Class 12 Computer Networking
Class 12 Computer Networking
Applications of Network
Some of the applications of network are discussed below:
Communication Media
Communication media of a network refer to the connecting media, through
which different computers in a network are interconnected together. The
communication media can also be referred as communication channels. The
communication media can be grouped into two categories:
1. Ethernet Cable It is also known as twisted pair cable. There are two
identical wires wrapped together and twisted around each other.
Advantages of Ethernet Cable
Advantages of Bluetooth
1. It allows you to stay cord or cable free. So, you do not have to worry
about finding the correct place to connect that extra long cord.
2. Even though you are able to exchange data across your cell phones, you
still have the ability to keep your information private.
3. As it is already, but most likely it will be more dominant. You can use
bluetooth on laptops, cell phones, music players, headsets, printers and
many more other products.
Disadvantages of Bluetooth
1. You are using up more battery power, when you leave your bluetooth
enabled on your phone all day.
2. Throughout all devices, when using bluetooth Internet, the connection
can sometimes run very slow, so bluetooth Internet is not highly
suggested for that cases
Disadvantages of Infrared
Advantages of Microwave
Disadvantages of Microwave
Advantages of Satellite
Disadvantages of Satellite
Types of Network
On the basis of coverage or geographical spread, a network can be divided
into following types:
1. Local Area Network (LAN) When the network of computer is confined to
a small or localised area such as school, office or building, it is known as
Local Area Network (LAN). Computers or users in a local area network can
share data, information, software and common hardware devices such as
printer, modem, hard disk, etc.
Network Topologies
The network topology refers to the arrangement or pattern of computers (i.e.
nodes or workstations), which are interconnected in a network.
Commonly used network topologies are as follows:
1. Bus Topology Bus topology is also referred as linear topology. Under this
arrangement, all nodes in the network are connected by a single length of
transmission medium, which is normally a co-axial cable. Both ends of the
cable are terminated by terminators. Data transmission from any workstation
can travel in both directions.
Advantages of Bus Topology
1. When there is any problem in data communication with any node, whole
network stops functioning.
2. In case of any fault in data transmission, fault isolation is very difficult.
We have to check the entire network to find the fault.
1. In ring topology, each node is connected in a circular way with its two
neighbouring nodes, so when there is transmission problem anywhere in
the network, entire network stops functioning.
2. Fault diagnosis is very difficult in a network formed using ring topology.
Network Devices
Network devices are the components used to connect computer and other
electronic devices together, so that they can share files or resources like
printers or fax machines. The most common type of network devices used by
the public to set-up a Local Area Network (LAN) are hub, switch, repeater and
if online access is desired, a high-speed modem.
1. Modem (Modulator/Demodulator) Modem is a device that converts digital
signal to analog signal (modulator) at the sender’s site and converts back
analog signal to digital signal (demodulator) at the receiver’s end, in order to
make communication possible via telephone lines.
Functions of Modem The essential function of a modem is to create an
easily transmitted and decode signal. Modem divides the information into
packets called frames. They minimise the error that occur while the
transmission of signals. Modems are of two types:
Active Hub It amplifies the signals and passes from one connected
device to another. These hubs are working as repeaters to boost up the
signals.
Passive Hub It simply passes signals from one connected device to
another without making any changes.
Functions of a Switch
The switch is responsible for forwarding a data packet to a specific route or
segment. For this purpose, the switch establishes a temporary connection
between the source and the destination, when the data packet is transported
the connection is terminated.
Functions of a Repeater
It receives an incoming signal from one device and retransmits it, forwarding
it on to other.
There are two types of repeaters:
Network Protocols
Protocol refers to the set of rules and regulations applicable for a network.
The protocol defines standardised format for the data packet to be
transmitted through the network, techniques for detecting the errors
whenever they arise and methods to correct these errors and so on.
Some of the commonly used protocols are as follows:
1. HTTP (HyperText Transfer Protocol) HTTP is an application level protocol
and it is widely used for viewing information of a web page over Internet. It is
a generic, stateless and object oriented protocol.
HTTP consists of a set of requests from the browser of a local computer to
the web server and a set of responses going back to the other way.
Though HTTP is designed for the use in the web application but it has scope
to be used in future object oriented applications.
2. FTP (File Transfer Protocol) FTP is designed to transfer files from one
system to another. Using FTP, different people locating in different
geographical locations can cooperate and work on a common project. FTP is
designed to promote sharing of files and to encourage the indirect use of
remote computers. Using FTP, any type of file can be transferred from one
computer to another. Though for transferring files, we have to specify
whether the file is in ASCII format or in binary format.
Internet
The Internet has gained popularity and emerged as an important and
efficient means of communication. The Internet is world wide network of
networks.
Through Internet, computers become able to exchange information with
each other and find diverse prespective on issue from a global audience.
