0% found this document useful (0 votes)
64 views74 pages

Computer Network

gfjfgngfjgfndgj

Uploaded by

Sparsh Bhatia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
64 views74 pages

Computer Network

gfjfgngfjgfndgj

Uploaded by

Sparsh Bhatia
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 74

8 Computer Networks

8.1 INTRODUCTION
The greatest breakthrough in technology and communication over the past 20 years has been the
development and advancement of the computer network. From emailing a friend, to online bill
payment, to downloading data from the internet, to e-commerce, networking has made our world
much smaller and forever changed the way we communicate.
Network provides salient features which have made our life easy and comfortable, be it sending an
email, withdrawing money from an ATM machine, online railway or airline reservation, or sharing
ƒ—†‹‘ƒ†˜‹†‡‘ϐ‹Ž‡•Ǥ’ƒ”–ˆ”‘–Ї•‡ǡ–Ї‘•–‡š–‡•‹˜‡Ž›Ǧ—•‡†ˆ‡ƒ–—”‡‹•–Ї”‹– ‘ƒ†
sent from a computer to get a printout from a printer attached to some other computer. All this
involves a network.
It is the network that connects various computers to each other and handles a large volume of data.

Fig. 8.1: A Computer Network

8.2 COMPUTER NETWORK—A BRIEF OVERVIEW


Several devices connected to each other for reliable communication/transfer of data constitute a
‡–™‘”Ǥ‡–™‘” ƒ ‘•‹•–‘ˆƒ ‘’—–‡”ǡƒˆƒšƒ Š‹‡ǡƒ’”‹–‡”ǡƒ ƒ‡”ƒǡƒ ‡ŽŽ’Š‘‡ǡ‡– . A
collection of interconnected computers is called a Computer Network. Two computers or devices
ƒ”‡•ƒ‹†–‘„‡‹–‡” ‘‡ –‡†‹ˆ–Ї›ƒ”‡ ƒ’ƒ„އ‘ˆ•Šƒ”‹‰ƒ†‡š Šƒ‰‹‰‹ˆ‘”ƒ–‹‘™‹–Їƒ Š
other by following a protocol (set of rules).

CTM: A computer network is a collection of interconnected computers and other devices to share data and
other resources (hardware and software resources).
8.2.1 Advantages of Computer Networks

Internet

Domain
DNS & Data Storage
Firewall
Wi-Fi
Router

Server

Server User PC User PC

User PC

Printer
Printer

Fig. 8.2: The Network Diagram


Let us now discuss why networks are essential. Are there any advantages of networked computers
over stand-alone machines? Yes, networked systems are far better. A network uses a distributed
processing system in which a task is divided among several devices which are interconnected
with each other. Therefore, instead of a single computer being responsible for completing the
entire task, all the interconnected computers are responsible for completing the task assigned
to them. This leads to better performance with high processing speed.
Networks have several advantages which are described below:
(a) Resource Sharing: The primary use of a network is to share among users programs/
applications, data and peripheral devices connected to the network, irrespective of their
physical location. You must have noticed in your networked computer labs that when a print
command is given on one computer, the document is printed by a printer attached to some
Supplement – Computer Science with Python–XII

other system. This allows printing of documents by several users and, hence, the printer is
shared by multiple users on the network. Other resources like hard disk, DVD drive, scanner,
etc., can also be shared on a computer network. For example, sharing database, audio and
˜‹†‡‘ϐ‹Ž‡•ǡƒ–‹˜‹”—••‘ˆ–™ƒ”‡ǡƒ’’Ž‹ ƒ–‹‘•‘ˆ–™ƒ”‡ǡ’”‹–‡”•ƒ†• ƒ‡”•ǡ‡– .
(b) Improved Communication: A computer network enables fast, reliable and secure
communication between users. It saves time and offers easy communication methods.
For exampleǡ‹ƒ‘”‰ƒ‹œƒ–‹‘ǡƒƒ‰‡”•™‘”ƒ–†‹ˆˆ‡”‡–Ž‘ ƒ–‹‘•–‘ƒ‡ϐ‹ƒ ‹ƒŽ”‡’‘”–•Ǥ
While working on a network, any change made by one manager on his/her computer can easily
be seen by other managers and employees. Thus, a network allows managers to easily update
‹ˆ‘”ƒ–‹‘ǤŠ‹•‹ ”‡ƒ•‡•–Ї‹”‡ˆϐ‹ ‹‡ ›ƒ†ƒŽŽ‘™•–Ї–‘ ‘’އ–‡–Ї‹”™‘”“—‹ Ž›Ǥ
(c) Reduced Communication Cost: Sharing resources also reduces communication cost. Using
’—„Ž‹  ‡–™‘”•ǡ ™‡ ƒ •‡† ƒ Žƒ”‰‡ “—ƒ–‹–› ‘ˆ †ƒ–ƒ ƒ– ƒ Ž‘™ ‘•–Ǥ –‡”‡– ƒ† ‘„‹Ž‡
‡–™‘”•ƒ”‡’Žƒ›‹‰ƒ˜‡”›‹’‘”–ƒ–”‘އ‹•‡†‹‰ƒ†”‡ ‡‹˜‹‰–‡š–ǡ‹ƒ‰‡ǡƒ—†‹‘ƒ†
video data at a low cost.
(d) Reliability of Data: Reliability means backing up of data, i.e., data can be copied and
stored on multiple computers. In a network system, all computers are connected to each
8.2
other. Thus, the information or message which is shared by each device is stored on their
respective workstations (computers). If, due to some reason (hardware crash, etc.), the data
gets corrupted and, thus, becomes unavailable on one computer, a copy of the same data can
be accessed from another workstation for future use. This leads to smooth functioning and
further processing without disruption.
(e) Central Storage of Data: ‹Ž‡• ƒ „‡ •–‘”‡† ‘ ƒ ‡–”ƒŽ ‘†‡ ȋ–Ї ϐ‹Ž‡ •‡”˜‡”Ȍ –Šƒ– ƒ
be shared and made available to each and every user in an organization. With centralized
processing, data is stored and retrieved from a single central location. Thus, there is no
duplication of data and almost no data redundancy.

8.3 EVOLUTION OF NETWORK


The network did not evolve in a single day; rather, it took decades to become more powerful,
‡ˆϐ‹ ‹‡–ƒ†”‡Ž‹ƒ„އǤЇ‡–™‘”Šƒ•’ƒ••‡†–Š”‘—‰Š•‡˜‡”ƒŽ•–ƒ‰‡•™Š‹ Šƒ”‡†‡• ”‹„‡†„‡Ž‘™ǣ
• ARPANET (Advanced Research Project Agency Network): ǡ ™Š‹ Š ™ƒ• Œ‘‹–Ž›
†‡•‹‰‡†ƒ†ƒ‡†„›–Ї†˜ƒ ‡†‡•‡ƒ” Š”‘Œ‡ –•‰‡ ›ȋȌƒ†‡’ƒ”–‡–
‘ˆ‡ˆ‡ ‡ȋ‘Ȍǡ™ƒ•–Їϐ‹”•–‡–™‘”ƒ† ƒ‡‹–‘‡š‹•–‡ ‡‹ͳͻ͸ͻǤ –™ƒ•ƒ’”‘Œ‡ ––Šƒ–
connected a handful of computers at different universities and US DoD for sharing of data and
messages and playing long-distance games, and socializing with people to share their views.
• NSFNET (National Science Federation Network): In the mid-80’s, another federal agency,
 ȋƒ–‹‘ƒŽ ‹‡ ‡ ‡†‡”ƒ–‹‘‡–™‘”Ȍǡ ”‡ƒ–‡†ƒ‡™‡–™‘”™Š‹ Š™ƒ•‘”‡ ƒ’ƒ„އ
–Šƒ Ǥ –• ƒ‹ ƒ‹ ™ƒ• –‘ —•‡ ‡–™‘” ‘Ž› ˆ‘” ƒ ƒ†‡‹  ”‡•‡ƒ” Š ƒ† ‘– ˆ‘” ƒ›
private business activity. Later, many private companies combined their own private networks with
ƒ† –‘ƒ‡ƒ‘”‡ ƒ’ƒ„އƒ†„”‘ƒ†‡–™‘”Ȅ–Ї –‡”‡–Ǥ –‹•–Ї‹–‡”‡–
that links two or more networks to make a large network for sharing of information and messages.
ARPANET + NSFNET + PRIVATE NETWORKS = INTERNET

1995 NSF Net


1984 ARPANET 1986 NSF
Computer Networks

1969 terminates its Today more than


has more than connects NSF net
ARPANET network on the 1996 Internet2 is 550 million hosts
1,000 individual to ARPANET and
becomes Internet and founded connect to the
computers linked becomes known
functional resumes status as Internet
as hosts as the Internet research network

Fig. 8.3: Evolution of Internet


8.3
• Internet: –ЇͳͻͻͲǯ•ǡ‹–‡”‡–ǡ™Š‹ Š‹•ƒ‡–™‘”‘ˆ‡–™‘”•ǡ ƒ‡‹–‘‡š‹•–‡ ‡ǤЇ
‹–‡”‡–Šƒ•‡˜‘Ž˜‡†ˆ”‘ǤЇ ‘’—–‡”•ƒ”‡ ‘‡ –‡†–Š”‘—‰Š‘”ކ‹†‡‡„
that comprises a large network and shares a common communication protocol (Transmission
‘–”‘Ž”‘–‘ ‘ŽǦ –‡”‡–”‘–‘ ‘ŽǡȀ ȌǤ –ƒŽŽ‘™• ‘’—–‡”•‘ˆ†‹ˆˆ‡”‡––›’‡•–‘‡š Šƒ‰‡
information and is known as internet. Millions of domestic, business and government networks
ƒ”‡ ‘‡ –‡† ™‹–Š ‡ƒ Š ‘–Ї” ˆ‘” –Ї ’—”’‘•‡ ‘ˆ •Šƒ”‹‰ ϐ‹Ž‡•ǡ †ƒ–ƒǡ ‡ƒ‹Žǡ ‡– . Most of the
computers are not connected directly to the internet. Instead, they are connected to smaller
networks which are further connected to a backbone network through gateways.

CTM: Network of networks makes the internet.

• Interspace: Interspace is a software that allows multiple users in a client-server environment


to communicate with each other by sending and receiving data of various types such as
†ƒ–ƒ ϐ‹Ž‡•ǡ ˜‹†‡‘ǡ ƒ—†‹‘ ƒ† –‡š–—ƒŽ †ƒ–ƒ ‹ ƒ ͵Ǧ ‡˜‹”‘‡–Ǥ – ˆƒ ‹Ž‹–ƒ–‡• ‘Ž‹‡ ”‡ƒŽǦ–‹‡
‡š Šƒ‰‡ ‘ˆ †ƒ–ƒǤ –‡”•’ƒ ‡ ‹• –Ї ‘•– ƒ†˜ƒ ‡† –‡” ‘ˆ ‘—‹ ƒ–‹‘ ƒ˜ƒ‹Žƒ„އ ‘ –Ї
internet today.

8.4 HOW DOES INTERNET WORK


One of the greatest things about the internet is that nobody really owns it. It is a global collection
of networks, both big and small. These networks connect together in many different ways to
form the single entity that we know as internet. In fact, the very name comes from this idea of
interconnected networks.
‹ ‡ ‹–• „‡‰‹‹‰ ‹ ͳͻ͸ͻǡ –Ї ‹–‡”‡– Šƒ• ‰”‘™ ˆ”‘ ˆ‘—” Š‘•– ‘’—–‡” •›•–‡• –‘ –‡• ‘ˆ
‹ŽŽ‹‘•Ǥ ‘™‡˜‡”ǡŒ—•–„‡ ƒ—•‡‘„‘†›‘™•–Ї‹–‡”‡–†‘‡•‘–‡ƒ–Šƒ–‹–‹•‘–‘‹–‘”‡†ƒ†
ƒ‹–ƒ‹‡†‹†‹ˆˆ‡”‡–™ƒ›•ǤЇ –‡”‡–‘ ‹‡–›ǡƒ‘Ǧ’”‘ϐ‹–‰”‘—’‡•–ƒ„Ž‹•Ї†‹ͳͻͻʹǡ‘˜‡”•‡‡•
–Їˆ‘”ƒ–‹‘‘ˆ–Ї’‘Ž‹ ‹‡•ƒ†’”‘–‘ ‘Ž•–Šƒ–†‡ϐ‹‡Š‘™™‡—•‡ƒ†‹–‡”ƒ –™‹–Š–Ї‹–‡”‡–Ǥ
Supplement – Computer Science with Python–XII

Fig. 8.4(a): Working of the internet

Before we learn about the basic underlying structure of the internet, e.g., domain name servers,
‡–™‘”ƒ ‡••’‘‹–•ƒ†„ƒ „‘‡•ǡ™‡ϐ‹”•–‡‡†–‘—†‡”•–ƒ†Š‘™‘—” ‘’—–‡” ‘‡ –•
to others.

8.4
˜‡”› ‘’—–‡”–Šƒ–‹• ‘‡ –‡†–‘–Ї‹–‡”‡–‹•’ƒ”–‘ˆƒ‡–™‘”ǡ‡˜‡–Ї‘‡‹‘—”Š‘‡Ǥ
For example, we may use a modem and dial a local number to connect to an Internet Service
Provider ȋ ȌǤ–™‘”ǡƒ ‘’—–‡”ƒ›„‡’ƒ”–‘ˆƒLocal Area Network (LAN), but it most
Ž‹‡Ž›•–‹ŽŽ ‘‡ –•–‘–Ї‹–‡”‡–—•‹‰ƒ –Šƒ––Ї ‘’ƒ›Šƒ• ‘–”ƒ –‡†™‹–ŠǤЇ
‹– ‘‡ –•–‘–Ї ǡ‹–„‡ ‘‡•’ƒ”–‘ˆ–Ї‹”‡–™‘”ǤЇ ƒ›–Ї ‘‡ ––‘ƒŽƒ”‰‡”
network and become part of their network. The internet is simply a network of networks.
Most large communication companies have their own dedicated backbones connecting various
regions. In each region, the company has a Point of Presence ȋȌǤ Ї  ‹• ƒ ’Žƒ ‡ ˆ‘”
local users to access the company’s network, often through a local phone number or dedicated
line. The amazing thing here is that there is no overall controlling network. Instead, there are
several high-level networks connecting to each other through Network Access Points‘”•Ǥ

Backbone
Internet
T3 Line
ISP NAP

Conventional Phone, POP


Digital Subscriber, or
Cable Modem Line T1 Line

LAN

Home Business

Fig. 8.4(b): POP and NAP

Gateway: Gateway is a device that connects dissimilar networks. A backbone is a central


‹–‡” ‘‡ –‹‰•–”— –—”‡–Šƒ– ‘‡ –•‘‡‘”‘”‡‡–™‘”•Œ—•–Ž‹‡–Ї–”—‘ˆƒ–”‡‡Ǥ
At the source computer, the message to be sent is broken down into small parts called packets.
ƒ Š’ƒ ‡–‹•‰‹˜‡ƒ•‡”‹ƒŽ—„‡”ǡe.g.ǡͳǡʹǡ͵ǤŽŽ–Ї•‡’ƒ ‡–•ƒ”‡•‡––‘–Ї†‡•–‹ƒ–‹‘
‘’—–‡”ǤЇ†‡•–‹ƒ–‹‘ ‘’—–‡””‡ ‡‹˜‡•–Ї’ƒ ‡–•‹”ƒ†‘‘”†‡”ȋͳͲƒ› ‘‡„‡ˆ‘”‡ͳȌǤ
The packets are reassembled in the order of their number and message is restored.
How it functions smoothly: ˜‡”› ‘’—–‡” ‘‡ –‡† –‘ –Ї ‹–‡”‡– —•‡• –Ї •ƒ‡ •‡– ‘ˆ
rules for communication. A set of rules is called protocol. Communication protocol used by
‹–‡”‡– ‹• Ȁ Ǥ Ї  ȋ”ƒ•‹••‹‘ ‘–”‘Ž ”‘–‘ ‘ŽȌ ’ƒ”– ‹• ”‡•’‘•‹„އ ˆ‘” †‹˜‹†‹‰
the message into packets on the source computer and reassembling them at the destination
‘’—–‡”ǤЇ ȋ –‡”‡–”‘–‘ ‘ŽȌ‹•”‡•’‘•‹„އˆ‘”Šƒ†Ž‹‰–Їƒ††”‡••‘ˆ–Ї†‡•–‹ƒ–‹‘
computer so that the packet is sent to its proper destination.

8.4.1 Elementary Terminology of Networks


ͳǤ Nodes (Workstations): The term node refers to computers that are attached to a network
Computer Networks

and are seeking to share resources.


2. Server: A computer that facilitates the sharing of data, software and hardware resources on
the network.
͵Ǥ Network Interface Unit (NIU) (MAC Address): A network interface unit is an interpreter
that helps in establishing communication between the server and the client. 8.5
4. IP Address: ˜‡”› ƒ Š‹‡ ‘ ƒ  „ƒ”Ȁ  ‡–™‘” Šƒ• ƒ —‹“—‡ ‹†‡–‹ˆ›‹‰ —„‡”
ƒŽŽ‡†ƒ ††”‡••Ǥ
5. Domain Name: It is a way to identify and locate the computers connected to the internet.
–—•–„‡—‹“—‡Ǥ

8.5 COMPONENTS OF DATA COMMUNICATION


A network comprises several components along with their functionalities that contribute to
‹–• •‘‘–Š ˆ— –‹‘‹‰Ǥ ‘ ˆ‘” ƒ ‡–™‘”ǡ ƒ Ž‘– ‘ˆ Šƒ”†™ƒ”‡ †‡˜‹ ‡• ƒ”‡ ”‡“—‹”‡† ™Š‹ Š ƒ”‡
described as follows:
¾ Sender: A device or a computer that sends the data.

