45 (Registered Jack — 45) is an eight wired connector that is used to connect | computers on a local area network (LAN), especially Ethernet. =a = Ethernet card is a kind of network adapter and is also known as Network Interface \ Card (NIC). These adapters support the Ethernet standard for hi network , connections via cables. An Ethernet Card contains connections for either coaxial or twisted pair cables or fiber optic cable Switch/Hub is an electronic device that connects several nodes to form a network | and redirects the received information to the destination. It has ports into which the cables from individual computers’ NICs are inserted. Switch is an intelligent hub redirects the received information only to the intended node(s). Hub broadcasts the information all the connected nodes Repeater When the data is transmitted over a network for long distances, the data signal gets weak due to attenuation. A repeater regenerates the received signal and re-transmits it to its destination. Page 4 of 14COMPUTER SCIENCE, CLASS XII (2017-18) UNIT S: COMMUNICATION AND N ‘WORK CONCCEPT Router is a network device used to establish connection between two similar networks. They can connect networks with different architectures such as Token Ring and Ethernet. But, routers cannot transform information from one | data format to another such as TCP/IP to IPX/SPX. | Gateway is @ device, which is used to connect dissimilar networks and perform the necessary translation so that the connected networks can communicate properly. A gateway can translate information between different network data formats and network architectures. It can translate TCP/IP to AppleTalk so computers supporting | TCP/IP can communicate with Apple brand computers. Wi-Fi cards are small and portable cards that allow your computer to connect to the internet through a wireless | network. Wi-Fi transmission is through the radio waves, these signals are picked up by Wi-FI receivers such’ay computers and cell phones equipped with Wi-Fi cards. The devices need to be within the range of a Wi-Fi network to receive the signals and produces a wireless internet connection. Once a connection is established between user and the network, the user is prompted with a login screen and password for establishing is a secure connection, Wi-Fi cards can be external or internal. If a WiFi card is not installed inside your computer, you may purchase an | external USB antenna attachment and connect it to your device. Many computers and mobile devices are now a days equipped with wireless networking capability and do not require a Wi-Fi card. Network Topologies It refers to the geometrical arrangement of nodes in a (LAN). The criteria for choosing a topology: Installation cost, Reliability, Flexibility, Fault detection etc. oe Tree Topology Star Topology in bus topology all the nodes are connected ‘toa main cable called backbone. | if any node has to send some information to any other node, it sends the signal to the backbone. The signal travels through the entire length of the backbone and is received by the | node for which itis intended, sa Ee A small device called terminator is attached at each end of the backbone. When the nal reaches the end of backbone, itis, absorbed by the terminator and the | backbone gets free to carry another signal. This prevents the reflection of signal back on the cable and hence eliminates the chances of signal interference. io. k Tn star topology each node is directly connected to a hub/switch. If any node has to send some information to ‘any other node, it sends the signal to the hub/switch. In the case of a switch the signal is sent directly to the intended node(s). In case of a hub this signal is broadcast to all the nodes but is accepted by the intended nodets). i} Tree topology is a ‘combination of bus and star topologies. It is used“) to combine multiple star topology networks. All the stars are connected together like a bus. This bus-star hybrid approzeh: supports future ‘expandability of the network IZ,C lala {nls le mi e Page S of 14ISISIZIP ISI iwle ri ricar Elel Characteristics of Bus topoloy + Linear architecture is easy to install, jonai nodes can be easily connected to the existing bus network at any point along the length of the backbone cable + Requires less cable length and hence itis {ess costly: All the nodes are connected through drop cables to the main backbone cable. + Foult diagnosis and isolation i difficult in Bus Topology. If a node is faulty on the bus, detection of fault may have to be performed at many points on the network, + Backbone cable or terminator fault leads to failure of entire network: But failure of does not affect the network UNIT §: COMMUNICATION AND NE COMPUTER SCIENCE CLASS NH (2017-18) Characteristics of Star topology: * Easy to install and easy to expand Additional nodes can be easily connected tothe existing star network according to the specifications of central hub/switch * Requires more cable length hence it is more costly