NEB Class 12 Computer Data Communication and Networking Notes
NEB Class 12 Computer Data Communication and Networking Notes
com
COMPUTER SCIENCE
Grade: XII
REFERENCE NOTE
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
Data Transmission
Data may be transferred from one device to another by means of some communication media. The
electromagnetic or light waves that transfer data from one device to another device in encoded form are
called signals. Data transmissions across the network can occur in two forms i.e.:
a. Analog signal
b. Digital signal
Analog Signal
The transfer of data in the form of electrical signals or continuous waves is called analog signal or analog
data transmission. An analog signal is measured in volts and its frequency is in hertz (Hz).
Digital Signal
The transfer of data in the form of digit is called digital signal or digital data transmission. Digital signals
consist of binary digits 0 & 1. Electrical pulses are used to represent binary digits. Data transmission
between computers is in the form of digital signals.
Modulation
The modulation is the process of changing or encoding the carrier wave at certain amplitude (height) and
frequency (timing) is called modulation.
The process of changing some characteristics (amplitude, frequency or phase) of a carrier wave in
accordance with the intensity of the signal is known as modulation. Modulation means to change.
There are three types of modulation:
a. Amplitude Modulation (AM): Amplitude modulation is an increase or decrease of the carrier
voltage (Ec), will all other factors remaining constant.
b. Frequency Modulation (FM): Frequency modulation is a change in the carrier frequency (fc) with
all other factors remaining constant.
c. Phase Modulation (PM): Phase modulation is a change in the carrier phase angle (θ). The phase
angle cannot change without also affecting a change in frequency. Therefore, phase modulation
is in reality a second form of frequency modulation.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
destination passing several stages. The block diagram of general communication system is described
below:
C. Transmitter:
As the name suggests transmitter is responsible for transmitting and processing the electrical signals
through the communication channel. In long distance radio communication, signal amplification is
necessary for transferring data. Transmitter processes the signals such as restriction of range of audio
frequencies, amplification and modulation of signals. All these processes are done just to ease the
transmission of signals through the channel.
D. Transmission channel or channel:
Transmission channel is the transmission medium through data signals or information passes from source
to destination. It is the medium through which the message travels from the transmitter to the receiver.
It provides the connection between the sender / transmitter or receiver. Communication channel may be
wired/ guided or wireless/unguided. The wired medium or also called point to point channels where
devices are connected through the cables. Whereas wireless medium connect devices wirelessly through
electromagnetic wave signals.
Sometime unwanted signal tend to interfere with the information that unwanted signal is called noise.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
E. Receiver:
The main function of the receiver is to reproduce the message signal in electrical form from the
distorted received signal. This reproduction of the original signal is accomplished by a process known as
the demodulation or detection. Demodulation is the reverse process of modulation carried out in
transmitter.
F. Output Transducer/Destination:
The transducer presented at output side of the communication system is called output transducer. It is
responsible of converting electrical signals into non electrical signals like sound. It is also known as
destination and is responsible for converting message signals into its original form from the electrical
form. For instance, speaker is a destination or transducer in voice communication.
Data communication is the process of exchanging data among the computing devices. Data may be in
different form like file, text, image, sound etc. These data are transmitted between a source and a
destination. Source device is responsible for generating data and destination device is responsible for
receiving the data generated by source. Communication like, email, IRC, VOIP etc. are examples of data
communication. Data communication is the transmission of electronic from one computing device to
another. The data communication comprises of following elements:
1. Sender (source): It is the device that generates and sends that message.
2. Medium: It is the channel or physical path through which the message is carried from the sender
to the receiver. The medium can be wired like twisted pair wire, coaxial cable, fiber-optic cable or
wireless like laser, radio waves, and microwaves.
3. Receiver (sink): It is the device that receives the message.
4. Data: It is the information or data to be communicated. It can consist of text, numbers, pictures,
sound or video or any combination of these.
5. Protocol: It is a set of rules that govern the communication between the devices. Both the sender
and the receiver follow same protocols to communicate with each other.