¾ Receiver: A device or a computer that receives the data.
¾ Message:‡••ƒ‰‡‹•–Ї‹ˆ‘”ƒ–‹‘–‘„‡ ‘—‹ ƒ–‡†Ǥ –ƒ›„‡–‡š–ǡ‹ƒ‰‡ǡƒ—†‹‘‘”
video.
¾ Transmission Medium: A transmission medium is a physical path through which the data
ϐŽ‘™•ˆ”‘•‡†‡”–‘”‡ ‡‹˜‡”Ǥ ƒ„އ‘”™‹”‡‘””ƒ†‹‘™ƒ˜‡• ƒ„‡–Ї‡†‹—Ǥ
¾ Protocol: A set of rules that governs data transmission. It represents the communication
methods which are to be followed by the sending and receiving devices.

Network adapter inside


each node

Computer
Printer

Network navigation device


Radio waves
Router (used in some networks)

Transmission media (wireless or


wired) connecting nodes
Networking software
running on each computing
device

iPad
Supplement – Computer Science with Python–XII

Fig. 8.5: Components of a Computer Network

8.6 MODES OF DATA TRANSMISSION


(a) Analog or Broadband Transmission
 Ȉ Ї •‹‰ƒŽ ‹• ƒ ”ƒ†‹‘ ˆ”‡“—‡ › •‹‰ƒŽ ‘” ƒƒŽ‘‰ǡ i.e., it can consist of continuous
electrical waves that are of varying amplitudes.
• Telephone networks use this type of transmission.
 Ȉ ‡“—‹”‡•‘†‡ˆ‘”–”ƒ•‹––‹‰†ƒ–ƒ‘˜‡”„ƒ•‡„ƒ†‡†‹—Ǥ
(b) Digital or Baseband Transmission
• No special device for conversion of signal to be transmitted over baseband medium.
• The signal is a group of discrete electrical units which is transmitted in rapid succession.

8.6
ȋ Ȍ ƒ”ƒŽŽ‡Ž‘—‹ ƒ–‹‘
• When data is transmitted through multiple wires, with each wire carrying each bit, it
is called parallel communication.
(d) Serial Communication
• When bits are sent one after another in a series along a wire, it is called serial
communication.
10001----------------10001
(e) Synchronous or Asynchronous Transmission
• When sender and receiver synchronize their checks before transmission, i.e., the
•‡†‡”ϐ‹”•–•‡†• ‘–”‘Ž Šƒ”ƒ –‡”•–‘–Ї”‡ ‡‹˜‡”ƒ†–Ї•‡†•–Їƒ –—ƒŽ†ƒ–ƒǡ
it is called synchronous transmission.
Advantage—Faster than asynchronous mode.
Disadvantage—‘•–Ž›ƒ† ‘’އ𕇖Ǧ—’”‡“—‹”‡†Ǥ
• In asynchronous transmission, data is preceded and succeeded by a start bit and stop
„‹–”‡•’‡ –‹˜‡Ž›Ǥ‘•› Š”‘‹œƒ–‹‘‹•”‡“—‹”‡†Ǥ
Advantage— ƒ”†™ƒ”‡”‡“—‹”‡†‹••‹’އƒ† Їƒ’Ǥ
Disadvantage—Slower than synchronous mode.

8.7 DIFFERENT WAYS OF SENDING DATA ACROSS NETWORK


There are several ways of sending data from one node to another through network. It can
be in the form of calls, messages, etc.›—•‹‰˜ƒ”‹‘—•–›’‡•‘ˆ•™‹– Š‹‰–‡ А‹“—‡•ǡ™‡ ƒ
establish the connection/communication.

8.7.1 Network Switching


A network is made up of several interconnected nodes. There can be a point-to-point connection
or star topology between pairs of devices, but both are not relevant for a large network. Hence,
˜ƒ”‹‘—••™‹– Š‹‰–‡ А‹“—‡•ƒ”‡—•‡†–‘–”ƒ•ˆ‡”’ƒ ‡–•‘ˆ†ƒ–ƒˆ”‘‘‡’‘”–‘ˆƒ‘†‡–‘
another. A switched network is made up of a series of interconnected nodes called switches.

8.7.2 Switching Techniques


Ї ƒ‹ ‰‘ƒŽ ‘ˆ ‡–™‘”‹‰ ‹• –Ї ”‡Ž‹ƒ„އ ‡š Šƒ‰‡ ‘ˆ †ƒ–ƒ ‘” ‹ˆ‘”ƒ–‹‘ ƒ‘‰ •‡˜‡”ƒŽ
interconnected nodes. For the delivery of data with accuracy, various types of switching
–‡ А‹“—‡•ƒ”‡—•‡†ǡƒ‡Ž›ǣ
ͳǤ ‹” —‹–™‹– Š‹‰
 ʹǤ ƒ ‡–™‹– Š‹‰
 ͵Ǥ ‡••ƒ‰‡™‹– Š‹‰
Computer Networks

CTM: The technique of sending data across the network is known as Switching technique. The three types
of techniques used are circuit switching, packet switching and message switching.

8.7
1. Circuit Switching
Circuit switching provides end-to-end connection between two computers. It is established
usually in a telephone network where one person is making a call and another is receiving a call.
In a telephone system, the communication must be established between the two participants,
i.e., the sender and the receiver. The circuit is established between these two participants
before the transfer of data takes place.

Receiver Caller
Fig. 8.6: Circuit Switching

 –Š‹• –‡ А‹“—‡ǡ –Ї ‡–‹”‡ Ž‹ ”‡ƒ‹• †‡†‹ ƒ–‡† ƒ† ‘ ‘–Ї” —•‡” ƒ —•‡ ‹– ‡˜‡ ‹ˆ –Ї
path remains idle. The following actions take place during circuit switching:
ȋƒȌ ”‡“—‡•–•‹‰ƒŽ‹••‡–„›–Ї•‡†‡”–‘•‡–—’–Ї ‘‡ –‹‘™‹–Š–Ї”‡ ‡‹˜‡”Ǥ –‡•–ƒ„Ž‹•Ї•
a physical connection between the two participants.
ȋ „Ȍ ŽŽ‹–‡”‡†‹ƒ–‡‘†‡•ƒ”‡‹†‡–‹ϐ‹‡†ǤЇ•‡‘†‡•ƒ”‡ƒŽ•‘ ƒŽŽ‡†•™‹– Š‹‰‘†‡•Ǥ
(c) If the destination node is available, it sends back the acknowledgement of receiving a signal.
Hence, data transmission begins.
(d) When the data transmission is complete, the call can be terminated.

CTM: Circuit switching is a connection-oriented service. In this technique, there is a dedicated link between
the sender and the receiver and no other call can be made during this link, even if the link remains idle.

2. Packet Switching
’ƒ ‡–•™‹– Š‹‰–‡ А‹“—‡ǡ–Ї‡–‹”‡†ƒ–ƒ‹•†‹˜‹†‡†‹–‘•ƒŽŽˆ”ƒ‰‡–• ƒŽŽ‡†’ƒ ‡–•Ǥ
ƒ Š’ƒ ‡–‹•‘ˆƒϐ‹š‡†•‹œ‡ǡ—•—ƒŽŽ›ͳʹͺ„›–‡•‘”ͷͳʹ„›–‡•Ǥƒ ‡–•™‹– Š‹‰‹••‹‹Žƒ”–‘’‘•–
Supplement – Computer Science with Python–XII

‘ˆϐ‹ ‡‘’‡”ƒ–‹‘Ǥƒ Š’ƒ ‡–Šƒ•ƒ•‘—” ‡ƒ††”‡••ƒ•™‡ŽŽƒ•†‡•–‹ƒ–‹‘ƒ††”‡••ȋ ƒ††”‡••Ȍ


ˆ‘”„‡‹‰–”ƒ•‹––‡†ǡ‹–Ї•ƒ‡™ƒ›ƒ•ƒ’‘•–ƒ†‡Ž‹˜‡”•ƒއ––‡”–‘ƒ•’‡ ‹ϐ‹ †‡•–‹ƒ–‹‘
address.
As there is no direct connection established between the sender and the receiver, each
packet follows different routes and, therefore, the packets are delivered in a random order
ƒ––Ї†‡•–‹ƒ–‹‘ƒ††”‡••Ǥ –‹•–Ї’”‘–‘ ‘ޙЋ Š–Їƒ””ƒ‰‡•ƒŽŽ”‡ ‡‹˜‡†’ƒ ‡–•‹
ƒ •‡“—‡–‹ƒŽ ‘”†‡”Ǥ —”‹‰ –Ї –”ƒ•ˆ‡” ‘ˆ ’ƒ ‡–•ǡ ‡ƒ Š ’ƒ ‡– Šƒ• –‘ ’ƒ•• –Š”‘—‰Š •‡˜‡”ƒŽ
‹–‡”‡†‹ƒ–‡‘†‡•ǡ•‘‡ƒ Š‹–‡”‡†‹ƒ–‡‘†‡ Ї •ˆ‘”†‡•–‹ƒ–‹‘ ƒ††”‡••Ǥ ˆ–Ї’ƒ ‡–
ƒ– Ї•™‹–Š–Ї‘†‡ƒ††”‡••ǡ‹–‹•”‡ ‡‹˜‡†Ǣ‘–Ї”™‹•‡ǡ‹–‹•’ƒ••‡†‘–‘–Ї‡š–‘†‡—–‹Ž
‹–”‡ƒ Ї•–Ї†‡•–‹ƒ–‹‘ ƒ††”‡••Ǥ

8.8
Mainframe

Caller
Receiver

Fig. 8.7: Packet Switching

CTM: Packet switching offers a connectionless service. Data is fragmented into small packets and each
packet is of fixed size in packet switching technology.

3. Message Switching
‡••ƒ‰‡•™‹– Š‹‰ǡ–Ї•‡†‡”•‡†•–Ї†ƒ–ƒ–‘ƒ•™‹– Š‹‰‘ˆϐ‹ ‡ϐ‹”•–ǡ™Š‹ Š‹•–Ї•–‘”‡†
in its buffer. It then checks the available link and, if it is free, the data is relayed to another
•™‹– Š‹‰‘ˆϐ‹ ‡ǤŠ‹•’”‘ ‡••‰‘‡•‘—–‹Ž–Ї†ƒ–ƒ‹••‡––‘–Ї†‡•–‹ƒ–‹‘ȋ”‡ ‡‹˜‡”ȌǤ•–Ї
†ƒ–ƒ‹•ϐ‹”•–•–‘”‡†‹ƒ„—ˆˆ‡”ƒ†–Ї•‡––‘–Ї‡š–•™‹– Š‹‰‘ˆϐ‹ ‡ǡ‹–‹•ƒŽ•‘ ƒŽŽ‡†•–‘”‡
ƒ†ˆ‘”™ƒ”†•™‹– Š‹‰–‡ А‹“—‡Ǥ

CTM: Message switching is a store and forward switching technique where there is no direct connection
between the sender and the receiver.

8.7.3 Difference between Circuit Switching and Packet Switching


 ͳǤ Ї ‹” —‹–•™‹– Š‹‰”‡•‡”˜‡•–Ї”‡“—‹”‡†„ƒ†™‹†–Š‹ƒ†˜ƒ ‡ǡ™Š‡”‡ƒ•’ƒ ‡–•™‹– Š‹‰
—•‡•„ƒ†™‹†–Šƒ•ƒ†™Š‡”‡“—‹”‡†„›–Ї’ƒ ‡–•–‘„‡–”ƒ•‹––‡†Ǥ
2. Circuit switching is a fast technology as compared to packet switching which is a slow
mechanism of transferring packets from sender to receiver.
 ͵Ǥ ‹” —‹– •™‹– Š‹‰ ”‡“—‹”‡• ƒ †‡†‹ ƒ–‡† ’ƒ–ŠǤ  ‡ –Ї ‘‡ –‹‘ ‹• ‡•–ƒ„Ž‹•Ї†ǡ –Ї
communication path is entirely dedicated to it until the data is completely transferred
from sender to receiver, whereas in packet switching, packets can use any dynamic path.
4. In circuit switching, if the path is overloaded, the call is blocked and communication is
delayed. But in packet switching, packets are allocated to different paths.
5. Circuit-switched networks are used for phone calls and packet-switched networks handle
data.
 ͸Ǥ ƒ ‡–•™‹– Š‹‰‹•‘”‡‡ˆϐ‹ ‹‡–„‡ ƒ—•‡–Ї ‘•–‘ˆ–ЇŽ‹‹••Šƒ”‡†„›ƒ›—•‡”•Ǥ
7. In circuit switching, the telephone message is sent unbroken. The message is received in
Computer Networks

the same order as it is originally sent. In packet switching, the message is broken into
small packets which are randomly sent from source and received in random order at
†‡•–‹ƒ–‹‘ǡ™Š‹ Š‹•–Ї•‡“—‡–‹ƒŽŽ›ƒ””ƒ‰‡†Ǥ

8.9
8.8 DATA COMMUNICATION TERMINOLOGIES
 ͳǤ Channel: A channel is a communication path through which the data is transmitted from
the sender device to the receiver device.
2. Baud: The number of changes in a signal per second is known as baud. It is the measuring
unit of the data transfer rate. Technically, baud refers to a number of discrete signal
‡Ž‡‡–•–”ƒ•‹––‡†’‡”•‡ ‘†Ǥͳ„ƒ—†”‡’”‡•‡–•‘Ž›ͳ•‹‰ƒŽ Šƒ‰‡’‡”•‡ ‘†ƒ†
‹•‡“—‹˜ƒŽ‡––‘ͳ„‹–’‡”•‡ ‘†Ǥ
 ͵Ǥ Bandwidth: The amount of data that can be passed along a communication channel in a
‰‹˜‡’‡”‹‘†‘ˆ–‹‡ȋͳ•‡ ‘†Ȍ‹•–‡”‡†ƒ•„ƒ†™‹†–ŠǤЇ‡ƒ•—”‹‰—‹–‹•Ї”–œȋ œȌǡ
™Š‡”‡ͳͲ͵ œαͳ‹Ž‘ ‡”–œȋ œȌǡͳͲ͵ œαͳ‡‰ƒ ‡”–œȋ œȌǤ
4. Data and Signals: Information that is stored within computer systems and transferred
‘˜‡”ƒ ‘’—–‡”‡–™‘” ƒ„‡†‹˜‹†‡†‹–‘–™‘ ƒ–‡‰‘”‹‡•Ȅ†ƒ–ƒƒ†•‹‰ƒŽ•Ǥƒ–ƒƒ”‡
‡–‹–‹‡• –Šƒ– ƒ”‡ •–‘”‡† ‹ –Ї ˆ‘” ‘ˆ Ͳǯ• ƒ† ͳǯ•ǡ ™Š‹ Š ‘˜‡› •‘‡ •’‡ ‹ƒŽ ‡ƒ‹‰
to the computer system. When this data is transmitted from one place to another, it is
converted into signal. Signals are the electric or electromagnetic encoding of data and are
used to transmit data.
5. Communication/Transmission Media: It is a means of communication or access (lines
‘ˆ ‘—‹ ƒ–‹‘Ȍ •‡– —’ „‡–™‡‡ –™‘ ‘”‰ƒ‹œƒ–‹‘• –‘ ‡š Šƒ‰‡ †ƒ–ƒȀ‹ˆ‘”ƒ–‹‘Ǥ
Communication media is the way of transmitting the signal from one place to another.
Communication media is also known as transmission media. It plays an important role in
sending and receiving of data to and from the sender and receiver.
 ͸Ǥ Data Transfer Rate: It is the amount of data transferred in one direction over a link divided
by the time taken to transfer it in bits per second (bps). The various measuring units are
bits per second (bps) and bytes per second (Bps) or baud, kilobits per second (kbps),
megabits per second (mbps), gigabits per second (gbps), terabits per second (tbps.)

8.9 NETWORK DEVICES


 ͳǤ Modem:ȋ‘†—Žƒ–‘”‘†—Žƒ–‘”Ȍ‹•ƒ‡Ž‡ –”‘‹ †‡˜‹ ‡–Šƒ–‡ƒ„އ•ƒ ‘’—–‡”
to transmit data over telephone lines. It is a device used to convert digital signals into
analog signals and vice versa. There are two types of modems, namely internal modem
Supplement – Computer Science with Python–XII

ƒ†‡š–‡”ƒŽ‘†‡Ǥ
2. RJ-45 Connector: RJ-45 is a standard type of connector for network cables. The RJ-45 (Registered
Jack) connectors are the plug-in devices used in networking and telecommunications
ƒ’’Ž‹ ƒ–‹‘•ǤЇ›ƒ”‡—•‡†’”‹ƒ”‹Ž›ˆ‘” ‘‡ –‹‰•ǡ’ƒ”–‹ —Žƒ”Ž›–Ї”‡–Ǥ

CTM: RJ-45 is a short term for Registered Jack-45. It is an eight-wire connector used to connect computers
on LANs, especially Ethernets.

 ͵Ǥ Ethernet Card: It is a hardware device that helps in the connection of nodes within a network.
–Ї”‡– ƒ”†‹•ƒŽ•‘‘™ƒ•ƒ‡–™‘” ƒ”†ǡ‡–™‘”ƒ†ƒ’–‡”‘” ȋ‡–™‘”‹–‡”ˆƒ ‡
card). It is a card that allows computers to communicate over a computer network. On
–Ї”‡– ƒ”†ǡƒ’Š›•‹ ƒŽƒ††”‡••‘ˆ‡ƒ Š ‘—‹ ƒ–‹‰ ‘’—–‡”‹•‡–‹‘‡†ǤŠ›•‹ ƒŽ
address is known as MAC address.

