CLass 12 - COMPUTER NETWORKS - Study Material
CLass 12 - COMPUTER NETWORKS - Study Material
8.1 INTRODUCTION
The greatest breakthrough in technology and communication over the past 20 years has been the
development and advancement of the computer network. From emailing a friend, to online bill
payment, to downloading data from the internet, to e-commerce, networking has made our world
much smaller and forever changed the way we communicate.
Network provides salient features which have made our life easy and comfortable, be it sending an
email, withdrawing money from an ATM machine, online railway or airline reservation, or sharing
audio and video files. Apart from these, the most extensively-used feature is the Print command
sent from a computer to get a printout from a printer attached to some other computer. All this
involves a network.
It is the network that connects various computers to each other and handles a large volume of data.
CTM: A computer network is a collection of interconnected computers and other devices to share data and
other resources (hardware and software resources).
8.2.1 Advantages of Computer Networks
Internet
Domain
DNS & Data Storage
Firewall
Wi-Fi
Router
Server
User PC
Printer
Printer
other system. This allows printing of documents by several users and, hence, the printer is
shared by multiple users on the network. Other resources like hard disk, DVD drive, scanner,
etc., can also be shared on a computer network. For example, sharing database, audio and
video files, antivirus software, application software, printers and scanners, etc.
(b) Improved Communication: A computer network enables fast, reliable and secure
communication between users. It saves time and offers easy communication methods.
For example, in an organization, managers work at different locations to make financial reports.
While working on a network, any change made by one manager on his/her computer can easily
be seen by other managers and employees. Thus, a network allows managers to easily update
information. This increases their efficiency and allows them to complete their work quickly.
(c) Reduced Communication Cost: Sharing resources also reduces communication cost. Using
public networks, we can send a large quantity of data at a low cost. Internet and mobile
networks are playing a very important role in sending and receiving text, image, audio and
video data at a low cost.
(d) Reliability of Data: Reliability means backing up of data, i.e., data can be copied and
stored on multiple computers. In a network system, all computers are connected to each
8.2
other. Thus, the information or message which is shared by each device is stored on their
respective workstations (computers). If, due to some reason (hardware crash, etc.), the data
gets corrupted and, thus, becomes unavailable on one computer, a copy of the same data can
be accessed from another workstation for future use. This leads to smooth functioning and
further processing without disruption.
(e) Central Storage of Data: Files can be stored on a central node (the file server) that can
be shared and made available to each and every user in an organization. With centralized
processing, data is stored and retrieved from a single central location. Thus, there is no
duplication of data and almost no data redundancy.
8.4
8.4.1 Elementary Terminology of Networks
1. Nodes (Workstations): The term node refers to computers that are attached to a network
and are seeking to share resources.
2. Server: A computer that facilitates the sharing of data, software and hardware resources on
the network.
3. Network Interface Unit (NIU) (MAC Address): A network interface unit is an interpreter
that helps in establishing communication between the server and the client.
4. IP Address: Every machine on a TCP bar/IP Network has a unique identifying number
called an IP Address.
5. Domain Name: It is a way to identify and locate the computers connected to the internet.
It must be unique.
Protocol: A set of rules that governs data transmission. It represents the communication
methods which are to be followed by the sending and receiving devices.
Computer
Printer
iPad
8.6
Fig. 8.5: Components of a Computer Network
8.6 MODES OF DATA TRANSMISSION
(a) Analog or Broadband Transmission
• The signal is a radio frequency signal or analog, i.e., it can consist of continuous
electrical waves that are of varying amplitudes.
• Telephone networks use this type of transmission.
• Requires modem for transmitting data over baseband medium.
(b) Digital or Baseband Transmission
• No special device for conversion of signal to be transmitted over baseband medium.
• The signal is a group of discrete electrical units which is transmitted in rapid succession.
CTM: The technique of sending data across the network is known as Switching technique. The three types
of techniques used are circuit switching, packet switching and message switching.
8.7
1. Circuit Switching
Circuit switching provides end-to-end connection between two computers. It is established
usually in a telephone network where one person is making a call and another is receiving a call.