Message
Protocol Protocol
Transmission medium
The data communication takes place between two devices connected together either by wired or
wireless media. The sender device generates the data message and send it through the
communication channel using some protocol. After the message is sent the receiver receives the
message using the similar protocol.
6. Encoder: The computer works with digital signals. The communicational channels usually use
analog signals. Therefore, to send data through a communication channel, the digital signals are
encoded into analog signals or into a form which can be transmitted through transmission
medium. This is called encoding. The device that carries out this function is called encoder.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
7. Decoder: The Computer works with digital signals. The communication channels usually use
analog signals. Therefore, to receive data from a communication channel, the coded analog signals
or any other encoded form is converted back to digital signals. This is called decoding. The device
that carries out this function is called decoder.
Mode of Communication
Mode of communication normally refers to the ways in which communication takes place or data gets
transmitted between source and destination nodes. Modes of data transmission direct the direction,
mechanism of data flow between devices.
1. Simplex Communication:
In this type of communication data transmission takes place only in one direction. It is also called a
unidirectional communication mode.
Radio, Television, Newspaper and keyboard to CPU Communication are some of the most common
example of simplex communication.
Features:
Data are transmitted in only one direction.
The sender sends data and receiver receives only.
There is not bidirectional communication.
Listeners cannot reply immediately.
Radio and television broadcast are its examples.
2. Duplex Communication:
In duplex communication, mode data transmission is possible from both directions. The receiver can
immediately respond to the sender. The duplex communication can be categorized into two groups.
a. Half Duplex:
In this type of communication mode data can be transmitted in both directions, but only in one direction
at a time. Both sender and receiver cannot transfer the data at a time. While sending data it cannot
receive it and while receiving data it cannot send.
Features:
Data are transmitted in both direction but single direction at one time.
Receiving end acts as mere listener while sender sends data and vice versa.
The communication is slower.
Willkie Talkie used by the police man is the best example of half-duplex communication mode.
b. Full Duplex
Full Duplex communications allows data to flow the information at the same time. Speaking on telephone
of full Duplex communication mode in which both the sender and receiver can speak simultaneously.
Bidirectional communication at the same time is called full duplex communication mode.
Features:
Data are transmitted in both direction at the same time.
When one end sends data other end can receive as well as send data.
Communication is faster.
Telephone is an example of full duplex mode.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
3 The bandwidth of LAN is The data transmission rate The data transmission rate is
high. i.e. data transmission is slower in comparison to slowest in comparison to
rate. LAN. LAN and MAN.
Transmission media:
A transmission media is defined as the means of communication between two networking devices that
helps to transfer data from sender to receiver and vice versa.
Transmission channel is the path through which data are transmitted from source to destination.
The path through which data transmit form source to destination is known as communication
media.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
Coaxial Cable:
Coaxial cable is a type of copper cable specially built with a metal shield and other components
engineered to block signal interference. It is primarily used by cable TV companies to connect their
satellite antenna facilities to customer homes and businesses.
Coaxial cable contains two conductors inner and outer, which are separated by an insulator. These two
conductors lies parallel to each other. The inner conductor is made up of copper wire which is covered by
an inner insulator. The inner insulator is again covered by outer conductor or metal foil. Outer metal
wrapping is used as a protection against noise and as the second conductor which completes the circuit.
The outer conductor is covered with an insulating cover.
Advantages:
1. It is faster and reliable than twisted pair cable.
2. It can transfer data over medium range of distance.
Disadvantages
1. It is not appropriate for relatively larger distance.
2. It is expensive than twisted pair cable.
3. It is rarely used in computer network.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
1. Radio wave:
Radio wave are the signals ranging frequency in between 3 KHz and 1 GHz.
When the antenna transmits the radio wave; they are propagated in all directions. Due to this the
sending and receiving antenna doesn’t need to be in line of sight position. Antenna is responsible for
converting outgoing data packets into radio waves and vice-versa.