8.10
4. Hub: It is multi-port and unintelligent network device which simply transfers data from
one port of the network to another. A hub is a hardware device used to connect several
computers together with different ports. When the packet reaches one port, it is copied to
all other ports of the hub without changing the destination address in the frame. Rather,
it simply copies the data to all of the nodes connected to the hub.
—„• ƒ„‡‡‹–Ї”ƒ –‹˜‡‘”’ƒ••‹˜‡Ǥ —„• ƒ—•—ƒŽŽ›•—’’‘”–ͺǡͳʹ‘”ʹͶ ǦͶͷ’‘”–•Ǥ

Fig. 8.8: Hub

But the problem with hub is that it is not an intelligent device. It shares bandwidth with
all the attached devices and broadcasts the data, i.e., sends the data frames to all the
connected nodes, as it does not remember devices/computers connected to it. Also, it
ƒ‘–ϐ‹Ž–‡”–Ї†ƒ–ƒƒ† ƒ—•‡•—‡ ‡••ƒ”›–”ƒˆϐ‹ Œƒ•Ǥ
A hub can both send as well as receive information, but only one task at a time. However, a
Š—„‹•ƒ‹‡š’‡•‹˜‡™ƒ›–‘ ‘‡ –—Ž–‹’އ‘†‡•Ȁ†‡˜‹ ‡•–‘‡–™‘”Ǥ

CTM: Hub is a device used to connect several computers with each other.

5. Switch: A switch (switching hub) is a network device which is used to interconnect computers
‘”†‡˜‹ ‡•‘ƒ‡–™‘”Ǥ –ϐ‹Ž–‡”•ƒ†ˆ‘”™ƒ”†•†ƒ–ƒ’ƒ ‡–•ƒ ”‘••ƒ‡–™‘”Ǥ –‹•ƒŽ•‘ƒ
multi-port device but with some intelligence and so the data packets received from one port
of network are refreshed and delivered to the other port of the network. The main difference
between hub and switch is that hub replicates what it receives on one port onto all the other
ports, while switch keeps a record of the MAC addresses of the devices attached to it.

Fig. 8.9: Switch

CTM: A switch is a device that transmits data to the computers in a LAN.


Computer Networks

͸Ǥ Bridge: A bridge is a device that works on the physical layer as well as on data link layer. A
network bridge connects multiple network segments at the data link layer (layer 2) of the
OSI model. Bridges relay frames between two originally separate segments. When a frame
enters a bridge, the bridge not only regenerates the signal but also checks the physical
address of the destination and forwards the new copy only to that port.
8.11
‹’‘”–ƒ–ƒ†˜ƒ–ƒ‰‡‘ˆ—•‹‰ƒ„”‹†‰‡‹•–Šƒ–‹–‹•ƒ•ƒ”–‡”Š—„ƒ•‹– ƒϐ‹Ž–‡”‡–™‘”
–”ƒˆϐ‹ ‘–Ї„ƒ•‹•‘ˆ–Їƒ††”‡••‡•Ǥ

SERVER SERVER 20.0.0.0/8


10.0.0.0/8 IP ADDRESS
IP ADDRESS
BRIDGE

PC 4 PC 5 PC 4 PC 5

PC 1 PC 2 PC 3 PC 1 PC 2 PC 3
Fig. 8.10: Ethernet Bridge

CTM: A bridge is a device that links two segments together of the original network.

7. Gateway: A gateway is a device that connects dissimilar networks. In internet, several networks
ƒ”‡ ‘—‹ ƒ–‹‰ ™‹–Š ‡ƒ Š ‘–Ї” ƒ† ‡ƒ Š ‡–™‘” Šƒ• ƒ †‹ˆˆ‡”‡– ‘ϐ‹‰—”ƒ–‹‘Ǥ 
order to make reliable communication, there must be a device that helps in communicating.
Gateway is a device which establishes an intelligent connection between a local area network
ƒ†‡š–‡”ƒŽ‡–™‘”•™‹–Š ‘’އ–‡Ž›†‹ˆˆ‡”‡–•–”— –—”‡•Ǥ

Internet Web Server

******** Workstation
Supplement – Computer Science with Python–XII

Gateway

Fig. 8.11: Gateway

CTM: A gateway is a device that connects dissimilar networks.

8. Repeater: A repeater is a device that operates only on the physical layer of the OSI model. As
ƒ•‹‰ƒŽ–”ƒ˜‡Ž•ƒϐ‹š‡††‹•–ƒ ‡ǡ„‡ˆ‘”‡ƒ––‡—ƒ–‹‘‘ˆ–Ї•‹‰ƒŽǡƒ”‡’‡ƒ–‡”‹•—•‡†™Š‹ Š
ƒ’Ž‹ϐ‹‡•ƒ†”‡•–‘”‡••‹‰ƒŽ•ˆ‘”Ž‘‰Ǧ†‹•–ƒ ‡–”ƒ•‹••‹‘Ǥ”‡’‡ƒ–‡”‹•ƒ‡Ž‡ –”‘‹ 
device that receives a signal before it becomes too weak and regenerates the original
signal. Also, it is a two-port network device that strengthens the signal intensity and
‘‡ –•–™‘‹†‡–‹ ƒŽ‡–™‘”•Ǥ ‘•––™‹•–‡†’ƒ‹”–Ї”‡– ‘ϐ‹‰—”ƒ–‹‘•ǡ”‡’‡ƒ–‡”•
ƒ”‡ ”‡“—‹”‡† ˆ‘” ƒ„އ ”—• Ž‘‰‡” –Šƒ ͳͲͲ ‡–”‡•Ǥ  ”‡’‡ƒ–‡” †‘‡• ‘– Šƒ‰‡ –Ї
functionality of the network; instead, it makes the signal strong before it degrades.
‡’‡ƒ–‡”•ƒ”‡ƒŽ•‘‡š–‡•‹˜‡Ž›—•‡†‹„”‘ƒ† ƒ•–‹‰™Š‡”‡–Ї›ƒ”‡–‡”‡†ƒ•–”ƒ•Žƒ–‘”•
8.12 or boosters.
Weakened Signal Regenerated Signal

Repeater

Repeater

No signal
through the hill

Communication only possible by bouncing the


signal through the repeater

Fig. 8.12: Working of a Repeater

CTM: Repeater is a device that amplifies a signal that is transmitted across the network so that the signal is
received in the same way as it is sent.

ͻǤ Router: A router is a networking device that forwards data packets from the source
machine to the destination machine by using the shortest path. Routers are used at the
network layer, which is the third layer of the OSI model.
INTERNET EXTENDING A NETWORK USING
A LAN CABLE CONNECTION AND A SECOND ROUTER

Secondary
Main Router Router

LAN CABLE CONNECTION

LAPTOP LAPTOP
MOBILE TAB TAB MOBILE

Fig. 8.13: Router

CTM: A router is a networking device that helps in forwarding packets from one machine to another.

ͳͲǤ Wi-Fi Card:‹Ǧ ‹ ƒ”†‹•‡‹–Ї”ƒ‹–‡”ƒŽ‘”‡š–‡”ƒŽ‘ ƒŽ”‡ƒ‡–™‘”ƒ†ƒ’–‡”™‹–Šƒ


Computer Networks

built-in wireless radio and antenna. A Wi-Fi card is used in a desktop computer that enables
a user to establish an internet connection. Wi-Fi cards are known as wireless fidelity cards
as they allow the user to set up connection without any wire. Wireless Fidelity (Wi-Fi)
cards are widely used in notebook computers due to their highly portable nature. The most
‘‘‹Ǧ ‹ ƒ”†•—•‡†‹†‡•–‘’ ‘’—–‡”•ƒ”‡ Ǧ𒔇••‹Ǧ ‹ ƒ”†•ƒ†‡–‘ˆ‹–
–Ї Ǧ𒔇•• ƒ”†•Ž‘–•‘–Ї‘–Ї”„‘ƒ”†Ǥ 8.13
8.10 TYPES OF NETWORKS
A computer network may be small or big depending upon the number of computers and other
‡–™‘”†‡˜‹ ‡•Ž‹‡†–‘‰‡–Ї”ǤŠ—•ǡ‡–™‘”•˜ƒ”›‹•‹œ‡ǡ ‘’Ž‡š‹–›ƒ†‰‡‘‰”ƒ’Š‹ ƒŽ•’”‡ƒ†Ǥ
A computer network can be on a table, in a room, building, city, country, across continents or
around the world.
–Ї„ƒ•‹•‘ˆ‰‡‘‰”ƒ’Š‹ ƒŽ•’”‡ƒ†ǡ‡–™‘”•ƒ›„‡ Žƒ••‹ϐ‹‡†ƒ•ǣ
ͳǤ 
2. LAN
͵Ǥ 
4. WAN

8.10.1 Personal Area Network (PAN)


• ƒ”‡ •ƒŽŽ ‡–™‘”• —•‡† –‘ ‡•–ƒ„Ž‹•Š ‘—‹ ƒ–‹‘ „‡–™‡‡ ƒ ‘’—–‡” ƒ† ‘–Ї”
Šƒ†Š‡Ž††‡˜‹ ‡•‹–Ї’”‘š‹‹–›‘ˆ—’–‘ͳͲ‡–”‡•—•‹‰™‹”‡† ‘‡ –‹˜‹–›‘”™‹”‡Ž‡••
•›•–‡•Ž‹‡Ž—‡–‘‘–Š‘” ˆ”ƒ”‡†Ǥ•ƒ”‡—•‡†–‘ ‘‡ – ‘’—–‡”•ǡŽƒ’–‘’•ǡ‘„‹Ž‡•ƒ†
‘–Ї” Ǧ‡ƒ„އ††‡˜‹ ‡•–‘–”ƒ•ˆ‡”ϐ‹Ž‡•‹ Ž—†‹‰‡ƒ‹Ž•ǡ†‹‰‹–ƒŽ’Š‘–‘•ǡƒ—†‹‘ƒ†˜‹†‡‘ǡ‡– .
ЇŽ—‡–‘‘–Š–‡ А‘Ž‘‰›‹’އ‡–•Ǥƒ›‹ Ž—†‡™‹”‡Ž‡•• ‘’—–‡”‡›„‘ƒ”†ƒ†
mouse, Bluetooth-enabled headphones, wireless printers and TV remotes.

10 Metres
Supplement – Computer Science with Python–XII

Fig. 8.14: Personal Area Network (PAN)

CTM: The network that belongs to a single person or user is known as PAN.

8.10.2 Local Area Network (LAN)


LAN is a privately owned computer network covering a small geographical area (small physical
ƒ”‡ƒȌǡŽ‹‡ƒŠ‘‡ǡ‘ˆϐ‹ ‡‘”ƒ„—‹Ž†‹‰•— Šƒ•ƒ• Š‘‘ŽǤ – ƒ ‘˜‡”ƒƒ”‡ƒ•’”‡ƒ†‘˜‡”ƒˆ‡™
metres to a radius of a few kilometres.
Occasionally, a LAN can span a group of nearby buildings. In addition to operating in a limited
space, a LAN is owned, controlled and managed by a single person or organization. A LAN can be
•‡– —’ —•‹‰ ™‹”‡† ‡†‹ƒ ȋ ƒ„އ•ǡ ‘ƒš‹ƒŽ ƒ„އ•ǡ ‡– ǤȌ ‘” ™‹”‡Ž‡•• ‡†‹ƒ ȋ ˆ”ƒ”‡†ǡ
Radio waves). If a LAN is set up using unguided media, it is known as WLAN (wireless LAN).
The key purpose of a LAN is to share resources. LAN users can share data, programs, printer,
disk, modem, etc.
8.14
LAN in your Home LAN in Office

CAMPUS
LAN in Building

LAN in Campus

Fig. 8.15: Local Area Network (LAN)

ƒ–ƒ–”ƒ•ˆ‡””ƒ–‡•’‡‡†‘˜‡”ƒ‘ ƒŽ”‡ƒ‡–™‘” ƒ˜ƒ”›ˆ”‘ͳͲ„’•–‘ͳ‰„’•Ǥ

8.10.3 Metropolitan Area Network (MAN)


MAN is larger than a LAN and can cover a city and its surrounding areas. A MAN usually
interconnects a number of LANs and individual computers. It also shares the computing
resources among users. All types of communication media (guided and unguided) are used to set
up a MAN. A MAN is typically owned and operated by a single entity such as a government body
‘”ƒŽƒ”‰‡ ‘”’‘”ƒ–‹‘Ǥ‰‘‘†‡šƒ’އ‘ˆ‹•–Ї‹–‡” ‘‡ –‡†‘ˆϐ‹ ‡•‘ˆƒ—Ž–‹ƒ–‹‘ƒŽ
Corporation (MNC) or cable television networks available in the whole city.

SOHO
Base station customer

Residential
customer

Multi-tenant
customers
Computer Networks

Repeater
SME
customer
Base station

Fig. 8.16: Metropolitan Area Network (MAN) 8.15


8.10.4 Wide Area Network (WAN)
A WAN is a telecommunication network. This type of network spreads over a large geographical
area across countries and continents. WANs are generally used to interconnect several other
types of networks such as LANs, MANs, etc. Ї› ˆƒ ‹Ž‹–ƒ–‡ ˆƒ•– ƒ† ‡ˆϐ‹ ‹‡– ‡š Šƒ‰‡ ‘ˆ
information at a high speed and low cost. A WAN uses common carriers like satellite systems,
telephone lines, etc.
A WAN can cover an area with a radius spanning hundreds of kilometres. A network of ATMs,
„ƒ•ǡ ‰‘˜‡”‡– ‘ˆϐ‹ ‡•ǡ ‹–‡”ƒ–‹‘ƒŽ ‘”‰ƒ‹œƒ–‹‘•ǯ ‘ˆϐ‹ ‡•ǡ ‡– ., spread over a country,
‘–‹‡–‘” ‘˜‡”‹‰ƒ› ‘–‹‡–•ƒ”‡‡šƒ’އ•‘ˆǤ
All types of communication media (guided and unguided) are used to set up a WAN. The best
‘™‡šƒ’އ‘ˆƒ‹•–Ї‹–‡”‡–ǤЇ‹–‡”‡–‹•–ЇŽƒ”‰‡•–•’ƒ‹‰–Ї‡–‹”‡’Žƒ‡–Ǥ

CTM: A WAN interconnects all the computers across the world.

Wide Area
Network (WAN)
Satellite
Metropolitan
Area Network
(MAN)

Local Area
Personal Area Network (LAN)
Network (PAN)

Fig. 8.17: Wide Area Network (WAN)

Їˆ‘ŽŽ‘™‹‰–ƒ„އ•—ƒ”‹œ‡•–Ї Šƒ”ƒ –‡”‹•–‹ •‘ˆ•ǡ•ǡ•ƒ†•Ǥ


Parameter PAN LAN MAN WAN
Area covered Small area A building or campus A city (up to Entire country,
Supplement – Computer Science with Python–XII

(up to 10 m (up to 10 km) 100 km radius) continent or globe


radius)
Networking Negligible Inexpensive Expensive Very expensive
cost
Transmission High speed High speed Moderate speed Low speed
speed
Error rate Lowest Lowest Moderate Highest
Network WLAN, USB LAN/WLAN, Hub/ Router, Gateway Router, Gateway
devices used Dongle Switch, Repeater,
Modem
Technology/ Infrared, Bluetooth Ethernet, Wi-Fi Optical fibre, Microwave Satellite
media used Radio-wave,
Microwave

CTM: LAN and WAN are the two primary and best-known categories of area networks; the others have
emerged with technological advances.

8.16
Comparing LAN and WAN
•™‡Šƒ˜‡•‡‡ǡ ‘’—–‡”‡–™‘”• ƒ„‡ Žƒ••‹ϐ‹‡†‹–‘ǡƒ† ƒ–‡‰‘”‹‡•‘
–Ї„ƒ•‹•‘ˆ–Ї‹”‰‡‘‰”ƒ’Š‹ ƒŽ†‘ƒ‹•Ǥ‡š–‡†•‘˜‡”ƒŽƒ”‰‡‰‡‘‰”ƒ’Š‹ ƒŽƒ”‡ƒǡ•— Šƒ•
•–ƒ–‡•‘” ‘—–”‹‡•Ǥ‹• ‘ϐ‹‡†–‘”‡Žƒ–‹˜‡Ž›•ƒŽŽ‡”ƒ”‡ƒ•ǡ•— Šƒ•ƒ‘ˆϐ‹ ‡ǡƒ„—‹Ž†‹‰ǡ
etc.—•—ƒŽŽ› ‘˜‡”•ƒ‡–‹”‡ ‹–›Ǥ –—•‡•–Ї–‡ А‘Ž‘‰›ǤЇ‘•– ‘‘‡šƒ’އ
of MAN is the cable television network. Thus, the basic points of difference between LAN and
WAN are as follows:
 ͳǤ Ї†‹•–ƒ ‡„‡–™‡‡–Ї‘†‡•‹ƒ ‘‡ –‹‘‹•Ž‹‹–‡†–‘ƒ•’‡ ‹ϐ‹ ”ƒ‰‡ǤЇ—’’‡”
Ž‹‹–‹•ƒ’’”‘š‹ƒ–‡Ž›ͳͲ‹Ž‘‡–”‡•ƒ†–ЇŽ‘™‡”Ž‹‹–‹•‘‡‡–”‡Ǥ–Ї‘–Ї”Šƒ†ǡ
WANs are spread across thousands of kilometres in different countries or regions.
 ʹǤ •‘’‡”ƒ–‡„‡–™‡‡•’‡‡†•‘ˆͳ‡‰ƒ„‹–’‡”•‡ ‘†ȋ„’•Ȍƒ†ͳͲ„’•™Š‹Ž‡•
‘’‡”ƒ–‡ƒ–•’‡‡†•‘ˆއ••–Šƒͳ„’•Ǥ‘ƒ Š‹‡˜‡•’‡‡†•‘ˆ•‡˜‡”ƒŽŠ—†”‡†„’•ǡ‹–‹•
ƒ†˜‹•ƒ„އ–‘—•‡–Ї‘’–‹ ƒŽϐ‹„”‡–‡ А‘Ž‘‰›Ǥ
 ͵Ǥ Ї‡””‘””ƒ–‡‹•‹•Ž‘™‡”–Šƒ–Šƒ–‹•„‡ ƒ—•‡‘ˆ–Ї•Š‘”–†‹•–ƒ ‡•‹˜‘Ž˜‡†‹
•ǤЇ‡””‘””ƒ–‡‹•‹•ƒ’’”‘š‹ƒ–‡Ž›‘‡–Š‘—•ƒ†–‹‡•އ••–Šƒ–Šƒ–‹•Ǥ
4. As LANs are limited by distance, an entire LAN is usually under the control of a single entity,
such as an organization. On the other hand, WANs are usually operated and controlled by
multiple organizations.
Thus, we can say that in comparison to WANs, LANs cover a limited area but they operate with
high speed and low error rates.