In a telephone system, the communication must be established between the two participants,
i.e., the sender and the receiver. The circuit is established between these two participants
before the transfer of data takes place.
Receiver Caller
Fig. 8.6: Circuit Switching
In this technique, the entire link remains dedicated and no other user can use it even if the
path remains idle. The following actions take place during circuit switching:
(a) A request signal is sent by the sender to set up the connection with the receiver. It establishes
a physical connection between the two participants.
(b) All intermediate nodes are identified. These nodes are also called switching nodes.
(c) If the destination node is available, it sends back the acknowledgement of receiving a signal.
Hence, data transmission begins.
(d) When the data transmission is complete, the call can be terminated.
CTM: Circuit switching is a connection-oriented service. In this technique, there is a dedicated link between
the sender and the receiver and no other call can be made during this link, even if the link remains idle.
2. Packet Switching
In packet switching technique, the entire data is divided into small fragments called packets.
Each packet is of a fixed size, usually 128 bytes or 512 bytes. Packet switching is similar to post
Supplement – Computer Science with Python–XII
office operation. Each packet has a source address as well as destination address (IP address)
for being transmitted, in the same way as a postman delivers a letter to a specific destination
address.
As there is no direct connection established between the sender and the receiver, each
packet follows different routes and, therefore, the packets are delivered in a random order
at the destination address. It is the TCP protocol which then arranges all received packets in
a sequential order. During the transfer of packets, each packet has to pass through several
intermediate nodes, so each intermediate node checks for destination IP address. If the packet
matches with the node address, it is received; otherwise, it is passed on to the next node until
it reaches the destination IP address.
8.8
Mainframe
Caller
Receiver
CTM: Packet switching offers a connectionless service. Data is fragmented into small packets and each
packet is of fixed size in packet switching technology.
8.9
8.8 DATA COMMUNICATION TERMINOLOGIES
1. Channel: A channel is a communication path through which the data is transmitted from
the sender device to the receiver device.
2. Baud: The number of changes in a signal per second is known as baud. It is the measuring
unit of the data transfer rate. Technically, baud refers to a number of discrete signal
elements transmitted per second. 1 baud represents only 1 signal change per second and
is equivalent to 1 bit per second.
3. Bandwidth: The amount of data that can be passed along a communication channel in a
given period of time (1 second) is termed as bandwidth. The measuring unit is hertz (Hz),
where 103 Hz = 1 Kilo Hertz (KHz), 103 KHz = 1 Mega Hertz (MHz).
4. Data and Signals: Information that is stored within computer systems and transferred
over a computer network can be divided into two categories—data and signals. Data are
entities that are stored in the form of 0’s and 1’s, which convey some special meaning
to the computer system. When this data is transmitted from one place to another, it is
converted into signal. Signals are the electric or electromagnetic encoding of data and are
used to transmit data.
5. Communication/Transmission Media: It is a means of communication or access (lines
of communication) set up between two organizations to exchange data/information.
Communication media is the way of transmitting the signal from one place to another.
Communication media is also known as transmission media. It plays an important role in
sending and receiving of data to and from the sender and receiver.
6. Data Transfer Rate: It is the amount of data transferred in one direction over a link divided
by the time taken to transfer it in bits per second (bps). The various measuring units are
bits per second (bps) and bytes per second (Bps) or baud, kilobits per second (kbps),
megabits per second (mbps), gigabits per second (gbps), terabits per second (tbps.)
CTM: RJ-45 is a short term for Registered Jack-45. It is an eight-wire connector used to connect computers
on LANs, especially Ethernets.
3. Ethernet Card: It is a hardware device that helps in the connection of nodes within a network.
Ethernet card is also known as a network card, network adapter or NIC (network interface
card). It is a card that allows computers to communicate over a computer network. On
Ethernet card, a physical address of each communicating computer is mentioned. Physical
address is known as MAC address.
8.10
4. Hub: It is multi-port and unintelligent network device which simply transfers data from
one port of the network to another. A hub is a hardware device used to connect several
computers together with different ports. When the packet reaches one port, it is copied to
all other ports of the hub without changing the destination address in the frame. Rather,
it simply copies the data to all of the nodes connected to the hub.