Features:
It is wireless communication technology that transmits voice or data over the air using a lower
frequency band than microwaves.
The signal is travel in up and down manner so that it can reach any place until the strength of
waves falls.
AM and FM radios and cordless phones use radio waves for transmission.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
2. Microwave:
Microwave, in contrast, have been used in data communications for a long time. They have a higher
frequency than radio wave and therefore, they can handle larger amounts of data. There are, of course,
problems with microwaves attenuation and environmental interference.
Microwave transmission is the line of sight transmission.
The transmit station must be in visible contact with the receive station.
The microwave is unidirectional.
This sets the limit on the distance between stations depending on the local geography.
The microwave is another type of electromagnetic waves that have a frequency range of 1 GHz to
300 GHz.
In this transmission, whenever the signals are transmitted through an antenna, the signals can make
narrow to focus to a particular point. And in this transmission, there is a requirement of proper
alignment of sending antenna and receiving antenna.
3. Infrared:
Infrared offers a great unbound photonic solution. Like fiber-optic cabling, infrared communications use
light. So, they are not bound by the limitations of electricity. They are normally used for short range
communication such as in communication of remote and TV, Ac etc.
Satellite Transmission:
These are the artificial satellites which are placed in the space for the purpose of communication
between different antennas available of on the earth. These artificial satellites facilitate the transmission
of signals between stations of the earth. They relays and amplifies radio telecommunication by creating
communication channel between source transmitter and destination transmitter.
Jitter:
When we make a call over internet with anyone and suddenly line drops and their voice starts
breaking up, its called jitter.
Jitter is defined as a variation in the delay of received packets.
Jitter is when there is a time delay in the sending of these data packets over your network
connection.
Singing:
Singing is the result of sustained oscillations due to positive feedback in telephone amplifiers
or amplifying circuits.
Singing may be regarded as echo that is completely out of control. This can occur at the
frequency at which the circuit is resonant.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
Echo:
Echo in telephone systems is the return of a talker's voice. It is most apparent to the talker himself
or herself. Secondarily, it can also be an annoyance to the listener.
Echo is a major annoyance to the telephone user. It affects the talker more than the listener. Two
factors determine the degree of annoyance of echo: its loudness and its length of delay.
Crosstalk:
Crosstalk is a disturbance caused by the electric or magnetic fields of one telecommunication
signal affecting a signal in an adjacent circuit.
It is an effect a wire on another. One wire acts as a sending antenna and the transmission
medium acts as the receiving antenna. Just like in telephone system, it is a common experience
to hear conversation of other people in the background. This is known as cross talk.
Distortion:
Distortion is the change in the form or shape of the signal. Signals are made up of different
frequencies are composite signals.
Distortion occurs in these composite signals. Any change in a signal that alters the basic
waveform or the relationship between various frequency components is called distortion. It is
usually a degradation of the signal.
Noise:
Noise is another impairment in data communication. It is another problem of data
communication. During data communication there are some random or unwanted signals mix
up with the original signal is called noise.
Noises can corrupt the signals in many ways along with the distortion introduced by the
transmission media.
Bandwidth:
Bandwidth is the amount of data transmitted through the transmission channel at certain
period of time. High bandwidth means higher bits of data are transmitted and low bandwidth
means less bits of data are transmitted through the communication channel.
The bandwidth of analog device is measured in Hertz (Hz) and bandwidth of digital device is
measured in bps (bits per second). It is also known as data holding capacity of transmission
channel.
Receiver:
Receiver, in electronics, any of various devices that accept signals, such as radio waves, and
convert them (frequently with amplification) into a useful form. Examples are telephone
receivers, which transform electrical impulses into audio signals, and radio or television
receivers, which accept electromagnetic waves and convert them into sound or television
pictures.
Network architecture:
Network architecture refers to the various services provided by the network and it also deals with how
data is transmitted from one computer to others.
1. Client server network: An arrangement of computers to resource sharing and communicate each
other through a central device (server) to all workstations (clients) is called client server architecture
one or more computers in the network act as server which provides services to other computers which
are called clients.