IP Address
An IP address is an identifier for a computer or device on a TCP/IP network. It
is a way to measure a user’s unique identity. The traditional IP Addresses
(IPv4) uses a 32-bit numeric format and it defines both network and host
address. But now-a-days a new version of the IP protocol (IPv6) has been
invented to offer virtually limitless number of unique addresses. An IP
address can be static or dynamic. A static IP address will never change and it
is a permanent Internet address. A dynamic IP address is a temporary
address that is assigned to any computing device to access the Internet. An
example of IPv4 address is 216.3.128.12. Each number can be from zero to
255.
MAC Address (Media Access Control Address)
The MAC address refers to unique physical address assigned to a Network
Interface Card (NIC). Every workstation or device which is connected with the
network has unique node address. The MAC address is a 6 byte (48 bit)
address. Each byte in this address is separated by a colon. There are
hexadecimal numbers from 00 to FF (i.e. 0 – 255) in each byte, e.g. 05 : C2:
04 : 59 : 2F: BC is a MAC address.
Domain Name
Domain name is a unique name or identification that helps to create the path
to open a particular website. All the domain names have IP addresses. IP
address can be remembered by the computer, but it is difficult to remember
for a human being. If you know that URL (Uniform Resource Locator) of a
website, you can access it. The URL is actually the domain name of website,
so the domain name is unique name of a website. Every time we enter a
domain name it will be converted into an IP address and the website will be
opened, e.g. www.Mybook.com A domain name contains three parts:
Thereafter, the operating system searches the host file in which IP address of
some domains are stored. If the corresponding domain name was not found
there, then request is forwarded to Domain Name Servers (DNS). The DNS
maintains a directory of all domain names and corresponding IP addresses
registered on the Internet. When the IP address is required, it is provided to
the browser. The browser can access the information from the respective
website using the IP address.
Internet Applications
Applications which runs by the use of Internet are given below:
1. E-Mail
E-mail stands for Electronic Mail. It is a text message that may contain files,
images or other attachment sent through a network to a specified individual
or group of individuals. Some early e-mail systems required that the sender
and the recipient both be online at the same time, in common with instant
messaging. Today’s e-mail systems are based on a store and forward model.
E-mail servers accept, forward, deliver and store messages. Neither the user
nor their computers are required to be online simultaneously; they need to
connect an e-mail server, for as long as it takes to send or receive messages.
Interaction between e-mail server and clients are governed by e-mail
protocol. The two most common e-mail protocols are POP3 and SMTP.
2. SMS
SMS stands for Short Message Service. Short text messages are transmitted
to and from a mobile phone, fax machine, etc. Message must not be longer
than 160 alpha-numeric characters and may also contain images or graphics.
Once a message is sent, it is received by a Short Message Service Centre
(SMSC), which must get to the appropriate mobile device. To do this, the
SMSC sends a SMS request to Home Location Register (HLR) to find the
roaming customer. Once the HLR receives the request, it will respond to the
SMSC with the subscriber’s status
Inactive or active.
Where subscriber is in roaming.
If the response is ‘inactive’, then the SMSC will hold on to the message for a
period of time. When the subscriber access his device, the HLR sends a SMS
notification to the SMSC and the SMSC will attempt delivery. The system
pages the device and if it responds, the message gets delivered. The SMSC
receives a verification, that the message was received by the end user, then
it is categorised as, send message and will not attempt to send again.
3. Video Conferencing
By the name itself it is clear that it is the process of conferencing through
video talk. Basically, video conferencing is a type of conference, which takes
place between two or more participants by using computer networks to
transmit audio and video data. For such type of video conferencing each
participants should have a video camera, microphone and speakers in his
computer set-up.
There are two types of video conferencing:
Point to Point
Multipoint.
4. Voice Mail
Voice mail is basically a voice message that stores messages electronically
which can be retrieved by the intended recipients according to their
convenience. Voice mail was developed by telephony to prevent missed calls
and to facilitate call screening. Now-a-days, voice mails are getting
integrated with Internet, which allows users to receive incoming voice
message on their computers.
5. Chat
It can be defined as an informal conversation between two or more people.
In terms of computers, chat refers to the communication between two users
through computer, textually. The text is entered by one participant through
keyboard and that text is received by other on the other side and vice versa.
Wireless/Mobile Communication
By the name itself, it can be defined that it is a communication which do not
use any wires for the transmission of data. In this type of communication,
waves are used as the transmission medium, instead of wires. Mobile
communication uses electromagnetic waves for sharing and transferring of
data. Some of the mobile communication such as GSM, CDMA, WLL, 3G and
4G are discussed below:
1. CDMA (Code Division Multiple Access)
CDMA stands for Code Division Multiple Access. It is a digital cellular
technology that uses spread spectrum techniques. CDMA consistently
provides better capacity for voice and data communications than other
commercial mobile technologies, allowing more subscribers to connect at
any given time and it is the common platform on which 3G technologies are
built. CDMA is a military technology first used during world war II by english
allies to foil german attempts at jamming transmission.