8.11 NETWORK TOPOLOGIES


Topology is a way of connecting devices with each other either physically or logically. Two or
more devices make a link and two or more links form a topology. It is basically a geometrical
representation of how a network is laid out.

CTM: Topology is a way of connecting several devices with each other on a network.

Types of Topologies
ƒ•‹ ƒŽŽ›ǡ–Ї”‡ƒ”‡ϐ‹˜‡–›’‡•‘ˆ–‘’‘Ž‘‰‹‡•ƒ†‡ƒ Š–‘’‘Ž‘‰›Šƒ••‘‡ƒ†˜ƒ–ƒ‰‡•ƒ††‹•ƒ†˜ƒ–ƒ‰‡•Ǥ

Types of Topology

Mesh Topology Star Topology Bus Topology Ring Topology Tree Topology

Fig. 8.18: Classification of Network Topologies

8.11.1 Mesh Topology


In mesh topology, each computer is connected with the other computer. There is a point-to-
Computer Networks

point link between each dedicated node (workstation). In this type of topology, the link carries
–”ƒˆϐ‹ ‘Ž›„‡–™‡‡–Ї–™‘ ‘‡ –‡††‡˜‹ ‡•Ǥˆ—ŽŽ› ‘‡ –‡†‡•А‡–™‘”Šƒ•n(n–1)/2
links, where n is the total number of connecting nodes.
For example,‹ˆ–Ї”‡ƒ”‡ϐ‹˜‡ ‘’—–‡”•ƒ†‡ƒ Š‹• ‘‡ –‡†™‹–Š–Ї‘–Ї”‘‡ǡ–Ї–Ї”‡
™‹ŽŽ„‡ͷȋͷȂͳȌȀʹαͳͲŽ‹•Ǥ
8.17
Fig. 8.19: Mesh Topology

Advantages of Mesh Topology


ȋƒȌ ƒ Š ‘—‹ ƒ–‹‰ †‡˜‹ ‡ ƒ””‹‡• ‹–• ‘™ †ƒ–ƒ –Š”‘—‰Š ‹–• ‘™ †‡†‹ ƒ–‡† Ž‹ǡ Ї ‡
eliminating traffic problems.
(b) A mesh topology is robust. If one link becomes unusable, it does not affect the entire system.
ȋ Ȍ š’ƒ•‹‘ƒ†‘†‹ˆ‹ ƒ–‹‘‹–‘’‘Ž‘‰› ƒ„‡†‘‡™‹–Š‘—–†‹•”—’–‹‰‘–Ї”‘†‡•Ǥ
(d) There is the advantage of privacy or security of data. When every message travels along a
†‡†‹ ƒ–‡†Ž‹‡ǡ‘Ž›–Ї‹–‡†‡†”‡ ‹’‹‡–•‡‡•‹–ǤŠ›•‹ ƒŽ„‘—†ƒ”‹‡•’”‡˜‡–‘–Ї”—•‡”•
from gaining access to messages.
ȋ‡Ȍ ‘‹–Ǧ–‘Ǧ’‘‹–Ž‹•ƒ‡ˆƒ—Ž–‹†‡–‹ˆ‹ ƒ–‹‘ƒ†ˆƒ—Ž–‹•‘Žƒ–‹‘‡ƒ•›Ǥ”ƒˆˆ‹  ƒ„‡”‘—–‡†–‘
avoid links with suspected problems. This facility enables the network manager to discover
the precise location of the fault and aids in finding its cause and solution.

Disadvantages of Mesh Topology


ȋƒȌ ‡•Š–‘’‘Ž‘‰›‹•Š‹‰ŠŽ›‡š’‡•‹˜‡–‘•‡–—’ƒ†‹˜‘Ž˜‡•Š‹‰Šƒ‹–‡ƒ ‡ ‘•–•„‡ ƒ—•‡‘ˆ
–Їƒ‘—–‘ˆ ƒ„Ž‹‰ƒ†–Ї—„‡”‘ˆ Ȁ’‘”–•”‡“—‹”‡†Ǥ
ȋ„Ȍ ЇŠƒ”†™ƒ”‡”‡“—‹”‡†–‘ ‘‡ –‡ƒ ŠŽ‹ȋ Ȁ’‘”–•ƒ† ƒ„އȌ ƒ„‡’”‘Š‹„‹–‹˜‡Ž›‡š’‡•‹˜‡Ǥ
ȋ Ȍ ‡–Ǧ—’ƒ†ƒ‹–‡ƒ ‡‘ˆ–Š‹•–‘’‘Ž‘‰›‹•˜‡”›†‹ˆϐ‹ —Ž–Ǥ˜‡ƒ†‹‹•–”ƒ–‹‘‘ˆ–Ї‡–™‘”
is tough.

CTM: When there is a point-to-point link between each computer in a network, it forms mesh topology.
Supplement – Computer Science with Python–XII

8.11.2 Star Topology


Computer
In star topology, each communicating device is
connected to a central controller called hub. (A hub is a
hardware device used to connect several computers
together.) Unlike mesh topology, the devices in star
Computer Computer
topology send and receive data indirectly; the data
’ƒ••‡• –‘ ƒ† ˆ”‘ –Ї Š—„Ǥ ˆ –Ї †ƒ–ƒ ‹• ”‡“—‹”‡† –‘ HUB
be sent from one computer and received by another
computer, then this can be accomplished only by the
‡–”ƒŽ ‘–”‘ŽŽ‡”ƒ•‡ƒ Іƒ–ƒ‹•ϐ‹”•–•‡––‘–ЇŠ—„ǡ
which then relays that data to the destination computer.
The most popular and widely used LAN technology,
Ethernet, currently operates in Star Topology. Computer Printer
Fig. 8.20: Star Topology
8.18
Advantages of Star Topology
ȋƒȌ ‡™‡”™‹”‡•ƒ”‡”‡“—‹”‡†ƒ• ‘’ƒ”‡†–‘‡•Š–‘’‘Ž‘‰›™Š‹ Šǡ–Š—•ǡ”‡†— ‡•–Ї—„‡”
of input/output ports.
(b) Installation and maintenance of network is easy and takes less time.
(c) It is easy to detect faults in this network as all computers are dependent on the central hub.
This means that any problem which makes the network non-functioning can be traced to
the central hub.
(d) The rate of data transfer is fast as all the data packets or messages are transferred through
central hub.
(e) As the nodes are not connected to each other, any problem in one node does not hamper
the performance of other nodes in the network.
(f) Removal or addition of any node in star topology can take place easily without affecting the
entire performance of the network.

Disadvantages of Star Topology


ȋƒȌ š–”ƒŠƒ”†™ƒ”‡‹•”‡“—‹”‡†ˆ‘”‹•–ƒŽŽƒ–‹‘‘ˆ ‡–”ƒŽ ‘–”‘ŽŽ‡”‘™ƒ•Š—„Ǥ
(b) All nodes of star topology are dependent on central hub and, therefore, any problem in
the hub makes the entire network shut down.
(c) The performance of the entire network is directly dependent on the performance of the hub.
If the server is slow, it will cause the entire network to slow down.
ȋ†Ȍ ‘”‡ ƒ„Ž‹‰ ‹• ”‡“—‹”‡† ‹ •–ƒ” –‘’‘Ž‘‰› ƒ• ‘’ƒ”‡† –‘ ƒ› ‘–Ї” –‘’‘Ž‘‰› ȋ”‹‰ǡ „—•ǡ
tree) as all nodes are directly connected to a central hub.

8.11.3 Bus Topology


—• –‘’‘Ž‘‰› ‹• ƒ —Ž–‹’‘‹– ‘ϐ‹‰—”ƒ–‹‘ǡ i.e., several devices are connected to a main long
cable which acts as a backbone. Nodes are connected by drop lines and taps. A drop line is a
connection between the long cable and devices and taps are the connectors that are punctured
‹•‹†‡–Їƒ‹ ƒ„އǤЇ†ƒ–ƒϐŽ‘™•ˆ”‘‘‡‡†‘ˆ–Ї ƒ„އ–‘–Ї‘–Ї”Ǥ
However, as the signal travels a long distance, it becomes weaker and weaker.
Server

BACKBONE

Nodes
Dropline
Computer Networks

Fig. 8.21: Bus Topology

Ї”‡ˆ‘”‡ǡ–Ї”‡•Š‘—ކ„‡ƒŽ‹‹–‡†—„‡”‘ˆ‘†‡• ‘‡ –‡†–‘ƒŽ‹‡Ǥ–Ї”‡–‹•ƒ ‘‘


‡šƒ’އ‘ˆ„—•–‘’‘Ž‘‰›Ǥ

8.19
Advantages of Bus Topology
(a) Nodes can be connected or removed easily from bus network.
ȋ„Ȍ –”‡“—‹”‡•އ•• ƒ„އއ‰–Š–Šƒƒ•–ƒ”–‘’‘Ž‘‰›Ǥ
ȋ Ȍ —•‡–™‘”‹•‡ƒ•›–‘‹’އ‡–ƒ† ƒ„‡‡š–‡†‡†—’–‘ƒ ‡”–ƒ‹Ž‹‹–Ǥ
(d) It works well for small networks.

Disadvantages of Bus Topology


(a) If there is a fault or break in the main cable, the entire network shuts down.
ȋ„Ȍ ‡”‹ƒ–‘”•ƒ”‡”‡“—‹”‡†ƒ–„‘–Ї†•‘ˆ–Ї„ƒ „‘‡ ƒ„އǤ
ȋ Ȍ ƒ—Ž–‹•‘Žƒ–‹‘‹•†‹ˆϐ‹ —Ž––‘†‡–‡ –‹ˆ–Ї‡–‹”‡‡–™‘”•Š—–•†‘™Ǥ
ȋ†Ȍ Ї–Ї‡–™‘”‹•”‡“—‹”‡†‹‘”‡–Šƒ‘‡„—‹Ž†‹‰ǡ„—•‡–™‘” ƒ‘–„‡—•‡†Ǥ
(e) The signal becomes weaker if number of nodes becomes large.
ȋˆȌ ‡”ˆ‘”ƒ ‡†‡‰”ƒ†ƒ–‹‘‘ —”•™‹–Š–Ї‹ ”‡ƒ•‡†—„‡”‘ˆ‘†‡•Ǥ
(g) Collision of data can take place because several nodes can transmit data to each other at
one time.

CTM: There is a main cable which is connected to several workstations through taps. Collision of data can
take place in bus topology.

8.11.4 Ring Topology


In ring topology, each node is connected to two other
nodes on either side of it, forming a ring network. Clockwise
– •Š‘™• –Ї Ž‹‡ ‘ϐ‹‰—”ƒ–‹‘ ‹ ™Š‹ Š ‡ƒ Š ‘†‡ Counterclockwise
is connected to one predecessor node and one
successor node. Signal is transmitted only in one
Server
direction along the entire ring in a circular fashion.
In ring topology, each device is incorporated with a
repeater to strengthen the signal as a signal passes
through all nodes in the entire network. When the
data is transmitted from one node to its recipient
Supplement – Computer Science with Python–XII

node, then the intermediate node regenerates the


signal and passes the signal to the destined node.
Fig. 8.22: Ring Topology
Token Ring‹•ƒ‡šƒ’އ‘ˆ”‹‰–‘’‘Ž‘‰›Ǥ

Advantages of Ring Topology


ȋƒȌ  ‡–”ƒŽ•‡”˜‡”‹•‘–”‡“—‹”‡†‹”‹‰–‘’‘Ž‘‰›ƒ•–Ї†ƒ–ƒ‹•’ƒ••‡†„‡–™‡‡–™‘‘†‡•
which then pass through the entire network.
(b) The data is transmitted in one direction only and, hence, the transmission rate increases.
ȋ Ȍ Їƒ††‹‰‘””‡‘˜‹‰‘ˆ‡–™‘”‘†‡•‹•‡ƒ•›ƒ•–Ї’”‘ ‡••”‡“—‹”‡• Šƒ‰‹‰‘Ž›–™‘
connections.
ȋ†Ȍ Ї ‘ϐ‹‰—”ƒ–‹‘ƒ‡•‹–‡ƒ•›–‘‹†‡–‹ˆ›ˆƒ—Ž–•‹‡–™‘”‘†‡•Ǥ
ȋ‡Ȍ –Š‹•–‘’‘Ž‘‰›ǡ‡ƒ А‘†‡–”ƒ•‹–•–Ї†ƒ–ƒ–‘‹–•‡š–‘†‡‹ƒ”‹‰Ǥ
(f) It is relatively cheaper as compared to star topology.
8.20
Disadvantages of Ring Topology
(a) If there is a fault in a single node, it can cause the entire network to fail.
(b) The movement or changes made to network nodes affect the entire network’s performance.
(c) Transmission speed becomes slower with an increase in the number of nodes.
(d) If there is a fault or break in a cable to which all other nodes are connected, the entire
network shuts down.
ȋ‡Ȍ ‘”’”‘’‡” ‘—‹ ƒ–‹‘„‡–™‡‡‡ƒ А‘†‡ǡ‹–‹•”‡“—‹”‡†–Šƒ–‡ƒ Š ‘’—–‡”—•–„‡
turned on.

CTM: In ring topology, each workstation is connected with the predecessor node as well as with the
successor node and, thus, forms a ring. Data is transmitted only in one direction.

8.11.5 Tree Topology


In tree topology, all or some of the devices are Central
connected to the central hub, called an active hub
hub, and some of the devices are connected
to the secondary hub, which may be an active Secondary Secondary
hub or passive hub. An active hub contains hub hub
the repeater that regenerates the signal when
it becomes weaker with longer distances. A
passive hub simply provides a connection
Fig. 8.23: Tree Topology
between all other connecting nodes.

Advantages of Tree Topology


(a) The tree topology is useful in cases where a star or bus cannot be implemented individually.
(b) It is most suited in networking multiple departments of a university or corporation, where
each unit (star segment) functions separately, and is also connected with the main node
(root node).
(c) The advantages of centralization that are achieved in a star topology are inherited by the
individual star segments in a tree network.
ȋ†Ȍ ƒ Š•–ƒ”•‡‰‡–‰‡–•ƒ†‡†‹ ƒ–‡†Ž‹ˆ”‘–Ї ‡–”ƒŽ„—•ǤŠ—•ǡˆƒ‹Ž‹‰‘ˆ‘‡•‡‰‡–
does not affect the rest of the network.
ȋ‡Ȍ ƒ—Ž–‹†‡–‹ϐ‹ ƒ–‹‘‹•‡ƒ•›Ǥ
ȋˆȌ Ї ‡–™‘” ƒ „‡ ‡š’ƒ†‡† „› –Ї ƒ††‹–‹‘ ‘ˆ •‡ ‘†ƒ”› ‘†‡•Ǥ Š—•ǡ • ƒŽƒ„‹Ž‹–› ‹•
achieved.

Disadvantages of Tree Topology


(a) As multiple segments are connected to a central bus, the network depends heavily on the
bus. Its failure affects the entire network.
Computer Networks

ȋ„Ȍ ™‹‰ –‘ ‹–• •‹œ‡ ƒ† ‘’Ž‡š‹–›ǡ ƒ‹–‡ƒ ‡ ‹• ‘– ‡ƒ•› ƒ† ‘•–• ƒ”‡ Š‹‰ŠǤ Ž•‘ǡ
‘ϐ‹‰—”ƒ–‹‘‹•†‹ˆϐ‹ —Ž–‹ ‘’ƒ”‹•‘–‘‘–Ї”–‘’‘Ž‘‰‹‡•Ǥ
(c) Though it is scalable, the number of nodes that can be added depends on the capacity of the
central bus and on the cable type.

8.21
CTM: In tree topology, the main central hub is connected to the secondary hub through which all devices
are connected with each other. Tree topology is just like a parent-child relationship.

The decision to select a particular topology for a network does not take place in isolation as
the topology determines the type of media and access methods that would be used on the
network. Therefore, several factors are taken into consideration before selecting a topology
which are as follows:
¾ Cost: ‘•– •‹‰‹ϐ‹‡• –Šƒ– –Ї ‡–™‘” •Š‘—ކ „‡ ‘•–Ǧ‡ˆˆ‡ –‹˜‡Ǥ ‘” –Š‹•ǡ ‹– ‹• ”‡“—‹”‡† –‘

minimize the installation cost. This can be done by selecting an economical transmission
‡†‹—ȋ–Šƒ–‹•ǡ™‹”‡•Ȍˆ‘”†ƒ–ƒ‡š Šƒ‰‡„‡–™‡‡–Ї‡–™‘”‘†‡•ǤЇ‡–™‘” ‘•–
can also be minimized by reducing the distances between the nodes.
¾ Flexibility: Ž‡š‹„‹Ž‹–›•‹‰‹ϐ‹‡•–Šƒ––Ї‡–™‘”—•–„‡ϐŽ‡š‹„Ž‡‡‘—‰Šǡi.e., it should be
‡ƒ•›–‘”‡ ‘ϐ‹‰—”‡Ǥ‡ ‘ϐ‹‰—”‹‰ƒ‡–™‘”‡ƒ•–‘”‡ƒ””ƒ‰‡–Ї‡š‹•–‹‰‘†‡•‘”ƒ††
new ones on the network.
¾ Reliability: It refers to the degree of trust that can be placed on a network. Like any
other system, a network can also encounter failure. A network failure can occur due to the
following causes:
 ͳǤ Їƒ‹†‹˜‹†—ƒŽ‘†‡•–‘’•™‘”‹‰Ǥ
2. When the entire network fails. This is caused by a more serious fault that stops the
working of an individual node.