The server is a high capacity high speed computer with a large memory.
Server contains the network operating system.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
The central server manages, organize, and coordinate all network clients on the network.
The most common service is provided by different servers are file services, print services,
Message services and database services.
Advantages
1. Centralized administration is possible through this network.
2. High security can be provided by suing appropriate server.
3. It is appropriate for large organization.
4. Data recovery and backup process is easier.
Disadvantages
1. If server fails whole network is affected.
2. It is expensive due to use of dedicated server.
3. It is complex to establish and manage.
4. Experienced administrator is required to operate.
2. Peer-peer network: In peer-to-peer architecture computers are connected individually in pair (one-
to-one connection). A peer-to-peer network is the type of network in which all computers in the
network act both a client and a server i.e. all computers can both request and provide services.
Each workstations act as both a client and a server.
There is no central repository for information and no central server to maintain.
Peer to peer network are generally simpler and less expensive.
A peer to peer network is also known as a distributed network.
Peer to peer computing or networking is a distributed application architecture that partitions
task or workstations between peers.
Peers are equally privileged and equal participants in the application.
Each node shares its sources with other nodes in the network.
Advantages
1. It is simple cheap and easier to set up.
2. Since there is no dedicated server, user can manage their own server.
3. Failure of a computer in a network doesn't effect the other computer in a network.
Disadvantages
1. Data security is very poor in this type of architecture.
2. Data recovery and backup is difficult.
3. It is not appropriate for large scale organization.
4. Network administration is difficult it without dedicated Server.
2. Star Topology:- Computers in the network are connected to each other with the help of central
connecting device hub or switch or server. It is based on client server architecture. It is the most
popular and widely used topology for LAN.
Advantages
- It is simple, reliable and easy to set up and re-configuration.
- It is flexible to connect new computer and remove existing computer in the network.
- It is very easy to find out fault.
- If any computer in the network goes down, then other computers can continue their functions.
Disadvantages
- It requires very large amount of cables.
- It is expensive topology.
- If there is any problem in central device hub or switch then the entire network will be down.
- The data traffic is high in central device hub.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
3. Ring Topology:- Computers are interconnected to each other by making a closed circular structure
that means each computer is connected to other two adjacent computer in either network
architecture.
5. Tree Topology:- Tree topology is the extension of bus or star topology. Data can flow from top to
bottom and vice versa.
Advantages
Reliable
Scalable
Flexible
Effective
Disadvantages
Complexity of design
Costly connecting devices
Costly infrastructure
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
1. Physical Layer: This layer concerned with transmission of bit it determines voltage level for 0 & 1. It
also determines the data rate of the system. This layer involves standardized protocol dealing with
electrical & signaling interface.
2. Data Link Layer: It handles error in physical layer. This layer ensures the correct delivery of frame to
the destination address. It consists of 2 parts or 2 sub-layers. i.e.
i. Logic Link Control
ii. Media Access Control
3. Network Layer: This layer is concerned with transmission of packet. N/w layer protocol chooses the
best path to send a package called routing. Two protocols are widely used in n/w layer.
i. X.25 Protocol
ii. Internet Protocol
4. Transport Layer: It provides the mechanism for the exchange of data between end systems. It ensures
that the data received is in fact in order. Following jobs are performed by this layer.
i. Port Addressing
ii. Segmentation & Reassemble
iii. Connection Control
5. Session Layer: It is responsible for requesting logical connection to be established for communication
process. This logical connection is termed as session. It also provides data synchronization between two
communication terminals.
6. Presentation layer: This layer translates format data to adapt to the needs of the application layer &
nodes at both receiving & sending end of communication process. It handles data communication,
formatting, encryption, decryption, etc.
7. Application Layer: It is the top-most layer of OSI model & provides user access to the n/w. It provides
services that support user application, such as database access, email & file transfer, etc.