than Bus: Every node is directly connected to the central hub/switch, * Fault diagnosis and isolation is easy in Star topology. Failure of a node involves. disconnecting the node from otherwise functional network. ‘+ Hub or switch fault leads to failure of entire network: But, failure of one node does not affect the network. WORK CONCCEPT I Characteristics of Tree topolony: # Itoffers easy way of network expansion + Evenifone network | (star) fails, the other networks remains connected and working. ak LAN (Local Area Network): Wy ? ‘MAN (Metropolitan Area Network): ‘WAN (Wide Area Network): "Spread in the proximity of ‘an individual ‘Spread across a room, building, or campus Spread within a city Spread across a city, Cover an area of a few meters radius. Cover an area of a few meters to a few kilometres radius. Cover an area of a few kilometres to a few hundred kilometres radius country, or continent. Cover an area of over hundreds of kilometres ra Set up using guided media Set up using wired media Set up using all types of all Set up using all types of all {USB cable) or unguided | (UTP cables, Co-axial cables | guided and unguided media | guided and unguided ‘media (Bluetooth, etc.) or wireless media ( media Infrared). Infrared, radio waves) ie. I WLAN (wireless LAN) Owned, controlled, and | Owned, controlled, and Owned and operated bya | Not owned by anyone, | aged bya single person ‘managed by a single person or organization, government body or a large corporation WANS is interconnected computers, LANs, MANS, and maybe other WANs. Examples: A network of | devices such as computer, | Phone, MP3/MP4 Player, Camera etc. Transferring sones from one cell phone to znother is a PAN of two hones. Transferring files |from aPC to an MP3 player |a PAN between the two. Examples: A networked office building, school or home. Sometimes one building can contain a few small LANS (Like some schools have independent LANs in each computer lab). Examples: A network of schools, or banks, or Government offices etc. within a city. A MAN is usually formed by interconnecting a number of LANs and individual computers, Examples: Anetworkof | ATMs, BANKS, National Government Offices, International Organizations’ Offices etc., spread over a country, continent, or covering. ‘many continents Page 6 of 14COMPUTER SCIENCE, CLASS XII 2017-18) i UNIT 5: COMMUNICATION AND NETWORK CONCC Network Protocol A protocol is the special set of rules that two or more machines on a network follow to communicate with each other. Some of the important protocols used are as follows: it TCP/IP (Transmission Control Protocol / Internet Protocol}: Communication between two computers on at internet is done using TCP/IP protocol. TCP/IP is a two-layer protocol. > Using the TCP protocol a single large message is divided into a sequence of packets of size limits from 128 to 4096 bytes. > Each packet is independent and has the address of sender and destination. > The IP (Internet protocol) does the routing for the packets. It keeps track of all the different routes available to the destination. if one route is not available it finds the alternate route to the destination. | ® At the destination, the TCP protocol re-assembles the packets into the complete message. > any packets are lost or damaged, 2 request is sent to retransmit the same message. aie FTP (Fite Transfer Protocol), ~ The File Transfer Protocol (FTP) is a standard network protocol used for the transfer of computer files from a server to a client using the Client-server model on a computer network. The objectives of FTP are: * » To promote sharing of files (computer programs and/or data), t ¥ To encourage indirect or implicit use of remote computers, > To shield a user from variations in file storage systems among different hosts. > To transfer data reliably, and efficiently PP {Poin to Point Protocol: In computer networking, Point-to-Point Protocol (PPP) isa data link protocol 2 used to establish a direct connection between two nodes. The Point-to-Point Protocol san encapsulation protocol for transporting IP traffic across point-to-point links. PPP is used over many types off physical networks including serial cable, phone line, trunk line, celular telephone, radio links, and fibre optic links ete. Electronic mail protocols imple Mail Transfer protocol (SMTP): Simple Mail Transfer Protocol, a protocol for sending e-mail messages between servers. Most e-mail systems that send mail over the Internet use SMTP to send messages from one. Server to another; In addition, SMTP is generally used to send messages from a mail client to a mail server. ‘The messages can then be retrieved with an e-mail client using either POP or IMAP. This is why you need to specify both the POP or IMAP server and the SMTP server when you configure your e-mail application ESMTP (Extended Simple Mail Transfer Protocol) specifies extensions to the original SMTP protocol for sending e-mail that supports graphics, audio and video files, and text in various