4. 3G (Third Generation)
3G stands for Third Generation and it is also called Tri-Band 3G. 3G
telecommunication networks support services that provide an information
transfer rate of atleast 200Kbps. This will allow 3G mobile devices to support
services such as video footage conferencing and full Internet access. Recent
3G releases, often denoted 3.5G and 3.75G, also provide mobile broadband
access of several Mbps to smart phones, modems, laptops, computers.
5. 4G (Fourth Generation)
4G stands for Fourth Generation, the stage of broadband mobile
communications that will supersede the third generation (3G). Carriers that
use Orthogonal Frequency Division Multiplexing (OFDM) instead of Time
Division Multiple Access (TDMA) or Code Division Multiple Access (CDMA) are
increasingly marketing their services as being 4G, even when their data
speeds are not as fast as the International Telecommunication Union (ITU)
specifies.
Network Security
Network security refers to the provisions and policies adopted by the
network administrator to prevent and monitor unauthorised access, misuse,
modification or denial of the computer network and network accessible
resources. For network security, there is a provision of assigning an ID and a
password or other authenticating information that allows the user to access
the information and program within their authority. Network security covers
a variety of networks; both public and private. Network security is important
because people, organisations, corporates across the world are using
Internet to store the data, for communicating and transmitting critical
information. That is why network security breaches are there.
Some of the major network security breaches are:
1. Denial of Service (DOS)
A denial of service attack refers to an attempt to make computer resources
unavailable to the intended users. Generally, it consists the effort of a person
or a group of persons to prevent an Internet site or service from functioning
efficiently or completely. It may be temporarily or infinitely. One of the
common methods of denial of service attack is to saturate the target
machine with external communication requests, in such a way that either the
machine can not respond properly or respond slowly that is would not send
services effectively.
2. Intrusion Problem
The intrusion problem refers to the malicious activities or policy violation
performed on a computer system. The main motive of intrusion is to tress
vital information and essential data. Such type of activities are performed by
the people having malicious mentality.
3. Authentication
It provides a way of identify a user. It also known as the term of password
protection. The user is provided with an legal login-id and password by which
he/she is considered to be an authentic user and is allowed to see the
password protected data.
2. Firewall
A system based on software or hardware designed to prevent unauthorised
access to or from a private network. Firewalls may be combination of
hardware and software. A firewall establishes a barrier between a trusted,
secure internal network (private network) and another network that is not
assumed to be secure and’ trusted. All messages entering or leaving the
Intranet (internal network) pass through the firewall, which examines each
message and blocks those that do not meet the specified security criteria.
There are several types of firewall techniques:
1. Packet filter Looks at each packet entering or leaving the network and
accepts or rejects it based on user defined rules. Packets filtering is
fairly effective and transparent to users, but it is difficult to configure. In
addition, it is susceptible to IP spoofing.
2. Application gateway Applies security mechanism to specific
applications, such as FTP and Telnet servers. This is very effective, but
can impose a performance degradation.
3. Circuit-level gateway Applies security mechanism when a TCP or UDP
connection is established. Once the connection has been made, packets
can flow between the hosts without further checking.
4. Proxy server Intercepts all messages entering and leaving the network.
The proxy server effectively hides the true network addresses.
3. Cyber Law
Cyber law is a term that encapsulates legal issues related to the use of
Internet. It is less a distinct field of law than intellectual property or contract
law, as it is a domain covering many areas of rules and regulations. Some
leading topics include Internet access and usage, privacy, freedom of
expression and jurisdiction.
4. Hacker
A hacker is someone who seeks and exploits weaknesses in a computer
system or computer network. Hacking is the practices of modifying the
features of a system, in order to accomplish a goal outside of the creator’s
original purpose. Hackers obtain advanced knowledge of operating systems
and programming languages. Hackers are most commonly associated with
malicious programming attacks on the Internet and other networks.
5. Cracker
A cracker is also called black hat hacker. A cracker is an individual with
extensive computer knowledge whose purpose is to breach or bypass
Internet security or gain access to the software without paying royalties. The
general view is that, while hackers build things, crackers break things.
Cracker is the name given to hackers who break into computers for criminal
gain. Crackers’ motivations can range from profit, a cause they believe in,
general maliciousness or just because they like the challenge. They may
steal credit card numbers, leave viruses, destroy files, etc.
6. Trojan
A Trojan, or Trojan Horse, is a non-self-replicating type of malware which
appears to performs a desirable function but instead facilitates unauthorised
access to the user’s computer system. Trojans do not attempt to inject
themselves into other files like a computer virus. It may steal information, or
harm their host computer systems. Trojans may use drive-by downloads or
install via online games or Internet-driven applications in order to reach
target computers. Unlike viruses, Trojan horses, do not replicate themselves.
e.g. Beast, Sub7.Zeus, Zero Access Rootkit, etc.