What is Point-to-Point (P-P) Link


 Ǧ Ž‹ǡ ƒŽ•‘ ‘™ ƒ• ƒ †‡†‹ ƒ–‡† Ž‹ǡ ‹• —•‡† –‘ ‘‡ – –™‘ ‘†‡• ‹ ƒ ‡–™‘”Ǥ Ї
ˆ— –‹‘ ‘ˆ Ǧ Ž‹ ‹• –‘ •‡† ƒ† ”‡ ‡‹˜‡ †ƒ–ƒ ‘˜‡” ƒ ‡–™‘”Ǥ  ƒ Ǧ ‡–™‘”ǡ ‡ƒ Š
workstation receives data from only one transmitter and each transmitter transmits data only
–‘‘‡”‡ ‡‹˜‡”Ǥ ‹‰ǤͺǤʹͶ•Š‘™•ƒǦŽ‹‹ƒ‡–™‘”Ǥ
Transmit Receive

A B
Supplement – Computer Science with Python–XII

Receive Transmit
Fig. 8.24: A Point-to-Point Link

For better performance, the transmit and receive operations can occur over separate cables or
™‹”‡•ǡ‘”–Ї› ƒ‘ —”‹–—”•‘˜‡”–Ї•ƒ‡™‹”‡„›—•‹‰†‹ˆˆ‡”‡––”ƒ•‹••‹‘–‡ А‹“—‡•Ǥ
ǦŽ‹ ƒ„‡‡•–ƒ„Ž‹•Ї†‹•‡˜‡”ƒŽ™ƒ›•ǤЇ•‹’އ•–™ƒ›‹•–‘‹•–ƒŽŽƒǦŽ‹„‡–™‡‡
each pair of computers over a network.

8.12 COMMUNICATION MEDIA


Communication media is also known as transmission media through which data or signal is
transferred between two communicating devices, i.e., from one system to another system,
through wires or without wires. If the data is sent across network through wires, it is called
guided media and if the data is sent without wires, it is called unguided media.

CTM: Communication media is a transmission media used for sending data or signal across the network.

8.22
Types of Communication/Transmission Media
All communication/transmission media can be divided into two categories:

Communication
Media

Guided Media Unguided Media

Twisted Coaxial Fibre Optic Satellite


Microwaves Radio Waves Infrared
Pair Cable Cable Cable Link

Fig. 8.25: Types of Communication Media

¾ Guided Media (Wired Media): Guided media are also known as physical or conducted
media. These media use wires for transmitting data. Various wired connections are twisted
’ƒ‹”™‹”‡ǡ ‘ƒš‹ƒŽ ƒ„އƒ†ϐ‹„”‡‘’–‹  ƒ„އǤ
¾ Unguided Media (Wireless Media):–”ƒ•‹••‹‘‡†‹ƒ–Šƒ–†‘‡•‘–”‡“—‹”‡–Ї—•‡‘ˆ
cables for transmission of data is known as unguided media. Wireless transmission is also
known as unguided media or non-physical media as the transmission takes place through
various types of electromagnetic waves, such as radio waves, terrestrial microwave
transmissions, satellite transmissions, cellular radio systems, infrared transmissions, etc.

8.12.1 Guided Media or Wired Networking Technologies


1. Twisted Pair Cable
A twisted pair cable is the oldest, simplest and the most
common type of conducted media. It is made of two plastic
insulated copper wires which are twisted together to form
ƒ •‹‰Ž‡ ™‹”‡Ǥ ƒ Š ™‹”‡ ‹• ͳ  –Š‹ Ǥ —– ‘ˆ –Ї•‡ –™‘
wires, only one carries the actual signal while the other is
Fig. 8.26: Twisted Pair Cable
used for ground reference. The wires so twisted are helpful
in avoiding interference from the nearby similar pairs, which is known as crosstalk. Twisted
’ƒ‹” ƒ „‡ •’‡ ‹ϐ‹‡† ƒ• ƒ–‡‰‘”› ͳȂͷ ƒ† ‹• ƒ„„”‡˜‹ƒ–‡† ƒ• ƒ– ͳȂͷǤ ƒ–‡‰‘”› ͸ –™‹•–‡† ’ƒ‹”
ƒ•—’’‘”–†ƒ–ƒ–”ƒ•‹••‹‘ƒ•Š‹‰Šƒ•ʹͲͲ„’•ˆ‘”ͳͲͲ‡–”‡•™Š‹Ž‡ƒ–‡‰‘”›͹–™‹•–‡†
pair can support still higher data rates.
Twisted pair comes in two varieties:
(a) Shielded twisted pair (STP): STP cables are covered in metal foil. This makes them
indifferent to noise and crosstalk.
(b) Unshielded twisted pair (UTP): UTP Šƒ• •‡˜‡ ƒ–‡‰‘”‹‡•ǡ ‡ƒ Š •—‹–ƒ„އ ˆ‘” ƒ •’‡ ‹ϐ‹ 
Computer Networks

—•‡Ǥ  ‘’—–‡” ‡–™‘”•ǡ ‘•–Ž› ƒ–Ǧͷǡ ƒ–Ǧͷ ƒ† ƒ–Ǧ͸ ƒ„އ• ƒ”‡ —•‡†Ǥ  ƒ„އ•
are connected by RJ-45 connectors.

Advantages of Twisted Pair Cable


(a) It is simple to use.
ȋ „Ȍ –‹•‹‡š’‡•‹˜‡ƒ††‘‡•‘–”‡“—‹”‡•‹ŽŽ‡†’‡”•‘‡ŽǤ
8.23
ȋ Ȍ –‹•އ•••—• ‡’–‹„އ–‘‡Ž‡ –”‹ ƒŽ‹–‡”ˆ‡”‡ ‡ ƒ—•‡†„›‡ƒ”„›‡“—‹’‡–‘”™‹”‡•‹ƒ
–‡Ž‡’Š‘‡ •›•–‡Ǥ ‹‰ƒŽ• ƒ –”ƒ˜‡Ž •‡˜‡”ƒŽ ‹Ž‘‡–”‡• ™‹–Š‘—– ƒ’Ž‹ϐ‹ ƒ–‹‘ ™Š‡
twisted pair wires are used.
(d) These media can be used for both analog and digital data transmission. The bandwidth
depends on the thickness of the wire and the distance travelled, but several megabits per
second can be achieved for a few kilometres in many cases.
(e) If a portion of a twisted pair cable is damaged, the entire network is not shut.

Disadvantages of Twisted Pair Cable


ȋƒȌ ™‹”‡‹•’Š›•‹ ƒŽŽ›Žƒ”‰‡”ƒ†‘”‡‡š’‡•‹˜‡–Šƒ–™‹•–‡†’ƒ‹”™‹”‡Ǥ
ȋ „Ȍ ‹•‘”‡†‹ˆϐ‹ —Ž––‘ ‘‡ ––‘ƒ–‡”‹ƒ–‹‰„Ž‘ Ǥ
(c) It easily picks up noise signals which results in higher error rates when the line length
‡š ‡‡†•ͳͲͲ‡–”‡•Ǥ
(d) Being thin in size, it is likely to break easily.
ȋ‡Ȍ – ƒ•—’’‘”–ͳͻǡʹͲͲ„’•—’–‘ͷͲˆ‡‡–‘Ǧʹ͵ʹ’‘”–Ǥ

2. Coaxial Cable
 ‘ƒš‹ƒŽ ƒ„އ‹•‰‡‡”ƒŽŽ› ƒŽŽ‡†ƒ ‘ƒš™‹”‡Ǥ – ‘•‹•–• braided shield foil shield
of insulated copper wires surrounded by a braided centre
‡–ƒŽ•Š‹‡Ž†ƒ† ‘˜‡”‡†‹ƒ’Žƒ•–‹ Œƒ ‡–Ǥ‘ƒš ƒ„އ• conductor
ƒ”‡ ƒ’ƒ„އ ‘ˆ ƒ””›‹‰ Š‹‰Š‡” ˆ”‡“—‡ › •‹‰ƒŽ• –Šƒ
twisted pair cables. The wrapped structure provides
‹– ƒ ‰‘‘† •Š‹‡Ž† ƒ‰ƒ‹•– ‘‹•‡ ƒ† ”‘••–ƒŽǤ ‘ƒš‹ƒŽ
cables provide high bandwidth rates of up to 450 mbps. outer jacket dielectric
‘ƒš‹ƒŽ ƒ„އƒŽ•‘ ‘‡•‹–™‘’”‹ƒ”›’Š›•‹ ƒŽ–›’‡•ǣ Fig. 8.27: Coaxial Cable
thin coaxial cable and thick coaxial cable. There
ƒ”‡ –Š”‡‡ ƒ–‡‰‘”‹‡• ‘ˆ ‘ƒš ƒ„އ•ǡ ƒ‡Ž›  Ǧͷͻ ȋƒ„އ Ȍǡ  Ǧͷͺ ȋŠ‹ –Ї”‡–Ȍ ƒ†
 Ǧͳͳ ȋŠ‹  –Ї”‡–ȌǤ   •–ƒ†• ˆ‘” ƒ†‹‘ —‹†‡Ǥ ‘ƒš ƒ„އ• ƒ”‡ ™‹†‡Ž› —•‡† ˆ‘” ‹–‡”‡–
connections and cable televisions.

Advantages of Coaxial Cable


Supplement – Computer Science with Python–XII

ȋƒȌ ‘ƒš‹ƒŽ ƒ„އ ƒ•—’’‘”–‰”‡ƒ–‡” ƒ„އއ‰–Š•„‡–™‡‡‡–™‘”†‡˜‹ ‡•–Šƒ–™‹•–‡†’ƒ‹”


cable.
(b) It is useful for transmitting analog as well as digital data across the network. For analog
†ƒ–ƒ–”ƒ•‹••‹‘ǡ͹ͷ‘Š„”‘ƒ†„ƒ† ‘ƒš‹ƒŽ‹•—•‡†ƒ†ˆ‘”†‹‰‹–ƒŽ–”ƒ•‹••‹‘ǡͷͲ‘Š
baseband cable is used.
(c) It is widely used for cable television and internet connections.
ȋ †Ȍ ‘ƒš ƒ”‡ —•‡† ˆ‘” –”ƒ•‹––‹‰ •‡˜‡”ƒŽ Šƒ‡Ž• •‹—Ž–ƒ‡‘—•Ž›ǡ i.e., they are helpful in
broadband transmission.
ȋ‡Ȍ ‘ƒš‹ƒŽ ƒ„އŠƒ•‡š ‡ŽŽ‡–‘‹•‡‹—‹–›„‡ ƒ—•‡‘ˆ–Š‹  ‘˜‡”‹‰‘—–•‹†‡–Ї‹•—Žƒ–‡†
wires.
ȋˆȌ Š‹  ‘ƒš‹ƒŽ ƒ„އŠƒ•ƒ‡š–”ƒ’”‘–‡ –‹˜‡’Žƒ•–‹  ‘˜‡”–Šƒ–Їޒ•‡‡’‘‹•–—”‡ƒ™ƒ›Ǥ
ȋ ‰Ȍ –‹•”‡Žƒ–‹˜‡Ž›‹‡š’‡•‹˜‡ƒ• ‘’ƒ”‡†–‘ϐ‹„”‡‘’–‹  ƒ„އǤ

8.24
Disadvantages of Coaxial Cable
ȋƒȌ –Š‹  ‘ƒš‹ƒŽ ƒ„އ†‘‡•‘–„‡†‡ƒ•‹Ž›ƒ†–Š—•‹•†‹ˆϐ‹ —Ž––‘‹•–ƒŽŽǤ
ȋ„Ȍ –‹•‡š’‡•‹˜‡ƒ• ‘’ƒ”‡†–‘–™‹•–‡†’ƒ‹” ƒ„އǤ

3. Fibre Optic Cable


Fibre optic transmits light signals rather than electrical signals. It is the newest form of guided
‡†‹ƒǤ‡˜‡”ƒŽ‰Žƒ••ϐ‹„”‡•ƒ”‡„—†Ž‡†–‘‰‡–Ї”ƒ†ƒ”‡‡ ƒ•‡†‹ƒ‹•—Žƒ–‡† ‘˜‡”‹‰Ǥ‹‰Š–
•‹‰ƒŽ•–”ƒ˜‡Ž‹–‘–Їϐ‹„”‡‘’–‹  ƒ„އƒ–‘‡‡†ƒ†ƒ”‡”‡ ‡‹˜‡†ƒ––Ї‘–Ї”‡†ǤЇ–Ї
Ž‹‰Š–‡–‡”•–Їϐ‹„”‡‘’–‹ ǡ–ЇŽ‹‰Š–’—Ž•‡‹•‹†‡–Ї ƒ„އŠ‹–•–Ї‘—–‡”™ƒŽŽ•‘ˆ–Ї™‹”‡ƒ–
a similar angle, which helps in moving the light wave forward. The outer surface of the glass
™‹”‡’”‘˜‹†‡•Œ—•––Ї”‹‰Š–ƒ‰Ž‡”‡ϐއ –‹‘–‘‡‡’–ЇŽ‹‰Š–„‘— ‹‰„ƒ ƒ†ˆ‘”–ŠƒŽ‘‰–Ї
އ‰–Š‘ˆ ƒ„އǤЇŽ‹‰Š–•‘—” ‡—•‡†‹–Š‹•’”‘ ‡••‹•Ž‹‰Š–‡‹––‹‰†‹‘†‡ȋȌǤ
’–‹ ƒŽϐ‹„”‡•ƒ›„‡•‹‰Ž‡‘†‡‘”—Ž–‹‘†‡Ǥ‹‰Ž‡‘†‡‘’–‹ ϐ‹„”‡–”ƒ•‹–•‘Ž›•‹‰Ž‡
Ž‹‰Š–™‹†–Š„—–—Ž–‹‘†‡ϐ‹„”‡—•‡•—Ž–‹’އŽ‹‰Š–’ƒ–Š•Ǥ

Jacket

Cladding

Buffer
ff
Coating Core

Fig. 8.28: Fibre Optic Cable

Advantages of Fibre Optic


(a) Fibre optic typically offers better bandwidth and can carry more information at once.
(b) As the signal travels in the form of light, there is less attenuation and signal degradation.
ȋ Ȍ ’–‹ ƒŽϐ‹„”‡™‹”‡•ƒ”‡ƒ†‡‘ˆ‰Žƒ••ǡ•‘–Ї”‡‹•Ž‹––އ”‹•‘ˆϐ‹”‡„‡ ƒ—•‡‘ˆƒ„•‡ ‡‘ˆ•’ƒ”
hazards.
(d) Fibre optic cables are much thinner and lighter than metal wires.
ȋ‡Ȍ ‹‰Š–‡”™‡‹‰Š–ƒ‡•ϐ‹„”‡‡ƒ•‹‡”–‘‹•–ƒŽŽǤ
(f) It does not leak signals, so it is immune to eavesdropping.
ȋ‰Ȍ •‹‰ƒŽ ƒ”—ˆ‘”ͷͲ™‹–Š‘—–”‡“—‹”‹‰”‡‰‡‡”ƒ–‹‘Ǥ
(h) Fibre optic cables are also used in research and development.

Disadvantages of Fibre Optic


ȋƒȌ Š‹‰ŠŽ›•‹ŽŽ‡†Žƒ„‘—”‹•”‡“—‹”‡†ˆ‘”‹–•‹•–ƒŽŽƒ–‹‘ƒ†ƒ‹–‡ƒ ‡Ǥ
Computer Networks

ȋ„Ȍ –‹•”‡Žƒ–‹˜‡Ž›‡š’‡•‹˜‡ƒ• ‘’ƒ”‡†–‘‘–Ї”‰—‹†‡†‡†‹ƒǤ


ȋ Ȍ •ϐ‹„”‡‘’–‹ ‹•ƒ†‡‘ˆ‰Žƒ••ǡ‹– ƒ„‡‡ƒ•‹Ž›„”‘‡Ǥ
ȋ†Ȍ • Ž‹‰Š– –”ƒ˜‡Ž• ‹ ƒ •–”ƒ‹‰Š– Ž‹‡ǡ –™‘ ϐ‹„”‡• ƒ”‡ ‡‡†‡† ‹ˆ ™‡ ‡‡† „‹†‹”‡ –‹‘ƒŽ
communication.
8.25
8.12.2 Unguided Media or Wireless Networking Technologies
Features of Unguided Media:
 ͳǤ ”ƒ•‹••‹‘ƒ†”‡ ‡’–‹‘ƒ”‡ƒ Š‹‡˜‡†„›‡ƒ•‘ˆƒƒ–‡ƒǤ
2. Transmission can be either directional or omnidirectional.
(a) Directional
  Ȉԙ–”ƒ•‹––‹‰ƒ–‡ƒ’—–•‘—–ˆ‘ —•‡†„‡ƒ
  Ȉԙ–”ƒ•‹––‡”ƒ†”‡ ‡‹˜‡”—•–„‡ƒŽ‹‰‡†
(b) Omnidirectional
  Ȉԙ•‹‰ƒŽ•’”‡ƒ†•‘—–‹ƒŽŽ†‹”‡ –‹‘•
  Ȉԙ ƒ„‡”‡ ‡‹˜‡†„›ƒ›ƒ–‡ƒ•

1. Microwave
Microwave signals are used to transmit data without the use of cable. It is a line-of-sight
transmission as signal travels in a straight line. In microwave communication, two directional
parabolic antennas are mounted on towers, buildings or hills to send and receive signals
through air. However, they must be properly aligned with each other, otherwise the signal will
not be focused well at the receiving antenna.
Secondary
Path
Direct Path

Fig. 8.29: Microwave

Advantages of Microwave Transmission


Supplement – Computer Science with Python–XII

(a) It is a cheaper source of communication as it avoids using cables and maintaining repeaters.
ȋ „Ȍ ‘—‹ ƒ–‹‘–Š”‘—‰Š‹ ”‘™ƒ˜‡‹•— Їƒ•‹‡”‘˜‡”†‹ˆϐ‹ —Ž––‡””ƒ‹Ǥ
ȋ Ȍ ‹ ”‘™ƒ˜‡•›•–‡’‡”‹–•†ƒ–ƒ–”ƒ•‹••‹‘”ƒ–‡‘ˆƒ„‘—–ͳ͸‰‹‰ƒ„‹–•’‡”•‡ ‘†Ǥ

Disadvantages of Microwave Transmission


(a) It is an insecure mode of communication.
(b) Signals can be split and propagated in different directions in air and received by the
receiver antenna with a reduced strength.
(c) Microwave propagation is affected by weather conditions such as rain, thunderstorm, etc.
(d) The cost of implementing towers, antennas is relatively high.