Hubs can be either active or passive. Hubs can usually support 8, 12 or 24 RJ-45 ports.
But the problem with hub is that it is not an intelligent device. It shares bandwidth with
all the attached devices and broadcasts the data, i.e., sends the data frames to all the
connected nodes, as it does not remember devices/computers connected to it. Also, it
cannot filter the data and causes unnecessary traffic jams.
A hub can both send as well as receive information, but only one task at a time. However, a
hub is an inexpensive way to connect multiple nodes/devices to network.
CTM: Hub is a device used to connect several computers with each other.
5. Switch: A switch (switching hub) is a network device which is used to interconnect computers
or devices on a network. It filters and forwards data packets across a network. It is also a
multi-port device but with some intelligence and so the data packets received from one port
of network are refreshed and delivered to the other port of the network. The main difference
between hub and switch is that hub replicates what it receives on one port onto all the other
ports, while switch keeps a record of the MAC addresses of the devices attached to it.
6. Bridge: A bridge is a device that works on the physical layer as well as on data link layer. A
network bridge connects multiple network segments at the data link layer (layer 2) of the
OSI model. Bridges relay frames between two originally separate segments. When a frame
enters a bridge, the bridge not only regenerates the signal but also checks the physical
address of the destination and forwards the new copy only to that port.
8.11
An important advantage of using a bridge is that it is a smarter hub as it can filter network
traffic on the basis of the MAC addresses.
PC 4 PC 5 PC 4 PC 5
PC 1 PC 2 PC 3 PC 1 PC 2 PC 3
Fig. 8.10: Ethernet Bridge
CTM: A bridge is a device that links two segments together of the original network.
7. Gateway: A gateway is a device that connects dissimilar networks. In internet, several networks
are communicating with each other and each network has a different configuration. In
order to make reliable communication, there must be a device that helps in communicating.
Gateway is a device which establishes an intelligent connection between a local area network
and external networks with completely different structures.
******** Workstation
Supplement – Computer Science with Python–XII
Gateway
8. Repeater: A repeater is a device that operates only on the physical layer of the OSI model. As
a signal travels a fixed distance, before attenuation of the signal, a repeater is used which
amplifies and restores signals for long-distance transmission. A repeater is an electronic
device that receives a signal before it becomes too weak and regenerates the original
signal. Also, it is a two-port network device that strengthens the signal intensity and
connects two identical networks. In most twisted pair Ethernet configurations, repeaters
are required for cable runs longer than 100 metres. A repeater does not change the
functionality of the network; instead, it makes the signal strong before it degrades.
Repeaters are also extensively used in broadcasting where they are termed as translators
8.12 or boosters.
Weakened Signal Regenerated Signal
Repeater
Repeater
No signal
through the hill
CTM: Repeater is a device that amplifies a signal that is transmitted across the network so that the signal is
received in the same way as it is sent.
9. Router: A router is a networking device that forwards data packets from the source
machine to the destination machine by using the shortest path. Routers are used at the
network layer, which is the third layer of the OSI model.
INTERNET EXTENDING A NETWORK USING
A LAN CABLE CONNECTION AND A SECOND ROUTER
Secondary
Main Router Router
LAPTOP LAPTOP
MOBILE TAB TAB MOBILE
CTM: A router is a networking device that helps in forwarding packets from one machine to another.
10. Wi-Fi Card: A Wi-Fi card is either an internal or external Local Area Network adapter with a
built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables
a user to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards
as they allow the user to set up connection without any wire. Wireless Fidelity (Wi-Fi)
cards are widely used in notebook computers due to their highly portable nature. The most
common Wi-Fi cards used in desktop computers are PCI-Express Wi-Fi cards made to fit
the PCI-Express card slots on the motherboard. 8.13
8.10 TYPES OF NETWORKS
A computer network may be small or big depending upon the number of computers and other
network devices linked together. Thus, networks vary in size, complexity and geographical spread.
A computer network can be on a table, in a room, building, city, country, across continents or
around the world.
On the basis of geographical spread, networks may be classified as:
1. PAN
2. LAN
3. MAN
4. WAN
10 Metres
Supplement – Computer Science with Python–XII
CTM: The network that belongs to a single person or user is known as PAN.