national languages, MIME (Multi-Purpose Internet Mail Extensions) is an extension of the original Internet e-mail protocol that cts people use the protocol to exchange different kinds of data files on the Internet: audio, video, images, application programs, and other kinds, as well as the ASCII text handled in the original protocol, the Simple Mail Transport Protocol (SMTP). Post Office Protocol Version 3 (POP3): POPS is a client/server protocol used for opening the remote e-mail boxes, the POP3 mail server receives e-mails filters and holds them into the appropriate user folders. When ® user connects to the mail server to retrieve his mail, the messages are downloaded from mail server to the user's hard disk. debyte hunks This protocol helps a user (Telnet Client) to log in at a remote computer (Telnet Server) and function as if he/she were connected directly to that computer. Telnet is the main internet Protocol for creating a connection with a remote machine. It allows you to connect to remote computers (called remote hosts) over a TCP/IP network (such as the Internet). Once your telnet client establishes a i | connection to the remote host, your client becomes a virtual terminal, allowing you to communicate with the emote host from your computer with whatever privileges you may have been granted to the specific application and data on that host computer. Page 7 of 14UNIT 5: COMMUNICATION AND NETWORK CONCCEPT Wireless/Mobile Communication protocol GSM: (Global System for Mobile communication): is a digital mobile telephony system that is widely used in Europe and other parts of the world. GSM) is a second generation (2G) standard for mobile networks. The GSM standard has given birth to wireless services like General Packet Radio Service (GPRS) and Enhanced Data Rates for GSM Evolution (EDGE). GSM uses a variation of time divisi widely used telephony technology. TDMA (Time division Multiple Access): It allows several users to share the same frequency channel by dividing the signal into different time slots, The users transmit in rapid succession, one after the other, each Using its own time slot. For example, the radio frequency say 890 MHz is shared by different users in time. This means if user A, B, Cand D all talk at the same time. You assign the 890 MHz frequency to A for some time and allow him to talk, then you assign 890 band to B for some time to speak, then to C, and finally to D, before coming back to A. So the process continues in a round robin fashion, as long as A, B, C, and D want to talk. This way many users talk at same time on the same frequency. CDMA (Code Division Multiple Access): Code Division Multiple Access (CDMA) is a multiple access technology whereby a number of users share the same frequency channel at the same time. Every channel uses the full available spectrum. Individual conversations are encoded with a pseudo-random digital sequence. Every communicator will be allocated the entire spectrum all the time, Each user's signal is spread over the entire bandwidth by a unique spreading code. At the receiver end, that same unique code is used to receive the signal. CDMA consistently provides better capacity for voice and.data communications; it is the common platform on which 36 technologies are built. GPRS (General Packet Radio Service): is a packet oriented mobile data service on the 2G and 3G GSM miunications. GPRS usage is typically charged based on volume of data transferred. WIL (Wireless Local Loop): Wireless local loop (WL), is the use of a wireless communications link for delivering telephone service (POTS) or Internet access (broadband) to telecommunications customers. This system is based on radio networks which provide services like telephone in remote areas. Different types of wireless local loop include Broadband Wireless Access, Radio in the Loop, Fixed Radio Access and Fixed Wireless Access. Microwave frequencies are used to provide wireless broadband connection. The local loop can be referred as “last mile" of the telecom network which resides between Central office (CO) and user's location. Generations of Mobile technology: > 1G technology was used in the first mobile phones. 1G used analog radio signals. 1G was introduced in 1980s — ~ 2G technology was introduced in 1992. 2G technology used a digital format and introduced text. messaging. 2G also introduced data services for mobiles, starting with SMS. > 3G technology has introduced more efficient ways of carrying data, making it possible to have faster web- services, live chat, fast downloading, video conferencing etc. over mobile phones. Today we are living in the world of 36. ~ AG technology unlike previous generations of mobile technology, 4G mobile technology will be used for internet access on computers also, and it will be totally wireless. 