8.26
2. Radio Waves Radio
Tower
ƒ†‹‘ ™ƒ˜‡• —•‡ ”ƒ†‹‘ ˆ”‡“—‡ ‹‡• ™Š‹ Š
are allocated to private businesses for direct
voice communication. A radio set-up uses
transmitter and receiver. A transmitter sends
radio waves and encodes them into sine
waves which, when received by a receiver, are
decoded and the message is received. Both
the transmitter and receiver use antennas
to radiate and fetch radio signals. They are
Sender Receiver
not line-of-sight transmission and, hence, can
penetrate buildings easily.

Advantages of Radio Waves


(a) They can be used indoors or outdoors. Sender

(b) They are omnidirectional and can travel Fig. 8.30: Radio Waves
in any direction.
(c) Transmitter and receiver antenna do not need to be physically aligned.
(d) Radio wave transmission offers mobility.
ȋ‡Ȍ –‹• Їƒ’‡”–ŠƒŽƒ›‹‰ ƒ„އ•ƒ†ϐ‹„”‡•Ǥ
ȋˆȌ –‘ˆˆ‡”•‡ƒ•‡‘ˆ ‘—‹ ƒ–‹‘‘˜‡”†‹ˆϐ‹ —Ž––‡””ƒ‹Ǥ

Disadvantages of Radio Waves


(a) Radio wave communication is an insecure mode of communication.
(b) Radio wave propagation is susceptible to weather effects like rain, thunderstorm, etc.

3. Satellite Link
Satellite transmission is also a kind of line-of-sight
transmission that is used to transmit signals
–Š”‘—‰Š‘—– –Ї ™‘”ކǤ Ї –Ї ˆ”‡“—‡ › ‹•
‰”‡ƒ–‡” –Šƒ ͵ œǡ –Ї –”ƒ•‹••‹‘ ‹• ‘™ ƒ• Receiving
Transmitting signal
microwave. Satellite is a special type of microwave signal 35000 km
transmission medium.
Up-link Down-link
It provides various types of services such as
–”ƒ•‹––‹‰ˆƒšǡ˜‘‹ ‡†ƒ–ƒǡ˜‹†‡‘ǡ‡ƒ‹Žƒ†‘–Ї”
Transmitting Receiving
internet applications. In satellite communication, Antenna Antenna
an earth station has a satellite dish, which functions
as an antenna to transmit and receive data from
Fig. 8.31: Satellite Link
satellites.
Computer Networks

When data is transmitted from an earth station to a satellite, it is known as uplink and when
transmission takes place from a satellite to an earth station, it is known as downlink. In satellite,
there are transponders that send and receive signals from/to the earth station.

8.27
Advantages of Satellite Link
ȋƒȌ Їƒ”‡ƒ ‘˜‡”‡†‹•“—‹–‡Žƒ”‰‡Ǥ
(b) No line-of-sight restrictions such as natural mountains, tall buildings, towers, etc.
ȋ Ȍ ƒ”–Š•–ƒ–‹‘™Š‹ Š”‡ ‡‹˜‡•–Ї•‹‰ƒŽ• ƒ„‡ƒ–ƒϐ‹š‡†’‘•‹–‹‘‘” ƒ„‡”‡Žƒ–‹˜‡Ž›‘„‹Ž‡Ǥ

Disadvantages of Satellite Link


ȋƒȌ –‹•˜‡”›‡š’‡•‹˜‡ƒ• ‘’ƒ”‡†–‘‘–Ї”–”ƒ•‹••‹‘‡†‹—•Ǥ
ȋ „Ȍ •–ƒŽŽƒ–‹‘‹•‡š–”‡‡Ž› ‘’އšǤ
ȋ Ȍ ‹‰ƒŽ••‡––‘–Ї•–ƒ–‹‘• ƒ„‡‹–‡””—’–‡†„›‡š–‡”ƒŽ‹–‡”ˆ‡”‡ ‡Ǥ
(d) Low antenna gains result in overcrowding of available bandwidth.

4. Infrared
The type of transmission that uses infrared light to send data is known as infrared transmission.
The data is transmitted through air and can propagate in the open space; however, it cannot
’‡‡–”ƒ–‡ –Ї ™ƒŽŽ• ‘ˆ –Ї ”‘‘Ǥ – ‹• ƒ ‡šƒ’އ ‘ˆ •Š‘”– ”ƒ‰‡ ™‹”‡Ž‡•• ‡–™‘”Ǥ ˆ”ƒ”‡†
•’‡‡† ˜ƒ”‹‡• ˆ”‘ ʹǤͶ „’• –‘ ͳ͸ „’•Ǥ  ˜‡”› ‰‘‘† ‡šƒ’އ ‘ˆ ‹ˆ”ƒ”‡† –”ƒ•‹••‹‘ ‹• ƒ
handheld remote control such as remote control of a TV or AC, etc.

Housing Shield

Transmitter Transmitter
Receiver Receiver
Supplement – Computer Science with Python–XII

Lens

Fig. 8.32: Infrared Transmission System

Advantages of Infrared Transmission


(a) It is a secure medium of transmitting data.
(b) It is a cheap mode of transmission.

Disadvantages of Infrared Transmission


(a) It can work only for short distances.
(b) It cannot penetrate walls and is affected by distance, noise and heat.

8.28
5. Wireless Technology
Wireless technology is the process of sending information through invisible waves in the
ƒ‹”Ǥ ˆ‘”ƒ–‹‘ •— Š ƒ• †ƒ–ƒǡ ˜‘‹ ‡ ƒ† ˜‹†‡‘ ƒ”‡ ƒ””‹‡† –Š”‘—‰Š –Ї ”ƒ†‹‘ ˆ”‡“—‡ › ‘ˆ
the electromagnetic spectrum. Thus, wireless communication is the transfer of information
between two or more points that are not connected by an electrical conductor. The various
wireless technologies available are described as follows:
(a) Wi-Fi (Wireless Fidelity): ‹Ǧ ‹ ‹• ™‹”‡Ž‡•• ϐ‹†‡Ž‹–› ™Š‡”‡ ‘—‹ ƒ–‹‘ –ƒ‡• ’Žƒ ‡
without wires. The users share the data with each other by connecting to the broadband
internet service without using cables. As it is not a secured media of transmitting data, the
user must use privacy methods such as using passwords and make the connection security
enabled so that it does not become susceptible to hackers. For transmission of data through
Wi-Fi, a user must have a broadband connection, a wireless router and a laptop or desktop.
(b) Wi-Max (Worldwide Interoperability for Microwave Access): ‹Ǧƒš ‹• ƒ ™‹”‡Ž‡••
‘—‹ ƒ–‹‘•›•–‡–Šƒ–’”‘˜‹†‡•„”‘ƒ†„ƒ†‹–‡”‡–ƒ ‡••‹„‹Ž‹–›—’–‘͵Ͳ‹Ž‡•ǤЇ
†ƒ–ƒ–”ƒ•‹••‹‘–ƒ‡•’Žƒ ‡™‹–Š‘—–™‹”‡•Ǥ –’”‘˜‹†‡•†ƒ–ƒ”ƒ–‡•—’–‘͵Ͳ–‘ͶͲ‡‰ƒ„‹–Ǧ
’‡”Ǧ•‡ ‘† ƒ† —’ –‘ ͳ „‹–Ȁ• ˆ‘” ϐ‹š‡† •–ƒ–‹‘•Ǥ ‹Ǧƒš ‹• „ƒ•‡† ‘ •–ƒ†ƒ”† 
ͺͲʹǤͳ͸–‡ А‘Ž‘‰›–Šƒ–’”‘˜‹†‡•—•‡”•™‹–Šƒ ‡••–‘Š‹‰ŠǦ•’‡‡†˜‘‹ ‡ǡ†ƒ–ƒƒ†‹–‡”‡–
‘‡ –‹˜‹–›Ǥ‹Ǧƒš—•‡•„”‘ƒ†„ƒ†‹–‡”‡– ‘‡ –‹‘ƒ†”‡“—‹”‡•ƒ–‘™‡”‘™ƒ•
base station to communicate with the user. Instead of wires, it uses a microwave link to
establish a connection. Internet connectivity to end-user is provided by a microwave link
between the tower and the end-user.

6. Other Unguided/Wireless Media


 –Š‹• •‡ –‹‘ǡ ™‡ ™‹ŽŽ †‹• —•• –™‘ ‘–Ї” ‹’‘”–ƒ– ƒ† ‡š–‡•‹˜‡Ž› —•‡† ™‹”‡Ž‡•• ‡†‹ƒȄ
laser waves and Bluetooth.
(a) Laser Technology:ƒ•‡””‡ˆ‡”•–‘ƒ–”ƒ•‹••‹‘‡†‹—–Šƒ–”‡“—‹”‡•†‹”‡ –Ž‹‡‘ˆ•‹‰Š–Ǥ
It provides point-to-point transmission between points located at short distances, such as
„—‹Ž†‹‰•Ǥ‹‹Žƒ”–‘‹ ”‘™ƒ˜‡ǡƒŽƒ•‡”‹•—‹†‹”‡ –‹‘ƒŽ„—–— Šˆƒ•–‡”Ǥƒ•‡”•”‡“—‹”‡
transmitters and photosensitive receivers for transmission. A disadvantage associated
with laser transmission is that it is badly affected by weather conditions.
(b) Bluetooth Technology: Bluetooth refers to a
–‡Ž‡ ‘—‹ ƒ–‹‘‹†—•–”›•’‡ ‹ϐ‹ ƒ–‹‘–Šƒ–
†‡ϐ‹‡•Š‘™†‹ˆˆ‡”‡–†‡˜‹ ‡• ƒ„‡ ‘‡ –‡†
virtually and transfer information among each
other. Bluetooth technology is commonly used
in various portable devices such as laptops
ƒ† • –‘ ‡•–ƒ„Ž‹•Š ƒ ™‹”‡Ž‡•• ‘‡ –‹‘ 10 Metres 10 Metres
in the form of Wireless LAN (WLAN).
Transmission of information using Bluetooth
”‡“—‹”‡• ƒ Ž‘™Ǧ ‘•– –”ƒ• ‡‹˜‡” Š‹’ ‹ ‡ƒ Š
Computer Networks

of the devices that need to be connected. Data


Fig. 8.33: Bluetooth Communication
‹• –”ƒ•ˆ‡””‡† ƒ– –Ї ˆ”‡“—‡ › ‘ˆ ʹǤͶͷ œǡ
™Š‹ Š‹•ƒ˜ƒ‹Žƒ„އ‰Ž‘„ƒŽŽ›ǤЇ”ƒ–‡‘ˆ†ƒ–ƒ–”ƒ•ˆ‡”‹–Š‹•–›’‡‘ˆ–”ƒ•‹••‹‘‹•ͳ„’•Ǥ
ƒ І‡˜‹ ‡Šƒ•ƒͶͺǦ„‹–ƒ††”‡••ƒ•’‡”–Ї ͺͲʹ•–ƒ†ƒ”†ǤЇ ‘‡ –‹‘„‡–™‡‡
–Ї†‡˜‹ ‡• ƒ„‡‡‹–Ї”’‘‹–Ǧ–‘Ǧ’‘‹–‘”—Ž–‹’‘‹–ǤŽ—‡–‘‘–Š‹•‡“—‹’’‡†™‹–Š˜ƒ”‹‘—•
ˆ‡ƒ–—”‡••— Šƒ•‡ ”›’–‹‘ƒ†˜‡”‹ϐ‹ ƒ–‹‘–‘’”‘˜‹†‡•‡ —”‹–›Ǥ
8.29
8.13 NETWORK TERMINOLOGIES
 ͳǤ Data Channel: A channel is a communication medium through which data or message is
transferred from the sender to the receiver.
2. Baud: The number of changes in a signal per second is called a baud. It is the unit of
measurement for the information-carrying capacity of a communication channel.
 ͵Ǥ Bits per second: It is the measuring unit of speed at which data transfer takes place.
4. Bandwidth: The bandwidth measures the information-carrying capacity of a line or a
‡–™‘”Ǥ – ‹• –Ї †‹ˆˆ‡”‡ ‡ „‡–™‡‡ –Ї Š‹‰Š‡•– ƒ† Ž‘™‡•– ˆ”‡“—‡ ‹‡• ƒŽŽ‘™‡† ‘ ƒ
transmission media.
αϐŠȂϐŽ
  ™Š‡”‡ϐŠƒ†ϐŽƒ”‡–ЇŠ‹‰Š‡•–ƒ†Ž‘™‡•–ˆ”‡“—‡ ‹‡•Ǥ
For exampleǡ ˆ–ЇŠ‹‰Š‡•–ˆ”‡“—‡ ›‹•ͺͲ œƒ†Ž‘™‡•–ˆ”‡“—‡ ›‹•ͷͲ œǡ™Šƒ–‹•–Ї
bandwidth of a signal?
Sol.ԘαϐŠȂϐŽ
   ԙαͺͲȂͷͲ
   ԙα͵Ͳ œǤ
5. Protocol: A protocol is an agreement between the communicating parties on how
‘—‹ ƒ–‹‘ ‹• –‘ ’”‘ ‡‡†Ǥ ”‘–‘ ‘Ž ‡ƒ• ƒ •‡– ‘ˆ ”—އ• –Šƒ– ‰‘˜‡”• ƒ ‡–™‘”Ǥ
A protocol is a formal description of message formats and the rules that two or more
ƒ Š‹‡•—•–ˆ‘ŽŽ‘™–‘‡š Šƒ‰‡–Š‘•‡‡••ƒ‰‡•Ǥ
For example, using library books.

CTM: Protocol is a set of rules that governs the network.

Types of Protocols
  ”‘–‘ ‘Ž•’‡ ‹ϐ‹‡•™Šƒ–‹• ‘—‹ ƒ–‡†ƒ†Š‘™Ǥ‡–—•–ƒ‡ƒ‡šƒ’އ–‘‡š’Žƒ‹–Š‹•
concept. In India, different people speak different languages. Now, a person from Tamil
ƒ†—ƒ†ƒ’‡”•‘ˆ”‘—Œƒ„ƒ›‘–„‡ƒ„އ–‘ ‘—‹ ƒ–‡™‹–Їƒ Š‘–Ї”„‡ ƒ—•‡
‘ˆ–ЇŽƒ‰—ƒ‰‡†‹ˆˆ‡”‡ ‡Ǥ ‘™‡˜‡”ǡ–Ї› ƒ‡š Šƒ‰‡–Ї‹”‹†‡ƒ•ƒ† ‘—‹ ƒ–‡™‹–Š
Supplement – Computer Science with Python–XII