5. Router:
A router transmits information from one network to another. The router selects the best path to route a
message, based on the destination address and origin. The router can direct traffic to prevent head-on
collisions and smart enough to know when to direct traffic along back roads and shortcuts.
- Direct signal traffic efficiently.
- Route message between any two protocols.
- Route message between different topologies.
- Route message across fiber optic, coaxial, and twisted-pair cabling.
6. Gateways:
Gateways are just like routers but much more complex and powerful than routers. They are slower than
router and expensive. A gateway has all the features of router and bridges but it can translate instruction
set on sending network into receiving network.
- Gateways make communication possible between different architecture and environments.
- Gateways having higher layer functionalities and works on multiple layer protocols.
7. Wi-Fi:-
The term Wi-Fi suggests wireless Fidelity. It is hardware and software devices. It is wireless technology
and network connecting device. Wi-Fi is not a technical term. The technical term of Wi-Fi is "IEEE802.11"
- It has limited range.
- Wi-Fi is used in many personal computers, video game consoles, MP3 players, smart phones, printers,
digital camera, laptops computers and other devices.
- Wi-Fi is used to create wireless LAN to connect computer system.
8. Bluetooth:
Bluetooth is a wireless technology standard for exchange data over short distance from fixed and mobile
devices. Bluetooth is used to create personal area networks (PANs) with high levels of security.
9. Infared (IR):
Infared (IR) light is electromagnetic radiation with a wavelength longer than that of visible light and below
the red light. These wavelengths correspond to a frequency range of approximately 100 GHz to 100 THz
and include most of the thermal radiation emitted by objects near room.
Internet
The Internet is an interconnected network of thousands of networks and millions of computers linking
business, education institutions, government agencies, and individuals together.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
Gateway
A gateway is a network node that servers as an access point to another network, often involving not only
a change of addressing but also a different networking technology.
IP Address
An Internet Protocol address (IP Address) is an unique identification number assigned to each devices
connected in a network that uses Internet protocol for communication. The typical IP address looks like
216.27.67.137
IP address are expressed in decimal as above which is easier for us to remember, but computers
communicate in binary. So same IP address looks like
11011000.00011011.00111101.10001001
IP address has four sets of number separated by a period ( . ), These sets are Called Octets. IP address
perform mainly two functions. One is identification of Network and Identification of particular host in
that network.
MAC address
Media Access Control (MAC) address also known as hardware or physical address is unique number
associated with a network adapter (NIC). It is used to uniquely identify each device (node) of a network.
MAC address is usually assigned by the manufacturer of a network interface card (NIC) and are stored in
its ROM. All NIC developed contains unique MAC address. It is a 12 digit hexadecimal number (48 bit in
length) and are Witten in following formats.
MM:MM:MM:SS:SS:SS or MM-MM-MM-SS-SS-SS
The first half of the address contains ID number of the adapter regulated by an Internet standards body
and other half represent the number assigned by the manufacturer. For example: 00:A0:C9:14:C8:29
The prefix 00A0C9 indicates manufactures Intel Corporation and 14C829 indicates a particular host.
Intranet:
An intranet is a private network that uses internet protocols, to securely share part of an organization's
information between its employees. An intranet is a Local Area Network or Wide Area Network that uses
TCP/IP protocol but, belongs to a corporation, school, or organization.
The intranet is accessible only to the organization's workers. If the intranet is connected the Internet,
then it is secured by a firewall to prevent unauthorized users from gaining access to it.
Advantages of an Intranet
1. Workforce productivity: Employees can easily access and share information in-between their
workgroups which enhances productivity
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
2. Time: With intranets, organizations can make more information available to employees in any time.
3. Communication: Intranets can serve as powerful tools for communication within an organization.
Extranet:
An extranet is a private intranet that can be accessed by outside users over the secure channel. To gain
entrance to the extranet's resource, an external user must log on to the networks by providing a valid
user ID and password. The extranet is a combination of the public Internet and the closed intranet.