4G will provide internet access, high quality streaming video and "anytime, anywhere" voice and data transmission at a much faster speed than 3G. The "anytime, anywhere" feature of 4G is also referred to as "MAGIC" (Mobile multimedia; Anytime/anywhere; Global mobility support; Integrated wireless solution; Customized personal services). Page 8 of 14 iR SCIENCE Hi ; 11 (2017-18) UNIT S: COMMUNICATION AND NETWORK CONCCEPT Mobile processors: mobile processor i found in mobile computers and cellphones, * ACPU chip is designed which is typically housed in a smaller chip package. f In order to run cooler, it uses lower voltages than its desktop counterpart and has more "sleep mode’ i capability entirely when not in use Further, the clock frequency may be stepped down under low processor loads. This stepping down conserves power and prolongs battery life. initially mobile processor was Single core, and then came Dual core; we now have Quad core, Hexa core and even Octa core. i > Most processors are 64 bit now as against 32 bit when it started initially. ap > The processing speed has reached up to 3.0-3.5 GHz. Naglt > The ability to include GPU (Graphic Processing Unit) inside mobile processors has enabled devices to churn Out the best graphics picture, 3D capability, Virtual Reality capability and 4k recording. Some latest mobile processors are: Qualcomm Snapdragon, Texas Instruments OMAP, Nvidia Tegra 2, ‘Samsung Hummingbird i © Py Chat Protocol and VOIP Chatting A real time informal communication over the Internet is chatting. A chat program is software which is required for chatting over the internet. AOL Instant Messenger, Campfire, Internet Messenger, MSN Messenger are some commonly used chat programs. In order to chat, the user should have an account on a chatting program. A phone call is a voice based chat while online chat is textual conversation, VOIP: Voice over Internet Protocol (Voice over IP, VoIP and IP telephony) is a group of technologies for the delivery of voice communications and multimedia sessions over Internet. The terms Internet telephony, broadband telephony, and broadband phone service specifically refer to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). This method of making phone calls is much cheaper than convectional way because the service of Telecommunication Company is not used. Wi-Fi Wireless Fidelity is a brand, originally licensed by the Wi-Fi Alliance to describe the underlying technology of wireless local area networks (WLAN) that uses radio waves to provide wireless high-speed Internet and network connections. A person with a Wi-Fi device can connect to the internet or Local area network using an ‘access point, provided that the device should be in the range of that Wireless access point. Wi-Fi networks have ‘no physical wired connection between sender and receiver and transmit by using radio frequency (RF) technology. When an RF current is supplied to an antenna, an electromagnetic field is created that then is able to Propagate through space. A computer utilizes a wireless adapter to translate data transmitted by radio waves, WIMAX (Worldwide Interoperability for Microwave Access) is a wireless industry coalition dedicated to the advancement of broadband wireless access (BWA) networks, WIMAX is one of the hottest broadband wireless technologies around today. WiMAX systems are expected to deliver broadband access services to residential and enterprise customers in an economical way. Network Security Concepts: Network security deals with policies adopted by network administrator to protect the network from unauthorized access and misuse of network resources. It also ensures that the authorized Users have adequate access to all the network resources. op av Page 9 of 14COMPUTER SCIENCE, CLASS NIT (2017-18) COMMUNICATION AND NETWORK CONCCE! LE e UNIT [Virus [Worm Trojan es A virus is a self-replicating ‘A worm is a self-replicating piece | A Trojan horse is a non-self- | malicious piece of code that of code that uses security holes ina | replicating a program that attaches itself to other host ‘computer networks to copy itself to | contains hidden ma Programs and gain control over | the new machine and then starts_| functions. the system without the owner's _| replicating from there as well. I knowledge does not need to attach itself toa : host program. Itrequires human interaction to_| It does not require human Te tricks users into installing disguised as useful program. Ones, F propagate The virus gets feraction; a worm works by itself executed each time the host as an independent object and installed on a system, they reveal | SIF program is executed. copies itself hundreds or thousands | their true nature and cause of time. damage i They could produce annoying They could consume the entire They could steal confidential tl effects like changing desktop, | memory or bandwidth and clog _| information and can open 9 backdoor. Trojan horses con i adding silly icons ete. central server and report back information such as passwords, user IDs, and captured keystrokes. ‘Spread through internet browsing. elf to other computer networks through mail or address They can spread through external media such as