‡ƒ Š‘–Ї”—•‹‰‰Ž‹•Šƒ•–Ї‹” ‘‘Žƒ‰—ƒ‰‡Ǥ‹‹Žƒ”Ž›ǡ‹ ƒ•‡‘ˆ ‘’—–‡”•ǡ–Ї


Šƒ”†™ƒ”‡ǡ•‘ˆ–™ƒ”‡‘”‡˜‡ƒ ‘„‹ƒ–‹‘‘ˆ–Ї–™‘‹‰Š–„‡”‡“—‹”‡†–‘‹’އ‡–ƒ†
carry out the protocol. Thus, the protocol will help in setting up a channel of communication
or a connection between two computers; in other words, a hardware connection between
two computers.
  Ї”‡ƒ”‡—Ž–‹’އ’”‘–‘ ‘Ž•†‡ϐ‹‡†ˆ‘” ‘’—–‡”‡–™‘”•ǡ™Š‹ Šƒ”‡ƒ•ˆ‘ŽŽ‘™•ǣ
 ȋƒȌ ȋ”ƒ•‹••‹‘‘–”‘Ž”‘–‘ ‘ŽȌ
 ȋ„Ȍ ȋ –‡”‡–”‘–‘ ‘ŽȌ
 ȋ Ȍ ȋ ‹Ž‡”ƒ•ˆ‡””‘–‘ ‘ŽȌ
 ȋ†Ȍ ȋ‘‹–Ǧ–‘Ǧ‘‹–”‘–‘ ‘ŽȌ
 ȋ‡Ȍ ȋ‹’އƒ‹Ž”ƒ•ˆ‡””‘–‘ ‘ŽȌ
 ȋˆȌ ͵ȋ‘•–ˆϐ‹ ‡”‘–‘ ‘ŽȌ
 ȋ‰Ȍ ȋ‡‘–‡‘‰‹Ȍ
8.30
(a) TCP/IP (Transmission Control Protocol/Internet Protocol)
  ‹•‘‡‘ˆ–Їƒ‹’”‘–‘ ‘Ž•‹Ȁ ‡–™‘”•ǤЇ ’”‘–‘ ‘ކ‡ƒŽ•‘Ž›™‹–Š
’ƒ ‡–•„—–‡ƒ„އ•–™‘Š‘•–•–‘‡•–ƒ„Ž‹•Šƒ ‘‡ –‹‘ƒ†‡š Šƒ‰‡•–”‡ƒ•
‘ˆ †ƒ–ƒǤ  ™‘”• ™‹–Š –Ї –‡”‡– ”‘–‘ ‘Ž ȋ Ȍǡ ™Š‹ Š †‡ϐ‹‡• Š‘™ ‘’—–‡”•
•‡† ’ƒ ‡–• ‘ˆ †ƒ–ƒ –‘ ‡ƒ Š ‘–Ї”Ǥ Ї ’ƒ ‡–• ƒ”‡ †‡Ž‹˜‡”‡† ‘– ‹ ƒ •‡“—‡–‹ƒŽ
‘”†‡”Ǣ ‹•–‡ƒ†ǡ –Ї› ƒ”‡ †‡Ž‹˜‡”‡† ”ƒ†‘Ž›Ǥ ‘™ǡ  ƒ– –Ї ”‡ ‡‹˜‡” •‹†‡ ‘ŽŽ‡ –•
ƒŽŽ’ƒ ‡–•ƒ†ƒ””ƒ‰‡•–Ї‹ƒ•‡“—‡–‹ƒŽ‘”†‡”Ǥ‹•ƒ”‡Ž‹ƒ„އ•–”‡ƒ†‡Ž‹˜‡”›
service that guarantees that all bytes received will be identical with bytes sent and
in the correct order. Since packets are transferred over many networks and, thus,
‘–”‡Ž‹ƒ„އǡƒ–‡ А‹“—‡‘™ƒ•’‘•‹–‹˜‡ƒ ‘™Ž‡†‰‡‡–™‹–Š”‡–”ƒ•‹••‹‘
is used to guarantee reliability of packet transfers.
(b) IP (Internet Protocol)
  ‹•–Ї’”‹ƒ”›’”‘–‘ ‘Ž’”‡•‡–‹–Ї‹–‡”‡–Žƒ›‡”‘ˆ–Ї‹–‡”‡–’”‘–‘ ‘Ž•—‹–‡Ǥ
It is responsible for delivering packets from the source host to the destination host
„ƒ•‡†‘–Ї ƒ††”‡••‡•‡–‹‘‡†‹–Ї’ƒ ‡–Їƒ†‡”•Ǥ ˆ‘”™ƒ”†•‡ƒ Š’ƒ ‡–
„ƒ•‡† ‘ ƒ ˆ‘—” „›–‡ †‡•–‹ƒ–‹‘ ƒ††”‡•• ȋ–Ї  —„‡”ȌǤ Ї ’ƒ ‡–• ƒ”‡ ‘˜‡†
”ƒ†‘Ž› ˆ”‘ •‘—” ‡ –‘ †‡•–‹ƒ–‹‘ǡ ™Š‹ Š ƒ”‡ –Ї ƒ••‡„އ† ‹ ƒ •‡“—‡–‹ƒŽ
‘”†‡”ƒ––Ї†‡•–‹ƒ–‹‘ ‘’—–‡”Ǥ •–‘”‡•†‡•–‹ƒ–‹‘ƒ††”‡••‡•‹–Їˆ‘”‘ˆ 
addresses so that the packets will move to the destined address only by following
the shortest route.
(c) FTP (File Transfer Protocol)
  ‹•–Ї•‹’އ•–ƒ†‘•–•‡ —”‡™ƒ›–‘‡š Šƒ‰‡ϐ‹Ž‡•‘˜‡”–Ї‹–‡”‡–ǤЇƒ‹
‘„Œ‡ –‹˜‡•‘ˆ ƒ”‡ǣ
  ȈԘ”ƒ•‹––‹‰ƒ†•Šƒ”‹‰‘ˆϐ‹Ž‡•ȋ ‘’—–‡”’”‘‰”ƒ•ƒ†Ȁ‘”†ƒ–ƒȌǤ
  ȈԘ †‹”‡ –‘”‹’Ž‹ ‹–—•‡‘ˆ”‡‘–‡ ‘’—–‡”•Ǥ
  ȈԘ‘•Š‹‡Ž†ƒ—•‡”ˆ”‘˜ƒ”‹ƒ–‹‘•‹ϐ‹Ž‡•–‘”ƒ‰‡•›•–‡•ƒ‘‰†‹ˆˆ‡”‡–Š‘•–•Ǥ
  ȈԘ‘–”ƒ•ˆ‡”†ƒ–ƒ”‡Ž‹ƒ„Ž›ƒ†‡ˆϐ‹ ‹‡–Ž›Ǥ
  ȈԘ —•‡•–Ї‹–‡”‡–ǯ•Ȁ ’”‘–‘ ‘Ž•–‘‡ƒ„އ†ƒ–ƒ–”ƒ•ˆ‡”Ǥ
  ‹•‘•– ‘‘Ž›—•‡†–‘†‘™Ž‘ƒ†ƒϐ‹Ž‡ˆ”‘ƒ•‡”˜‡”—•‹‰–Ї‹–‡”‡–‘”–‘
—’Ž‘ƒ†ƒϐ‹Ž‡–‘ƒ•‡”˜‡”ȋe.g.ǡ—’Ž‘ƒ†‹‰ƒ™‡„’ƒ‰‡ϐ‹Ž‡–‘ƒ•‡”˜‡”ȌǤ
  Ћއ•Šƒ”‹‰ϐ‹Ž‡•ˆ”‘‘‡•›•–‡–‘ƒ‘–Ї”ǡ™‡ƒ›‡ ‘—–‡”•‡˜‡”ƒŽ’”‘„އ•Ȅ
two systems may have different directory structures, two systems may have different
ϐ‹Ž‡Ǧƒ‹‰ ‘˜‡–‹‘•ǡ‘”–™‘•›•–‡•ƒ›Šƒ˜‡†‹ˆˆ‡”‡–™ƒ›•–‘”‡’”‡•‡––‡š–
ƒ††ƒ–ƒǤŽŽ–Ї•‡’”‘„އ•ƒ”‡•‘Ž˜‡†„› Ǥ

CTM: File transfer protocol is used to transfer files from server system to requesting node, primarily for
information sharing.
Computer Networks

(d) PPP (Point-to-Point Protocol)


  ‹•–Ї‘•– ‘‘Ž›—•‡††ƒ–ƒŽ‹’”‘–‘ ‘ŽǤ –‹•ƒ’”‘–‘ ‘Ž—•‡†–‘‡•–ƒ„Ž‹•Š
a direct connection between two nodes. It can provide connection authentication,
–”ƒ•‹••‹‘‡ ”›’–‹‘ƒ† ‘’”‡••‹‘Ǥ –‹•—•‡†–‘ ‘‡ ––Ї ‘‡–‘–Ї
8.31
•‡”˜‡” ‘ˆ Ǥ Ї ‘—‹ ƒ–‹‘ –ƒ‡• ’Žƒ ‡ –Š”‘—‰Š Š‹‰Š •’‡‡† ‘†‡Ǥ  ‹•
used to connect telephone dial-up lines to the internet. Internet service provider
ƒ› ’”‘˜‹†‡ ›‘— ™‹–Š ƒ  ‘‡ –‹‘ •‘ –Šƒ– ™Š‡ ›‘— •‡† ƒ› ”‡“—‡•–ǡ –Ї
’”‘˜‹†‡”ǯ• •‡”˜‡” ƒ ”‡•’‘† –‘ ›‘—” ”‡“—‡•–•ǡ ˆ‘”™ƒ”† ‹– –‘ –Ї ‹–‡”‡– •‡”˜‡”ǡ
ƒ†–Їˆ‘”™ƒ”†”‡•’‘•‡•„ƒ –‘›‘—Ǥ ‘” ‘—‹ ƒ–‹‰–Š”‘—‰Šǡ–Ї—•‡”
‡‡†•–‘‹•–ƒŽŽ†”‹˜‡”•ƒ••‹‰‡†„›–Ї‹–‡”‡––‘–Ї ‘’—–‡”Ǥ
  Їˆ‘ŽŽ‘™‹‰•–‡’•ƒ”‡”‡“—‹”‡†–‘ ‘‡ ––‘–Ї‹–‡”‡–ǣ
  ȈԘ‘—„އ Ž‹ ‘–Ї†‹ƒŽǦ—’‹ ‘Ǥ
  ȈԘ‹ƒŽ–Ї—„‡”’”‘˜‹†‡†–‘›‘—„›–Ї Ǥ
  ȈԘ–‡”–ЇŽ‘‰‹ƒ†’ƒ••™‘”†Ǥ
  ȈԘ’‡ƒ„”‘™•‡”Ž‹‡ –‡”‡–š’Ž‘”‡”‘”‡–• ƒ’‡ƒ˜‹‰ƒ–‘”Ǥ
  Ї˜ƒ”‹‘—•ˆ‡ƒ–—”‡•‘ˆƒ”‡ǣ
  ȈԘ•–ƒ„Ž‹•Š‹‰–ЇŽ‹„‡–™‡‡–™‘†‡˜‹ ‡•Ǥ
  ȈԘƒ‹–ƒ‹‹‰–Š‹•‡•–ƒ„Ž‹•Ї†Ž‹Ǥ
  ȈԘ‘ϐ‹‰—”‹‰–Š‹•Ž‹Ǥ
  ȈԘ‡”‹ƒ–‹‰–Š‹•Ž‹ƒˆ–‡”–Ї–”ƒ•ˆ‡”Ǥ
  ȈԘ’”‘˜‹†‡•‡””‘”†‡–‡ –‹‘Ǥ
  ȈԘ•—’’‘”–•—Ž–‹’އ’”‘–‘ ‘Ž•Ǥ
  ȈԘ –ƒŽ•‘†‡ϐ‹‡•Š‘™–™‘†‡˜‹ ‡• ƒƒ—–Ї–‹ ƒ–‡‡ƒ Š‘–Ї”Ǥ
(e) SMTP (Simple Mail Transfer Protocol)
  •–Їƒ‡•—‰‰‡•–•ǡ‹•—•‡†ˆ‘”•‡†‹‰‡ƒ‹Ž‡••ƒ‰‡•–‘‘–Ї”‡–™‘”•
‘” ‘’—–‡”•Ǥ –Šƒ†Ž‡•‘Ž›‘—–‰‘‹‰‡••ƒ‰‡•ƒ†‘–‹ ‘‹‰‡••ƒ‰‡•Ǥ
does not create messages; rather, it helps in forwarding messages between client
•‡”˜‡”•Ǥ –—•‡•–‘•‡†‡••ƒ‰‡•–‘ƒ‘–Ї”Š‘•–Ǥ ‘””‡ ‡‹˜‹‰‡••ƒ‰‡•ǡƒ‘–Ї”
’”‘–‘ ‘Žȋ’‘•–‘ˆϐ‹ ‡’”‘–‘ ‘ŽȌ‹•—•‡†ǤŠ—•ǡ‡ƒ‹Ž Ž‹‡–•”‡“—‹”‡ƒ††”‡••‡•‘ˆ
„‘–Š  •‡”˜‡” ƒ† ƒ‘–Ї” •‡”˜‡” –Šƒ– ’”‘ ‡••‡• ‹ ‘‹‰ ‡••ƒ‰‡• ȋ—•—ƒŽŽ›
‘” ȌǤ—•‡•’‘”–—„‡”ʹͷˆ‘”•–ƒ†ƒ”† ‘—‹ ƒ–‹‘Ǥ
(f) ͵ȋ‘•–ˆϐ‹ ‡”‘–‘ ‘Ž͵Ȍ
Supplement – Computer Science with Python–XII

  Їȋ‘•–ˆϐ‹ ‡”‘–‘ ‘Ž͵Ȍ‹•ƒ•‹’އƒ†•–ƒ†ƒ”†‡–Š‘†–‘ƒ ‡••ƒ‹Ž„‘š


and download messages to the local computers. The user can receive messages with
–ЇЇޒ‘ˆ’”‘–‘ ‘ŽǤЇƒ†˜ƒ–ƒ‰‡‹•–Šƒ–‘ ‡–Ї‡••ƒ‰‡•ƒ”‡†‘™Ž‘ƒ†‡†ǡ
an internet connection is no longer needed to read the mail. A user can read all
‡ƒ‹Ž•‘ˆϐŽ‹‡ƒ•–Ї•‡ƒ”‡•ƒ˜‡†‘–Ї ‘’—–‡”ǯ•Šƒ”††‹•Ǥ
  —•– Ž‹‡ ™‹–Š –Ї  ’”‘–‘ ‘Žǡ –Ї  ’”‘–‘ ‘Ž ȋʹ ƒ† ͵Ȍ •‡†• –‡š–
‘ƒ†•–‘–Ї•‡”˜‡”ǤЇ”‡ƒ”‡–™‘ƒ‹˜‡”•‹‘•‘ˆ–Š‹•’”‘–‘ ‘ŽȄʹ
ƒ†͵Ȅ–‘™Š‹ Š’‘”–•ͳͲͻƒ†ͳͳͲ”‡•’‡ –‹˜‡Ž›ƒ”‡ƒŽŽ‘ ƒ–‡†ƒ†™Š‹ Š‘’‡”ƒ–‡
—•‹‰”ƒ†‹ ƒŽŽ›†‹ˆˆ‡”‡––‡š– ‘ƒ†•Ǥ‘‰‡–ƒƒ‹Žˆ”‘•‡”˜‡”ǡƒ—•‡”—•–
‡–‡” ƒ ˜ƒŽ‹† —•‡”ƒ‡ ƒ† ’ƒ••™‘”† ˆ‘” –Ї‹” ‡ƒ‹Ž ƒ ‘—–Ǥ Ї ͵ ’”‘–‘ ‘Ž
thus manages authentication using the user name and password; however, it is not
•‡ —”‡„‡ ƒ—•‡–Ї’ƒ••™‘”†•ǡŽ‹‡–Ї‡ƒ‹Žǡ ‹” —Žƒ–‡‹’Žƒ‹–‡š–‘˜‡”–Ї‡–™‘”Ǥ
͵’”‘–‘ ‘ބޑ •‹„‘š†—”‹‰‹–•ƒ ‡••™Š‹ Š‡ƒ•–Šƒ–•‹—Ž–ƒ‡‘—•ƒ ‡••
–‘–Ї•ƒ‡‹„‘š„›–™‘—•‡”•‹•‹’‘••‹„އǤ
8.32
(g) TELNET (Remote Login)
Telnet is a remote login that helps a user to log on to another user’s terminal without
being its original user. A user who is logging in to their own system can also get
access to log on to another user system and perform various functions such as
ƒ ‡••‹‰ϐ‹Ž‡•‘”•Šƒ”‹‰ϐ‹Ž‡•–‘Ȁˆ”‘–Ї”‡‘–‡•›•–‡Ǥ‹–Šǡƒ—•‡”Ž‘‰•
in as a regular user with whatever privileges that may have been granted to the
•’‡ ‹ϐ‹ ƒ’’Ž‹ ƒ–‹‘ƒ††ƒ–ƒ‘–Šƒ– ‘’—–‡”Ǥ
Working of Telnet
 ȋ‹Ȍ  —•‡” ‹• Ž‘‰‰‡† ‹ –‘ –Ї Ž‘ ƒŽ •›•–‡ ƒ† ‹˜‘‡• ƒ  ’”‘‰”ƒ ȋ–Ї
 Ž‹‡–Ȍ„›–›’‹‰telnet<host address> or telnet <IP address>
 ȋ‹‹Ȍ Ї Ž‹‡–‹••–ƒ”–‡†‘–ЇŽ‘ ƒŽƒ Š‹‡ȋ‹ˆ‹–‹•ǯ–ƒŽ”‡ƒ†›”—‹‰ȌǤ
Ї Ž‹‡– –Ї ‡•–ƒ„Ž‹•Ї• ƒ  ‘‡ –‹‘ ™‹–Š –Ї  •‡”˜‡” ‘ –Ї
destination system.
(iii) Once the connection has been established, the client program accepts characters
from the keyboard feed by the user and passes one character at a time, to the
•‡”˜‡”Ǥ
(iv) The server on the destination machine accepts the characters sent to it by the
client and passes them to a terminal server.
 ȋ˜Ȍ Ї–‡”‹ƒŽ•‡”˜‡”‰‹˜‡•‘—–’—–•„ƒ –‘–Ї•‡”˜‡”ƒ††‹•’Žƒ›•–Ї
on the user’s screen.
The user can terminate the telnet session by typing LOGOFF or LOGOUT on the
system prompt.

8.14 WIRELESS/MOBILE COMMUNICATION


8.14.1 GSM (Global System for Mobile Communication)
GSM stands for Global System for Mobile communication. It provides its subscribers with
roaming facility so that they can use their mobile phones all over the world to communicate with
each other. GSM provides digital signalling as well as digital call facility and is so considered as
ƒ•‡ ‘†‰‡‡”ƒ–‹‘ȋʹ Ȍ‘„‹Ž‡’Š‘‡•›•–‡Ǥ –’”‘˜‹†‡• ‘•—‡”•™‹–Š„‡––‡”˜‘‹ ‡“—ƒŽ‹–›
and low-cost alternatives to making calls such as short message service (SMS). It has an ability
–‘ ƒ””›͸Ͷ„’•–‘ͳʹͲ„’•‘ˆ†ƒ–ƒ”ƒ–‡•ǤЇ‡›ˆ‡ƒ–—”‡‘ˆ ‹•–Ї—„• ”‹„‡” †‡–‹–›
Module (SIM), generally known as SIM card. It is a detachable smart card that contains the
subscriber’s information along the phone book. This allows the user to use the phone book and
other information even after changing the handset.

CTM: GSM is a wireless communication medium that provides the user with roaming facility, good voice
quality, SMS, etc., through digital signals.