CAMPUS
LAN in Building
LAN in Campus
Data transfer rate speed over a Local Area Network can vary from 10 mbps to 1 gbps.
SOHO
Base station customer
Residential
customer
Multi-tenant
customers
Repeater
SME
customer
Base station
Wide Area
Network (WAN)
Satellite
Metropolitan
Area Network
(MAN)
Local Area
Personal Area Network (LAN)
Network (PAN)
The following table summarizes the characteristics of PANs, LANs, MANs and WANs.
Parameter PAN LAN MAN WAN
Area covered Small area A building or campus A city (up to Entire country,
(up to 10 m (up to 10 km) 100 km radius) continent or globe
Supplement – Computer Science with Python–XII
radius)
Networking Negligible Inexpensive Expensive Very expensive
cost
Transmission High speed High speed Moderate speed Low speed
speed
Error rate Lowest Lowest Moderate Highest
Network WLAN, USB LAN/WLAN, Hub/ Router, Gateway Router, Gateway
devices used Dongle Switch, Repeater,
Modem
Technology/ Infrared, Bluetooth Ethernet, Wi-Fi Optical fibre, Microwave Satellite
media used Radio-wave,
Microwave
CTM: LAN and WAN are the two primary and best-known categories of area networks; the others have
emerged with technological advances.
8.16
Comparing LAN and WAN
As we have seen, computer networks can be classified into LAN, MAN and WAN categories on
the basis of their geographical domains. A WAN extends over a large geographical area, such as
states or countries. A LAN is confined to relatively smaller areas, such as an office, a building,
etc. A MAN usually covers an entire city. It uses the LAN technology. The most common example
of MAN is the cable television network. Thus, the basic points of difference between LAN and
WAN are as follows:
1. The distance between the nodes in a LAN connection is limited to a specific range. The upper
limit is approximately 10 kilometres and the lower limit is one metre. On the other hand,
WANs are spread across thousands of kilometres in different countries or regions.
2. LANs operate between speeds of 1 mega bit per second (mbps) and 10 mbps while WANs
operate at speeds of less than 1 mbps. To achieve speeds of several hundred mbps, it is
advisable to use the optical fibre technology.
3. The error rate in LANs is lower than that in WANs because of the short distances involved in
LANs. The error rate in LANs is approximately one thousand times less than that in WANs.
4. As LANs are limited by distance, an entire LAN is usually under the control of a single entity,
such as an organization. On the other hand, WANs are usually operated and controlled by
multiple organizations.
Thus, we can say that in comparison to WANs, LANs cover a limited area but they operate with
high speed and low error rates.
CTM: Topology is a way of connecting several devices with each other on a network.
Types of Topologies
Basically, there are five types of topologies and each topology has some advantages and disadvantages.
Types of Topology
Mesh Topology Star Topology Bus Topology Ring Topology Tree Topology
8.17
Supplement – Computer Science with Python–XII
BACKBONE
Nodes
Dropline
Therefore, there should be a limited number of nodes connected to a line. Ethernet is a common
example of bus topology.
8.19
Advantages of Bus Topology
(a) Nodes can be connected or removed easily from bus network.
(b) It requires less cable length than a star topology.
(c) Bus network is easy to implement and can be extended up to a certain limit.
(d) It works well for small networks.
CTM: There is a main cable which is connected to several workstations through taps. Collision of data can
take place in bus topology.
Supplement – Computer Science with Python–XII
8.20
8.11.5 Tree Topology
In tree topology, all or some of the devices are Central
connected to the central hub, called an active hub
hub, and some of the devices are connected
to the secondary hub, which may be an active Secondary Secondary
hub or passive hub. An active hub contains hub hub
the repeater that regenerates the signal when
it becomes weaker with longer distances. A
passive hub simply provides a connection
Fig. 8.23: Tree Topology
between all other connecting nodes.
8.21
CTM: In tree topology, the main central hub is connected to the secondary hub through which all devices
are connected with each other. Tree topology is just like a parent-child relationship.