CDs, browsing infected internet sites | book. and from email attachments. Types of Viruses Virus: These viruses infect and replicate when it gets attached to executable program files with extensions COM, .EXE .SYS, .DLL, .OCX, .CPL, and .SCR. + Boot sector virus: These viruses infect the boot sector of hard drives. The master boot record of the boot sector that contains an executable that knows where the files to start the o} system are located on the hard drive. Boot sector viruses attach themselves to the master boot record and are executed every time the computer boots up. “ Macro virus: Viruses that infect document files are called macro viruses. They only infect documents that support macros. Microsoft Office, WordPerfect Office, StarOffice, and AutoCAD are common, applications that support macros in their documents, When the viruis attaches itself to the document ‘it must make sure that the macro will be run so its code can be executed. Viruses ensure this occurs by attaching themselves to common subroutines that are run every time a document is opened or closed. Spam: Repetition of worthless text in the form of messages or malls is known as Spam, Most spam is ‘commercial advertising. In addition to wasting people's time, spam also eats up a lot of network handwiath Cookies: When the user browses a website, the web server sends a small text file to the web browser known 25 a cookie. Generally a cookie contains the name of the website from which it has come from and a unique ID ‘tag, Some cookies are stored on your hard drive until you delete them or they reach their expiry date. These may be used to remember your preferences when you use the website. While, some cookies last only until the browser is closed are not stored on your hard drive. They are usually used to track the pages that you visit, ‘0 that information can be customized for you for that visit. a Firewall: A firewall is hardware or software based network security system. It prevents unauthorized access to or from a network. All inbound data entering the network or outbound traffic leaving the network pass through the firewall, which examines each packet and blocks those that do not meet the specified security criteria. Firewalls are used to prevent unauthorized internet users (hackers, virus/worms) to access private networks connected to the Internet, Page 10 of 14COMPUTER SCIENCE CLASS X11 (2017-18) UNIT 5: COMMUNICATION AND NETWORK CONCCEPT Hitps: Hyper Text Transfer Protocol Secure (HTTPS) is the secure version of HTTP, the protocol over which data is sent between your browser and the website that you are connected to. The 'S' at the end of HTTPS stands for ‘Secure’. It means all communications between your browser and the website ar encrypted. India IT Act: The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is af Aut of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. It is the primary law in India dealing with cybercrime and electronic commerce. The laws apply to the whole of India. Persons of other nationalities can also be indicted under the law, if the crime involves a computer or network located in India, The Act provides legal framework for electronic governance by giving recognition to electronic records and digital signatures The above Act was further amended in the form of IT Amendment Act, 2008 [IT/AA-2008] offenses and penalties are listed below: _ Section | Offence Penalty 65 | Tampering with computer source Imprisonment up to three years, or/and with | documents fine up to $200,000 ne 66 | Hacking with computer system Imprisonment up to three years, or/and with fine up to%500,000 ? 66F__| Acts of cyber terrorism Imprisonment up to life. oz 67 | Publishing information which is obscene in_| Imprisonment up to five years, or/and with electronic form. fine up to §1,000,000 70 | Securing access or attempting to secure _| Imprisonment up to ten years, or/and with | access to a protected system fine. eh Cyber Law: Cyber law or Internet law is a term that encapsulates the legal issues related to use of the Internet, Itis less a distinct field of law than intellectual property or contract law, as it is a domain covering many areas of law and regulation. Some leading topics include internet access and usage, privacy, freedom of expression, and jurisdiction. Cyber Crime: In Simple way we can say that cyber-crime is unlawful acts wherein the computer is either a tool» !