Intranet users are your own employees who know a lot Internet user know much less about
about the company, its organizational structure and your company and also care less
special terminology. about it.
The intranet is used for everyday work inside the The Internet is mainly used to find
company. out information.
Intranet can work on low and mid-bandwidth. Internet requires higher band width.
Network Tool
Network tools are used for supporting easier and effective network connections. Some of the network
tools are:
1. Packet tracer:
Packet Tracer is an innovative and powerful network simulator that can be used for a practice build
own network with routers, switches, wireless, and much more. It allows to experiment with network
behaviour, build models and to ask "what if" questions. It is used to trace the movement of data
packets in data communication. Packet Tracer provides simulation, visualization, authoring,
assessment, and collaboration capabilities to facilitate the teaching and learning of complex
technology concepts.
2. Remote login: Remote login allows a user terminal to connect to a host computer via a network or
direct telecommunications link, and to interact with that host computer as if the user terminal were
directly connected to that host computer. Remote Login is a process in which user can login into a
remote site i.e. computer, and use services that are available on the remote computer. With the help
of remote login a user can understand result of transferring result of processing from the remote
computer to the local computer.
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
Protocols:
A communication protocol is a formal description of digital message formats and the rules for exchanging
that message in between computer systems. Protocols define a set of formal rules describing how to
transmit data especially across a network.
1. TCP/IP (Transmission Control Protocol/Internet Protocol): TCP/IP is a layered set of protocols TCP is
reliable, but complex transport-layer protocol. It is stream connection-oriented and reliable transport
protocol. TCP/IP is the protocol used by Internet. It adds connection-oriented and reliability features. TCP
is responsible for making sure that the data is transmitted to other end. It keeps track of what is sent, and
re transmits any data that has not reached its destination. The Internet Protocol (IP) is the principal
communication protocol used for transmitting data packets across and network using the Internet
Protocol Suite. Internet exist due to TCP/IP.
2. FTP (File Transfer Protocol): This protocol is used for transferring data between client and server over
TCP/IP (Internet). Hence, it is responsible for uploading and downloading files to and from the server.
3. UDP (User Datagram Protocol): UDP is simple, connection less, unreliable transport protocol. It
performs very limited error checking. It is mainly used for transmitting multimedia data, which requires
faster transmission and error checking is not used.
4. SMTP (Simple Mail Transfer Protocol): SMTP is a standard protocol for transmitting electronic mail
(email) by the internet. It is a Internet mail protocol. It is a TCP/IP protocol used to send emails
5. POP (Post Office Protocol): POP is also a protocol for transmitting email. It is simple but has limited
functionality. It is an application layer Internet standard protocol used by clients to access e-mail from a
server over a TCP/IP connection i.e. internet. POP3 (POP version 3) is used at present. POP3 is supported
by most modern webmail services such as Gmail and Yahoomail.
6. HTTP (Hypertext Transfer Protocol): HTTP networking protocol for distributed, collaborative,
hypermedia information systems. It is used transmitting hypertext or HTML based document. It is the
foundation of data communication for the World Wide Web used by web browser to communication with
respective servers.
7. HTTPS (Hypertext Transfer Protocol Secure): HTTPS is combination of Protocol with the SSL/TLS
protocol to provide encrypted identification of a network. HTTPS connections are often used in World
Wide Web for sensitive transactions. The main objective of HTTPS is to create a secure channel over an
insecure network
Layer Protocols
Application FTP, TFTP, Telnet, Gopher, HTTP
Presentation SMTP, NFS
Session Telnet, SNMP
Trasport TCP, UDP
Network IP
Data Link ARP, RARP, RIP
Physical Ethernet, Token Ring, FDDI
[ www.prasiddhaacharya.com.np ]
Computer Science Reference Note for Grade-XII Email : [email protected]
Bibliography
Web References:
https://www.javatpoint.com
https://www.w3schools.com
https://www.tutorialspoint.com
https://www.google.com
https://www.wikipedia.org
The End
[ www.prasiddhaacharya.com.np ]