The decision to select a particular topology for a network does not take place in isolation as
the topology determines the type of media and access methods that would be used on the
network. Therefore, several factors are taken into consideration before selecting a topology
which are as follows:
Cost: Cost signifies that the network should be cost-effective. For this, it is required to
minimize the installation cost. This can be done by selecting an economical transmission
medium (that is, wires) for data exchange between the network nodes. The network cost
can also be minimized by reducing the distances between the nodes.
Flexibility: Flexibility signifies that the network must be flexible enough, i.e., it should be
easy to reconfigure. Reconfiguring a network means to rearrange the existing nodes or add
new ones on the network.
Reliability: It refers to the degree of trust that can be placed on a network. Like any
other system, a network can also encounter failure. A network failure can occur due to the
following causes:
1. When an individual node stops working.
2. When the entire network fails. This is caused by a more serious fault that stops the
working of an individual node.
CTM: Communication media is a transmission media used for sending data or signal across the network.
8.22
Types of Communication/Transmission Media
All communication/transmission media can be divided into two categories:
Communication
Media
Guided Media (Wired Media): Guided media are also known as physical or conducted
media. These media use wires for transmitting data. Various wired connections are twisted
pair wire, coaxial cable and fibre optic cable.
Unguided Media (Wireless Media): A transmission media that does not require the use of
cables for transmission of data is known as unguided media. Wireless transmission is also
known as unguided media or non-physical media as the transmission takes place through
various types of electromagnetic waves, such as radio waves, terrestrial microwave
transmissions, satellite transmissions, cellular radio systems, infrared transmissions, etc.
2. Coaxial Cable
A coaxial cable is generally called a coax wire. It consists braided shield foil shield
of insulated copper wires surrounded by a braided centre
metal shield and covered in a plastic jacket. Coax cables conductor
are capable of carrying higher frequency signals than
twisted pair cables. The wrapped structure provides
it a good shield against noise and crosstalk. Coaxial
cables provide high bandwidth rates of up to 450 mbps. outer jacket dielectric
Coaxial cable also comes in two primary physical types: Fig. 8.27: Coaxial Cable
thin coaxial cable and thick coaxial cable. There
are three categories of Coax cables, namely RG-59 (Cable TV), RG-58 (Thin Ethernet) and
RG-11 (Thick Ethernet). RG stands for Radio Guide. Coax cables are widely used for internet
connections and cable televisions.
(a) Coaxial cable can support greater cable lengths between network devices than twisted pair
cable.
(b) It is useful for transmitting analog as well as digital data across the network. For analog
data transmission, 75 ohm broadband coaxial is used and for digital transmission, 50 ohm
baseband cable is used.
(c) It is widely used for cable television and internet connections.
(d) Coax are used for transmitting several channels simultaneously, i.e., they are helpful in
broadband transmission.
(e) Coaxial cable has excellent noise immunity because of thick covering outside the insulated
wires.
(f) Thick coaxial cable has an extra protective plastic cover that helps keep moisture away.
(g) It is relatively inexpensive as compared to fibre optic cable.
8.24
Disadvantages of Coaxial Cable
(a) A thick coaxial cable does not bend easily and thus is difficult to install.
(b) It is expensive as compared to twisted pair cable.
Jacket
Cladding
Buffer
Coating Core
1. Microwave
Microwave signals are used to transmit data without the use of cable. It is a line-of-sight
transmission as signal travels in a straight line. In microwave communication, two directional
parabolic antennas are mounted on towers, buildings or hills to send and receive signals
through air. However, they must be properly aligned with each other, otherwise the signal will
not be focused well at the receiving antenna.
Secondary
Path
Direct Path
(a) It is a cheaper source of communication as it avoids using cables and maintaining repeaters.
(b) Communication through microwave is much easier over difficult terrain.
(c) Microwave system permits data transmission rate of about 16 gigabits per second.
8.26
2. Radio Waves Radio
Tower
Radio waves use radio frequencies which
are allocated to private businesses for direct
voice communication. A radio set-up uses
transmitter and receiver. A transmitter sends
radio waves and encodes them into sine
waves which, when received by a receiver, are
decoded and the message is received. Both
the transmitter and receiver use antennas
to radiate and fetch radio signals. They are
Sender Receiver
not line-of-sight transmission and, hence, can
penetrate buildings easily.