} or a target or both. Cyber-crimes can involve criminal activities that are traditional in nature, such as the't, frau, *\f forgery, defamation and mischief, al of which are subject to the Indian Penal Code We can categorize Cyber-crimes in two ways 1, The Computer as a Target:-using a computer to attack other computers. Eg. Unauthorized access ane Hacking, Teojan/Virus/Worm attacks, Email spoofing, Email Spamming, Email bombing, DoS- Denial of Service attacks ete. 2. The Computer as a weapon:-using a computer to commit real world crimes, Eg, Cyber Terrorist, 12 Violations, Credit card frauds, EFT frauds, Pornography, Cyber Stacking etc. Intellectual property rights (IPR) Issues: Intellectual property rights are the rights given to an indivicus the invention of their own. They usually give the creator an exclusive right over the use of his/her creati a certain period of time. There are only three ways to protect intellectual property 1. Patents: A Patent is a term used for a specific product designed by an individual. The designer is gi exclusive rights over the patent for a limited period of time. With help of the patent right, the owner c3 stop others from making, using or selling the product design. The owner can take a legal action if someone uses the patent without his/ her permission 2. Trademarks: Trademark can be defined as a name or a different sign or a device identifying a product or a service provided by a person or a company. A Trademark is also known as brand name, It should be officially registered and legally restricted to use of the specific person or the company. 4 3, ee Copyright is the term used for a written document. A legal action can be taken, if copyrights are violate Hacking: Hacking is unauthorized intrusion into a computer or a network, The person engaged in hacking activities is generally referred to as a hacker. This hacker may alter system or security features to accomplish a Boal that differs from the original purpose. Page 11 of 14COMPUTER SCIENCE : CLASS (2017-18) UNIT $: COMMUNICATION AND NETWORK CONCEPT mnauthorized access toa | Mi ‘ack (white hat) acesses the computer without | + A cracker (black hal ea | the intention of destroying data or maliciously computer with the intention to cause damage ‘harming the computer. White hat is known as ethical Black hat is a hacker who violates computer [hater | sey formations forces anf Introduction to Web Services 1s Itcan be defined 2s a hypertext information WWW (World Wide Web): WWW is a network of web server trmet Al the web retvievl system on the Internet, Its the universe of the information avaiable on te int pages on WWW use HTTP for making hypertext jumps. | HTMIL (Hypertext Markup Language) HTML isa markup language to create and desi web content | > tris weet display the data in formatted manne. > It has a variety of predefined tags and attributes, for defning the layout and structure ofthe web document > HTMLis nt case sensitive A HTML document has the extension htm or MIL [eXtensible Markup Language) XML is 2 markup language that is sel descriptive > itis used to cary, store or exchange data It does not have predefined tags. tis possible to define new tags in XhiL. It tet ih programmer towse customized 65.9.) > XMLis ese sensitive p > AHTML document hs the extension aml | shtml > HTML documents have head and body. > XML documents form a tree structure E ttml> root» 4 cheat cls 4 | subchil, ‘a |
|
| fis <|root eae HTT isthe protocol that is used for transferring hypertext (tet, graphic, image, sound, video etc) betwen? 4 two computes ands particulary used onthe Word Wide Web. It is2 TCP/IP based eommunicstion proce and provides 2 standard for Web browsers and seers to communicate, HTTP is based on Client/Server principle. Communication between the host and the dent ocus though a request/esponse pair. omection is established between two computers - out of which one is client (generally the browser) that inuates the equest and the thers the server tat responds tothe request. Also HTTP identfis the resource thet the cient has requested for and informs the server about the action tobe taken. When the user clits on the hypertet ink, the cent program on their computer uses HTTP to contact the server, identify toe resource and ask the server to respond with an action The server accepts the request and then uses HTTP to respond to perform the action. Domain Names: Every computer on the network has a unique numeric address assigned to it which is combination of four numbers from 0-255 separated by a dot. For example, $9.177.134.72 sinc ts practi impossible fora person to remember the IP addresses. A system has been developed which asians domoia ‘ames to web servers and maintains a database ofthese names and corresponding IP adcresses ot DM (Comain Name Service) server. Examples of some domain names are cse.ic.in, indianrallvay.gowin etc A domain name os then one pat for exemple, inthe domain name www.cbse.nic.in > inisthe primary domain name > nis the sub-domain of in > cbse’ the sub-domain of nie > www indicates the servers on world wide web ually has more Page 12 of 14COMPUTER SCI CLASS XT (2017-18) UNIT 5: COMMUNICATION AND NE WORK CONCCEPT y > Top level domains are further divided into two categories: | Generic Domain Names: Country Specific Domain Names: *com - commercial business in - India -edu - Educational institutions -au- Australia “gov - Government agencies ca - Canada -mil- Military ch - China “net - Network organizations nz - New Zealand -org - Organizations (non-profit .pk - Pakistan jp - Japan 1us- United States of America URL (Uniform