(b) They are omnidirectional and can travel Fig. 8.30: Radio Waves
in any direction.
(c) Transmitter and receiver antenna do not need to be physically aligned.
(d) Radio wave transmission offers mobility.
(e) It is cheaper than laying cables and fibres.
(f) It offers ease of communication over difficult terrain.
3. Satellite Link
Satellite transmission is also a kind of line-of-sight
transmission that is used to transmit signals
throughout the world. When the frequency is
greater than 3 GHz, the transmission is known as Receiving
Transmitting signal
microwave. Satellite is a special type of microwave signal 35000 km
transmission medium.
Up-link Down-link
It provides various types of services such as
transmitting fax, voice data, video, email and other
Transmitting Receiving
internet applications. In satellite communication, Antenna Antenna
an earth station has a satellite dish, which functions
as an antenna to transmit and receive data from
Fig. 8.31: Satellite Link
satellites.
When data is transmitted from an earth station to a satellite, it is known as uplink and when
transmission takes place from a satellite to an earth station, it is known as downlink. In satellite,
there are transponders that send and receive signals from/to the earth station.
8.27
Advantages of Satellite Link
(a) The area covered is quite large.
(b) No line-of-sight restrictions such as natural mountains, tall buildings, towers, etc.
(c) Earth station which receives the signals can be at a fixed position or can be relatively mobile.
4. Infrared
The type of transmission that uses infrared light to send data is known as infrared transmission.
The data is transmitted through air and can propagate in the open space; however, it cannot
penetrate the walls of the room. It is an example of short range wireless network. Infrared
speed varies from 2.4 kbps to 16 mbps. A very good example of infrared transmission is a
handheld remote control such as remote control of a TV or AC, etc.
Housing Shield
Transmitter Transmitter
Receiver Receiver
Supplement – Computer Science with Python–XII
Lens
8.28
8.13 NETWORK TERMINOLOGIES
1. Data Channel: A channel is a communication medium through which data or message is
transferred from the sender to the receiver.
2. Baud: The number of changes in a signal per second is called a baud. It is the unit of
measurement for the information-carrying capacity of a communication channel.
3. Bits per second: It is the measuring unit of speed at which data transfer takes place.
4. Bandwidth: The bandwidth measures the information-carrying capacity of a line or a
network. It is the difference between the highest and lowest frequencies allowed on a
transmission media.
B = fh – fl
where fh and fl are the highest and lowest frequencies.
For example, If the highest frequency is 80 Hz and lowest frequency is 50 Hz, what is the
bandwidth of a signal?
Sol. B = fh – fl
B = 80 – 50
B = 30 Hz.
5. Protocol: A protocol is an agreement between the communicating parties on how
communication is to proceed. Protocol means a set of rules that governs a network.
A protocol is a formal description of message formats and the rules that two or more
machines must follow to exchange those messages.
For example, using library books.
Types of Protocols
Protocol specifies what is communicated and how. Let us take an example to explain this
concept. In India, different people speak different languages. Now, a person from Tamil
Nadu and a person from Punjab may not be able to communicate with each other because
of the language difference. However, they can exchange their ideas and communicate with
Supplement – Computer Science with Python–XII
each other using English as their common language. Similarly, in case of computers, the
hardware, software or even a combination of the two might be required to implement and
carry out the protocol. Thus, the protocol will help in setting up a channel of communication
or a connection between two computers; in other words, a hardware connection between
two computers.
There are multiple protocols defined for computer networks, which are as follows:
(a) TCP (Transmission Control Protocol)
(b) IP (Internet Protocol)
(c) FTP (File Transfer Protocol)
(d) PPP (Point-to-Point Protocol)
(e) SMTP (Simple Mail Transfer Protocol)
(f) POP3 (Post Office Protocol)
(g) TELNET (Remote Login)
8.30
(a) TCP/IP (Transmission Control Protocol/Internet Protocol)
TCP is one of the main protocols in TCP/IP networks. The IP protocol deals only with
packets but TCP enables two hosts to establish a connection and exchange streams
of data. TCP works with the Internet Protocol (IP), which defines how computers
send packets of data to each other. The packets are delivered not in a sequential
order; instead, they are delivered randomly. Now, TCP at the receiver side collects
all packets and arranges them in a sequential order. TCP is a reliable stream delivery
service that guarantees that all bytes received will be identical with bytes sent and
in the correct order. Since packets are transferred over many networks and, thus,
not reliable, a technique known as positive acknowledgement with retransmission
is used to guarantee reliability of packet transfers.
(b) IP (Internet Protocol)
IP is the primary protocol present in the internet layer of the internet protocol suite.
It is responsible for delivering packets from the source host to the destination host
based on the IP addresses mentioned in the packet headers. IP forwards each packet
based on a four byte destination address (the IP number). The packets are moved
randomly from source to destination, which are then assembled in a sequential
order at the destination computer. IP stores destination addresses in the form of IP
addresses so that the packets will move to the destined address only by following
the shortest route.
(c) FTP (File Transfer Protocol)
FTP is the simplest and most secure way to exchange files over the internet. The main
objectives of FTP are:
• Transmitting and sharing of files (computer programs and/or data).
• Indirect or implicit use of remote computers.
• To shield a user from variations in file storage systems among different hosts.
• To transfer data reliably and efficiently.
• FTP uses the internet’s TCP/IP protocols to enable data transfer.
FTP is most commonly used to download a file from a server using the internet or to
upload a file to a server (e.g., uploading a web page file to a server).
While sharing files from one system to another, we may encounter several problems—
two systems may have different directory structures, two systems may have different
file-naming conventions, or two systems may have different ways to represent text
and data. All these problems are solved by FTP.
CTM: File transfer protocol is used to transfer files from server system to requesting node, primarily for
information sharing.
The POP (Post Office Protocol 3) is a simple and standard method to access mailbox
and download messages to the local computers. The user can receive messages with
the help of POP protocol. The advantage is that once the messages are downloaded,
an internet connection is no longer needed to read the mail. A user can read all
emails offline as these are saved on the computer’s hard disk.
Just like with the SMTP protocol, the POP protocol (POP2 and POP3) sends text
commands to the POP server. There are two main versions of this protocol—POP2
and POP3—to which ports 109 and 110 respectively are allocated and which operate
using radically different text commands. To get a mail from POP server, a user must
enter a valid username and password for their email account. The POP3 protocol
thus manages authentication using the user name and password; however, it is not
secure because the passwords, like the email, circulate in plain text over the network.
POP3 protocol blocks inbox during its access which means that simultaneous access
to the same inbox by two users is impossible.
8.32
(g) TELNET (Remote Login)
Telnet is a remote login that helps a user to log on to another user’s terminal without
being its original user. A user who is logging in to their own system can also get
access to log on to another user system and perform various functions such as
accessing files or sharing files to/from the remote system. With TELNET, a user logs
in as a regular user with whatever privileges that may have been granted to the
specific application and data on that computer.
Working of Telnet
(i) A user is logged in to the local system and invokes a TELNET program (the
TELNET client) by typing telnet<host address> or telnet <IP address>
(ii) The TELNET client is started on the local machine (if it isn’t already running).
The client then establishes a TCP connection with the TELNET server on the
destination system.
(iii) Once the connection has been established, the client program accepts characters
from the keyboard feed by the user and passes one character at a time, to the
TELNET server.
(iv) The server on the destination machine accepts the characters sent to it by the
client and passes them to a terminal server.
(v) The terminal server gives outputs back to the TELNET server and displays them
on the user’s screen.
The user can terminate the telnet session by typing LOGOFF or LOGOUT on the
system prompt.
Supplement – Computer Science with Python–XII
8.40
intranets and Local Area Networks (LAN). As the data is transmitted in the form of packets, VoIP
uses packet switching technology where each packet follows best route to reach its destination.
VoIP allows both voice and data communications to be run over a single network, which can
significantly reduce infrastructure costs.