resource locator): A URL is a formatted text string used to identify a network resource on the Internet, Network resources can be plain Web pages, text documents, graphics, downloadable files, services or programs, Every network resource on the web has a unique URL in the following format: Protocol: // domain name /path / file name Jwww.mnhs.com/webpages/about.htm! ae o protecel domaine aeckory 4 Pansofa Unt } 4 The URL text string consists of three parts: AF Network Protocol: The network protocol identifies the protocol to be used to access the network }f, resource. These strings are short names followed by the three characters ': //'. Some examples of” Hj protocols include http, gopher, ftp and mailto. ‘ “= Domain name: It identifies the host/server that holds the resource. For example: www. School.com is adomain name. i ‘+ Resource Location: It consists of the path or directory and the file name of resource. For example ir the URL: /www.school.com/syllabus/preprimary/nursery.htm the file nursery.htm is stored in the sub directory preprimary, of the directory syllabus on the server www.school.com Website: Related webpages from a single web domain is termed as a website. A website has multiple webpages providing information about a particular entity. Jeu orowser: Web browser is software program to navigate the web pages on the internet. A bowser interprets the coding language of the web page and displays it in graphic form. Internet works on client-server model. A web browser is a client which requests the information from the web server. The web server sends the information back to the client. Some of the web browsers are: Netscape Navigator, Internet Explorer, Motilla Firefox etc. Wie Server: A Web server is a computer or a group of computers that stores web pages on the internet. It works on client/server model. It delivers the requested web page to web browser, Web servers use special programs such as Apache or IIS to deliver web pages over the http protocol. Each server has a unique IP address and domain name. In order to access a webpage, the user writes the URL of the site on the address bar of the browser. The machine on which the browser is running sends a request to the IP address of the machine running the web server for that page. Once the web server receives that sends the page content back to the IP address of the computer asking for it. The web browser !hels. ag ein Lguest, translates that content into all of the text, pictures, links, videos, etc. A single web server may suppprt mul ‘websites or a single website may be hosted on several linked servers. ‘Web hosting: Web hosting is the process of uploading/saving the web content on a web server to make it available on WWW. In case an individual or a company wants to make its website available on the internet, it +" be hosted on a web server. ff Web page: Web page is an electronic document designed using HTML. It displays information In textual of if graphical form. It may also contain downloadable data files, audio files or video files, Traversal from one webpage to another web page is possible through hyperlinks. A web page can be classified into two types: Page 13 of 14| ‘Static web page: A web page which displays same | Dynar kind of information whenever a user visits it is an as 2 static web page. A static web page . | generally has .htm or .html as extension 1 integrated with other lan Scripting language: It is a programming language which can be embedded or integrated with other |an Some of the most widely used scripting languages are JavaScript, cy have been used extensively to create dynamic web pages. yo | Side scripting. In thi UNIT 5: COMMUNICATION AND NE languages. web"Z.0: Web 2.0 refers to new generation of dynamic and interactive websites. Web 2.0 websites use new programming language called AJAX (Asynchronous JavaScript and XML). AJAX helps a dynamic webs; connect to the web server and download small amount of data based on the interaction with the user. In this technology only the part of the website which is updated is reloaded. The entire page does not get reloaded each time. This helps in making the website interactive, tions supported by web 2.0 are as followings: vatica * E-commerce payment transactions: E-Commerce or Electronics Commerce sites use electronic paymer electronic payment refers to paperless monetary transactions. Electronic payment haz revolutionized the business processing by reducing paper work, transaction costs, labour cost. Being user friendly snd less rte ransuming than manual processing it helps business organization to expand its market. 