There are 3 main causes for the evolution of the voice-over IP market:
1. Low-cost phone calls
2. Add-on services and unified messaging
3. Merging of data/voice infrastructures
Services provided by VoIP are:
Phone to phone, PC to phone, phone to PC, fax to email, email to fax, fax to fax, voice to email, IP
Phone, transparent CCS (TCCS), toll free number (1-800), class services, call centre applications,
VPN, Unified Messaging, Wireless Connectivity, IN Applications using SS7, IP PABX and soft
switch implementation.
The various protocols used for VoIP are:
1. H.323
2. Session Initiation Protocol (SIP)
CTM: VoIP is a protocol that is used for transmitting voice data and multimedia data over internet protocol.
It uses high speed broadband internet connection.
8.41
8.30 INTRODUCTION TO WEB SERVICES
8.30.1 WWW (World Wide Web)
WWW is an information service that can be used for sending and receiving information
over the internet through interlinked hypertext documents. Web pages may contain text,
images, videos and other multimedia components as well as web navigation features
consisting of hyperlinks. The documents are formatted in a markup language called
HTML (Hyper Text Markup Language) that provides links to other documents as well as
graphics, audio and video files. The World Wide Web is based upon client-server
architecture where a client sends a request and the server processes that request and sends
responses. A WWW client is called a web browser and a WWW server is called a web server.
CTM: WWW is a set of programs and protocols that allows the user to create and display multimedia web
pages and is linked to the internet.
CTM: HTML is a Markup language that enables users to create web pages and format them using predefined
tags. Tags are called coded elements.
CTM: XML is a Markup Language for creating documents in a structured format. Users can create their own
tags along with predefined tags already defined by HTML.
8.51
8.30.4 Hyper Text Transfer Protocol (HTTP)
HTTP is used to transfer all files and other data (collectively called resources) from one computer
to another on the World Wide Web. This protocol is used to transfer hypertext documents over
the internet. HTTP defines how the data is formatted and transmitted over the network. When
an HTTP client (a browser) sends a request to an HTTP server (web server), the server sends
responses back to the client. This transfer of requests and responses is done following HTTP
protocol.
The main features of an HTTP document are:
1. It is a stateless protocol; this means that several commands are executed simultaneously
without knowing the command which is already executing before another command.
2. It is an object-oriented protocol that uses client server model.
3. The browser (client) sends request to the server, the server processes it and sends responses
to the client.
4. It is used for displaying web pages on the screen.
8.52
Country Specific Domain Names
.in - India
·au - Australia
·ca - Canada
.ch - China
.nz - New Zealand
.pk - Pakistan
.jp - Japan
.us - United States of America
8.30.6 URL
URL stands for uniform resource locator that helps in locating a particular website or a web
page, for example, http://www.cbse.nic.in/academics.html is a URL for a specific website. In
this URL, ‘http’ stands for hypertext transfer protocol, and ‘www.cbse.nic.in’ indicates the IP
address or the domain name where the source is located. ‘academics.html’ specifies the name
of the specified html document on the website of CBSE.
CTM: URL stands for uniform resource locator that stores the address of a web page.
8.30.7 IP Address
The computers connected to a network also need to follow some rules to communicate with
each other. These sets of rules are known as protocols. Several types of protocols are used for
communication over networks. However, the most common one is the Transmission Control
Protocol/Internet Protocol or TCP/IP. A network using TCP/IP is known as a TCP/IP network.
The internet is an example of the TCP/IP network. Therefore, it becomes important that each
device should have a unique address to identify it on a TCP/IP network. This unique address is
known as IP address. IP address is short for Internet Protocol (IP) address. An IP address is an
identifier for a computer or device on a TCP/IP network. Networks using the TCP/IP protocol
route messages based on the IP address of the destination. The format of IP address is a 32-bit
numeric address written as four numbers separated by periods. Each number can be 0 to 255.
Some examples of IP addresses are: 192.168.1.2, 10.324.1.3 and 109.134.2.2.
As seen in the above examples, the numbers in an IP address are in the decimal form. When
an IP address is processed, the computer converts these numbers into binary form internally.
The following is an example of IP address in the decimal form: 192.168.1.10
The preceding IP address in its binary form is: 11000000.10101000.00000001.00001010
The IP address of a computer is assigned by the Internet Service Provider (ISP) whose internet
connection is used on that computer.
8.53