4 Grline Banking: Online banking, aso known as internet banking, e-banking or virtual banking, is an electronic payment system that enables customers of a bank or other financial ir transactions through the financial institution's website ‘Mobile Banking: Mobile banking refers to the use of a smartphone or other cellular device to perform onlin hile avray from your home computer, such 9 monitoring accauint balances, transferring, funds between accounts, bill payment and locating an ATM, sanking ta: Payment Apps and Services: Most mobile payment apps offer users reasonable, pay-as-you-go plans. This requires users to pay a flat percentage of the total expenditure as a processing fee. Many of these apps also allow the user to keep track of their payment and even print receipts of their transactions. some ayobile vayment apps are Google Wallet, PayPal, Paytm, Freecharge, Bhim ard UPI (Unified Payment Interface COMPUTER SCIENCE from the mouse or a key | web content. Such pages use server-side scripting ASS XM (2017-18) WORK CONCCEPT web page: An interactive web page’ ¥) uses script dynamic webpage. A dynamic web pay languages to display changing conte page. Such a page generally has .php, .asp or .isp as | on the. web extension. VBScript, PHP, Perl, Python, Ruby, Some web pages use| Server-Side Scripti language. Web page display the current time and date, forums, submission forms, shopping carts et use server-side scripting. ASPS, JSP, PHP are examples of server-side scripting languages. blogging d social bookmarking + RSS (Really Simple Syndication) i wikis and other collaborative applications iH interactive encyclopedias and dictionaries e Advanced Gaming stitution to conduct a range of financial, if Page 14 of 14 IF
You might also like
Paloalto-Notes Hand Written
PDF
No ratings yet
Paloalto-Notes Hand Written
30 pages
Networking Imp
PDF
No ratings yet
Networking Imp
55 pages
Work of Life
PDF
No ratings yet
Work of Life
88 pages
CCNA Notes
PDF
No ratings yet
CCNA Notes
100 pages
Osi Model
PDF
No ratings yet
Osi Model
20 pages
DocScanner 4 Dec 2024 12-35 PM
PDF
No ratings yet
DocScanner 4 Dec 2024 12-35 PM
64 pages
Wireless Communication
PDF
No ratings yet
Wireless Communication
54 pages
مذكرة كمبيوتر لغات اولى اعدادي الترم الثاني
PDF
No ratings yet
مذكرة كمبيوتر لغات اولى اعدادي الترم الثاني
54 pages
CN CH-2
PDF
No ratings yet
CN CH-2
22 pages
Unit 1 WMN Notes
PDF
No ratings yet
Unit 1 WMN Notes
23 pages
DocScanner Dec 21, 2022 1-10 PM
PDF
No ratings yet
DocScanner Dec 21, 2022 1-10 PM
31 pages
Networks Mamoun
PDF
No ratings yet
Networks Mamoun
43 pages
DCC Notes (Unit 1, 2)
PDF
No ratings yet
DCC Notes (Unit 1, 2)
38 pages
Mobile Computing
PDF
No ratings yet
Mobile Computing
30 pages
1 Unit Notes PCS and GSM
PDF
No ratings yet
1 Unit Notes PCS and GSM
20 pages
CCN Lab
PDF
No ratings yet
CCN Lab
32 pages
Networking
PDF
No ratings yet
Networking
39 pages
GSM
PDF
No ratings yet
GSM
25 pages
Adhoc Network
PDF
No ratings yet
Adhoc Network
23 pages
Ritfgi 9 R 59 Tckdiwdicglglfsuuse 7 Di
PDF
No ratings yet
Ritfgi 9 R 59 Tckdiwdicglglfsuuse 7 Di
20 pages
CN Unit 1 Notes
PDF
No ratings yet
CN Unit 1 Notes
16 pages
CN Handwritten Notes - Sanjay
PDF
No ratings yet
CN Handwritten Notes - Sanjay
34 pages
Mobile Computing Screens Shot
PDF
No ratings yet
Mobile Computing Screens Shot
20 pages
Communication and Network
PDF
No ratings yet
Communication and Network
19 pages
Cyber Security Essentials Notes
PDF
No ratings yet
Cyber Security Essentials Notes
20 pages
Course1 Network
PDF
No ratings yet
Course1 Network
22 pages
Computer Networks
PDF
No ratings yet
Computer Networks
22 pages
Unit-2.. E-Commerce
PDF
No ratings yet
Unit-2.. E-Commerce
17 pages
CN
PDF
No ratings yet
CN
16 pages
Cyber Security
PDF
No ratings yet
Cyber Security
21 pages
Cyber Security Unit 2
PDF
No ratings yet
Cyber Security Unit 2
22 pages
Assignment 2 CS
PDF
No ratings yet
Assignment 2 CS
14 pages
Mobile Computing UNIT 5
PDF
No ratings yet
Mobile Computing UNIT 5
27 pages
Unit 1
PDF
No ratings yet
Unit 1
20 pages
Unit 3
PDF
No ratings yet
Unit 3
12 pages
Computer Networks
PDF
No ratings yet
Computer Networks
11 pages
Web Application and Security
PDF
No ratings yet
Web Application and Security
19 pages
Chap 3 Adv Java
PDF
No ratings yet
Chap 3 Adv Java
14 pages
CN Module 5
PDF
No ratings yet
CN Module 5
15 pages
2 Unit Itm
PDF
No ratings yet
2 Unit Itm
26 pages
CN Unit 1-3 PDF
PDF
No ratings yet
CN Unit 1-3 PDF
18 pages
ASA Part 3
PDF
No ratings yet
ASA Part 3
17 pages
Unit-4 Common Network Architecture
PDF
No ratings yet
Unit-4 Common Network Architecture
11 pages
MC 1
PDF
No ratings yet
MC 1
24 pages
Scan 12 Oct 23 18 52 31
PDF
No ratings yet
Scan 12 Oct 23 18 52 31
19 pages
Computer Network New Notes
PDF
No ratings yet
Computer Network New Notes
17 pages
Web Development
PDF
No ratings yet
Web Development
10 pages
Publi 0 Cation 5
PDF
No ratings yet
Publi 0 Cation 5
3 pages
RT90 English Manua
PDF
No ratings yet
RT90 English Manua
37 pages
Computer Networks
PDF
No ratings yet
Computer Networks
15 pages
Wireless Communication
PDF
No ratings yet
Wireless Communication
10 pages
CN Assign
PDF
No ratings yet
CN Assign
11 pages
Ec 803 (A) WN Set A
PDF
No ratings yet
Ec 803 (A) WN Set A
8 pages
Coma
PDF
No ratings yet
Coma
8 pages
084CNSA4
PDF
No ratings yet
084CNSA4
7 pages
MCN Assignment 2
PDF
No ratings yet
MCN Assignment 2
14 pages
BARAF#QB
PDF
No ratings yet
BARAF#QB
6 pages