8.14.2 CDMA (Code Division Multiple Access)


Computer Networks

•–ƒ†•ˆ‘”‘†‡‹˜‹•‹‘—Ž–‹’އ ‡••Ǥ‹•ƒ‡šƒ’އ‘ˆ—Ž–‹’އƒ ‡••ǡ™Š‡”‡


several transmitters can send information simultaneously over a single communication channel.
It is a channel access method used by various radio communication technologies. It allows the
division of transmission medium into different channels so that transmission from different

8.33
stations is separated from each other. It employs spread spectrum digital technology where
–Ї†ƒ–ƒ‹•ˆ”ƒ‰‡–‡†‹–‘•ƒŽŽ Š—•‘˜‡”ƒ—„‡”‘ˆ†‹ˆˆ‡”‡–ˆ”‡“—‡ ‹‡•ƒ˜ƒ‹Žƒ„އˆ‘”
—•‡Ǥ ƒŽ‘‰ –‘ †‹‰‹–ƒŽ ‘˜‡”•‹‘ –ƒ‡• ’Žƒ ‡ ™Š‡”‡ ƒ—†‹‘ ‹’—– ‹• ϐ‹”•– †‹‰‹–‹œ‡† ‹–‘ „‹ƒ”›
‡Ž‡‡–•ǤЇ•›•–‡™‘”•†‹”‡ –Ž›‘͸Ͷ„‹–Ȁ•‡ †‹‰‹–ƒŽ•‹‰ƒŽ•Ǥ

CTM: CDMA is a digital cellular technology that uses spread spectrum technique where the entire
bandwidth is divided among several users for transmission of data.

8.14.3 GPRS (General Packet Radio Services)


‘” ‡‡”ƒŽƒ ‡–ƒ†‹‘‡”˜‹ ‡•’”‘˜‹†‡•˜ƒ”‹‘—•ˆ‡ƒ–—”‡•‘˜‡”ʹ ’Š‘‡•™‹–Š”‡•’‡ –
to high speed data transfer. A user can send and receive data at the same time and thus uses the
•ƒ‡„ƒ†™‹†–Šˆ‘”„‘–Š’—”’‘•‡•Ǥ•‹‰ –‡ А‘Ž‘‰›ǡƒ—•‡” ƒƒ‡ƒ ƒŽŽƒ†ƒ––Ї
•ƒ‡–‹‡”‡ ‡‹˜‡ƒ‡••ƒ‰‡™‹–Š‘—–†‹• ‘‡ –‹‰–Ї ƒŽŽǤ ‘™‡˜‡”ǡ —•ƒ‰‡‹• Šƒ”‰‡†
ˆ‘”–Їƒ‘—–‘ˆ†ƒ–ƒ•‡–‘””‡ ‡‹˜‡†Ǥ  ƒ’”‘˜‹†‡†ƒ–ƒ”ƒ–‡•—’–‘͵ʹ„’•–‘Ͷͺ„’•Ǥ
‹–Š–Š‹•†ƒ–ƒ”ƒ–‡ǡ‡ƒ‹Ž‡••ƒ‰‡•ǡ˜‹†‡‘•–”‡ƒ‹‰ǡƒ—†‹‘ϐ‹Ž‡•ǡ‡– Ǥǡ ƒ„‡†‘™Ž‘ƒ†‡†ƒ†ǡ
–Ї”‡ˆ‘”‡ǡ ƒ „‡ ƒŽŽ‡† ʹǤͷ  –‡ А‘Ž‘‰› ƒ• ‹– Ž‹‡• „‡–™‡‡ –Ї •‡ ‘† ȋʹ Ȍ ƒ† –Š‹”† ȋ͵ Ȍ
generations of mobile telephony.

Services Provided By GPRS


ȋƒȌ ‡†‹‰ƒ†”‡ ‡‹˜‹‰–‡š–‡••ƒ‰‡•Ǥ
(b) Internet access.
(c) Multimedia Messaging Service (MMS).
ȋ †Ȍ –‡”‡–ƒ’’Ž‹ ƒ–‹‘•ˆ‘”•ƒ”–†‡˜‹ ‡•–Š”‘—‰Š‹”‡Ž‡••’’Ž‹ ƒ–‹‘”‘–‘ ‘ŽȋȌǤ
(e) Networking facility with one person or with several persons in a group, i.e., video conferencing.

CTM: GPRS provides high speed data transfer. A user is allowed to download video streaming, audio files,
email messages, etc.

8.14.4 Wireless in Local Loop (WLL)


WLL provides the subscribers with wireless phone facility to communicate with each other in
Supplement – Computer Science with Python–XII

‘”†‡” –‘ ‰‡– „‡––‡” ˜‘‹ ‡ “—ƒŽ‹–›Ǥ – ‡’Ž‘›• –Ї —•‡ ‘ˆ ‡Ž‡ –”‘ƒ‰‡–‹  ”ƒ†‹ƒ–‹‘ –‘ ‘‡ –
•—„• ”‹„‡”•–‘–ЇŽ‘ ƒŽ‡š Šƒ‰‡™‹–Š‘—––Ї—•‡‘ˆ™‹”‡•ǤЇ—•‡” ƒ—•‡™‹”‡Ž‡••’Š‘‡ǡ
speaker phone and parallel phones for communication with each other. In traditional telephone
‡–™‘”•ǡ’Š‘‡™‘—ކ„‡ ‘‡ –‡†–‘–Ї‡ƒ”‡•–‡š Šƒ‰‡–Š”‘—‰Šƒ’ƒ‹”‘ˆ ‘’’‡”™‹”‡•Ǥ
But in Wireless Local Loop (wireless in local loop) technology, the subscriber is connected to
–Ї ‡ƒ”‡•– ‡š Šƒ‰‡ –Š”‘—‰Š ƒ ”ƒ†‹‘ Ž‹ ‹•–‡ƒ† ‘ˆ ‘’’‡” ™‹”‡•Ǥ ‹”‡Ž‡•• ‹ Ž‘ ƒŽ Ž‘‘’ ‹•
Їƒ’‡”ƒ†“—‹ ‡”–Šƒ ‘’’‡”™‹”‡ ‘‡ –‹˜‹–›Ǥ•–Ї ‘•–‘ˆ ‘’’‡”ƒŽ‘‰™‹–Š–Ї ‘•–
of digging increases over time, this method proves cheaper than using copper wires. It is used
in remote areas where digging for copper wires is not possible.
Ї”‡ƒ”‡˜ƒ”‹‘—•–‡ А‘Ž‘‰‹‡•Ž‹‡ ”‡“—‡ ›‹˜‹•‹‘—Ž–‹’އ ‡••ȋ Ȍǡ‹‡‹˜‹•‹‘
Multiple Access (TDMA) and Code Division Multiple Access (CDMA) used for wireless in local
loop. In crowded urban localities where permission to dig may be almost impossible to get,
wireless technology is advised. However, there are also some disadvantages of using wireless
in local loop. First, as the distance between a receiver and transmitter increases in a wireless

8.34
system, the strength of the signal at the receiving end decreases even if there are no obstacles
in the way. Second, as the electromagnetic waves are propagated through air, a signal travelling
from a transmitter may take alternative paths on its way to the receiver. These paths may cause
†‡Žƒ›•‹–Ї”‡ ‡‹˜‡†•‹‰ƒŽ†—‡–‘–Ї‡š–”ƒ†‹•–ƒ ‡–”ƒ˜‡ŽŽ‡†Ǥ

CTM: Wireless in local loop is a system that is similar to telephone system which provides wireless
telecommunication by deploying a multiplicity of multichannel transceivers.

8.15 MOBILE TELECOMMUNICATION TECHNOLOGIES—1G, 2G, 3G & 4G


¾ 1G Technology

  ͳ  –‡ А‘Ž‘‰› ™ƒ• —•‡† ‹ –Ї ϐ‹”•– ‘„‹Ž‡ ’Š‘‡•Ǥ ͳ  ™ƒ• ‹–”‘†— ‡† ‹ –Ї ͳͻͺͲǯ•Ǥ
”ƒ•‹••‹‘‘ˆ˜‘‹ ‡†ƒ–ƒ–‘‘’Žƒ ‡–Š”‘—‰ŠƒƒŽ‘‰”ƒ†‹‘•‹‰ƒŽ•Ǥͳ ‡–™‘”™ƒ•—•‡†
ˆ‘” ˜‘‹ ‡ ƒŽŽ• ƒ† ‘– ˆ‘” –”ƒ•‹––‹‰ –‡š– ‡••ƒ‰‡•Ǥ For exampleǡ ǡ Ǧ‡–•ǡ ǡ
TACS.
Salient features of 1G technology:
• It provides data rates up to 2.4 kbps.
• It uses analog signals.
  Ȉ ‘‹ ‡“—ƒŽ‹–›‹•‘–˜‡”›‰‘‘†Ǥ
  Ȉ –†‘‡•‘–•—’’‘”––”ƒ•‹••‹‘‘ˆ–‡š–‡••ƒ‰‡•Ǥ
• It does not provide security.

¾ 2G Technology

  ʹ –‡ А‘Ž‘‰›‹•–Їϐ‹”•–†‹‰‹–ƒŽ ‡ŽŽ—Žƒ”•›•–‡–Šƒ–™ƒ•Žƒ— Ї†‹–Ї‡ƒ”Ž›ͳͻͻͲǯ•–Šƒ–
provides high data transmission rate in digital format. 2G also introduced data services
for mobiles, starting with SMS. For exampleǡǦǡ Ȁ ǡ‡Ǥ
Salient features of 2G technology:
  Ȉ ‘‘†“—ƒŽ‹–›‘ˆ•‘—†Ǥ
  Ȉ ‹‰Š‡”†ƒ–ƒ”ƒ–‡•—’–‘͸Ͷ„’•Ǥ
• Improved security mechanism.
  Ȉ ”ƒ•‹••‹‘‘ˆ†ƒ–ƒ•— Šƒ•–‡š–‡••ƒ‰‡•‹†‹‰‹–ƒŽˆ‘”ƒ–Ǥ
• Support transfer of picture messages and MMS.
  Ȉ –†‘‡•‘–•—’’‘”––”ƒ•ˆ‡”‘ˆ ‘’އš†ƒ–ƒ•— Šƒ•˜‹†‡‘•Ǥ
• It allows multiple users per radio channel with each user talking one at a time.
  Ȉ ‹‰‹–ƒŽ–”ƒ•‹••‹‘•‡ƒ„އ ‘’”‡••‡†˜‘‹ ‡ƒ†—Ž–‹’Ž‡š‹‰—Ž–‹’އ—•‡”•’‡” Šƒ‡ŽǤ

¾ 3G Technology

  ͵ –‡ А‘Ž‘‰›™ƒ•‹–”‘†— ‡†‹–Ї›‡ƒ”ʹͲͲͲƒ†’”‘˜‹†‡•— ŠŠ‹‰Š‡”†ƒ–ƒ”ƒ–‡•™‹–Š
Computer Networks

•’‡‡†ˆ”‘ͳͶͶ„’•–‘ʹ„’•Ǥ
  ͵ –‡ А‘Ž‘‰›Šƒ•‹–”‘†— ‡†‘”‡‡ˆϐ‹ ‹‡–™ƒ›•‘ˆ ƒ””›‹‰†ƒ–ƒǡƒ‹‰‹–’‘••‹„އ–‘
have faster web services, live chat, fast downloading, video conferencing, etc., over mobile
phones. For exampleǡʹͲͲͲȀǦǡȀ ΪǡǦǤ

8.35
Salient features of 3G technology:
  Ȉ –Šƒ•‹–”‘†— ‡†‘”‡‡ˆϐ‹ ‹‡–™ƒ›•‘ˆ ƒ””›‹‰†ƒ–ƒ™‹–Šˆƒ•–‡”™‡„•‡”˜‹ ‡•Ǥ
• Live chat, fast downloading, video conferencing, etc., are also possible over mobile phones.
  Ȉ –ƒŽŽ‘™•–Ї—•‡”–‘’Žƒ›͵‰ƒ‡•Ǥ
• A user can see live streaming on smartphones.
• It provides broadband internet services.
• It allows the user to send and receive large email messages.
  Ȉ ‹‰Š„ƒ†™‹†–Š‹•”‡“—‹”‡†Ǥ
• Splits channel into time intervals enabling a single user to get all the resources at once.

¾ 4G Technology

Unlike previous generations of mobile technology, 4G mobile technology uses ultra-high
„”‘ƒ†„ƒ† ‹–‡”‡– •‡”˜‹ ‡• ™‹–Š — Š ˆƒ•–‡” †ƒ–ƒ •’‡‡†ǡ –›’‹ ƒŽŽ› „‡–™‡‡ ͳͲͲ „’•Ȃ
ͳ‰„’•Ǥ‘™ǡͶ ”—އ•–Ї‘„‹Ž‡ƒ”‡–ǤŽ‹‡’”‡˜‹‘—•‰‡‡”ƒ–‹‘•‘ˆ‘„‹Ž‡–‡ А‘Ž‘‰›ǡ
4G mobile technology is used for internet access on computers also, and it is totally wireless.
Ͷ ’”‘˜‹†‡•‹–‡”‡–ƒ ‡••ǡŠ‹‰Š“—ƒŽ‹–›•–”‡ƒ‹‰˜‹†‡‘ƒ†Dzƒ›–‹‡ǡƒ›™Š‡”‡dz˜‘‹ ‡
ƒ††ƒ–ƒ–”ƒ•‹••‹‘ƒ–ƒ— Šˆƒ•–‡”•’‡‡†–Šƒ͵ ǤЇDzƒ›–‹‡ǡƒ›™Š‡”‡dzˆ‡ƒ–—”‡‘ˆ
Ͷ ‹•ƒŽ•‘”‡ˆ‡””‡†–‘ƒ•Dz dzȋ‘„‹Ž‡—Ž–‹‡†‹ƒǢ›–‹‡Ȁƒ›™Š‡”‡Ǣ Ž‘„ƒŽ‘„‹Ž‹–›
support; Integrated wireless solution; Customized personal services).
Salient features of 4G technology:
• It is used for internet access on computers also and is totally wireless.
  Ȉ Ͷ ’”‘˜‹†‡•‹–‡”‡–ƒ ‡••ǡŠ‹‰Š“—ƒŽ‹–›•–”‡ƒ‹‰˜‹†‡‘ƒ†Dzƒ›–‹‡ǡƒ›™Š‡”‡dz˜‘‹ ‡
ƒ††ƒ–ƒ–”ƒ•‹••‹‘ƒ–ƒ— Šˆƒ•–‡”•’‡‡†–Šƒ͵ Ǥ
  Ȉ –†‡Ž‹˜‡”•ˆƒ•–‡”ƒ†„‡––‡”‘„‹Ž‡„”‘ƒ†„ƒ†‡š’‡”‹‡ ‡•Ǥ
• It provides more data capacity for richer content and more connections.
   ЇDzƒ›–‹‡ǡƒ›™Š‡”‡dzˆ‡ƒ–—”‡‘ˆͶ ‹•ƒŽ•‘”‡ˆ‡””‡†–‘ƒ•Dz dzȋ‘„‹Ž‡—Ž–‹‡†‹ƒȌ
anytime/anywhere.

8.16 MOBILE PROCESSORS


Supplement – Computer Science with Python–XII

”‘ ‡••‘”•ƒ”‡”‡“—‹”‡†–‘”—ƒ‘’‡”ƒ–‹‰•›•–‡ǡ
„‡ ‹– ƒ †‡•–‘’ǡ Žƒ’–‘’ ‘” ƒ ‘„‹Ž‡Ǥ ”‘ ‡••‘”•
provide the necessary resources to start an
operating system, run applications and do certain
tasks. Today’s smartphones and mobile processors
are very powerful, so much so that they can compete
with desktop computers.
”‘ ‡••‘”•ƒ”‡‘™ƒ˜ƒ‹Žƒ„އ‹ƒ› ‘”‡•Ǥ ‹”•–‹–™ƒ••‹‰Ž‡ ‘”‡ǡ–Ї ƒ‡–Ї†—ƒŽ ‘”‡ǡ
ƒ†™‡‘™Šƒ˜‡“—ƒ† ‘”‡ǡЇšƒ ‘”‡ƒ†‡˜‡‘ –ƒ ‘”‡’”‘ ‡••‘”•Ǥ‘•–’”‘ ‡••‘”•ƒ˜ƒ‹Žƒ„އ
–‘†ƒ›ƒ”‡͸ͶǦ„‹–ƒ•ƒ‰ƒ‹•–͵ʹǦ„‹–‡ƒ”Ž‹‡”ǤЇ’”‘ ‡••‹‰•’‡‡†Šƒ•ƒŽ•‘–‘— Ї†͵ǤͲȂ͵Ǥͷ œ
‘™ǤЇƒ„‹Ž‹–›–‘‡“—‹’‘„‹Ž‡’”‘ ‡••‘”•™‹–Š ȋ ”ƒ’Š‹ •”‘ ‡••‹‰‹–ȌŠƒ•‡ƒ„އ†
–Ї †‡˜‹ ‡• –‘ Š—” ‘—– „‡•– ‰”ƒ’Š‹  ’‹ –—”‡•ǡ Šƒ˜‡ ͵Ǧ ƒ’ƒ„‹Ž‹–›ǡ ‹”–—ƒŽ ‡ƒŽ‹–› ƒ† Ͷ
recording capability. The improved processor technology has also made modern mobile devices
‘”‡’‘™‡”Ǧ‡ˆϐ‹ ‹‡–Ǥ
8.36
Today, there are many processors available in the market. QUALCOMM, Apple mobile processors,
Intel mobile processors and some other giants are ruling the market. Let us discuss these
mobile processors.

8.16.1 Qualcomm Snapdragon


Qualcomm Technologies is a US-based company. Qualcomm
ϐ‹”•– „‡ ƒ‡ ƒ ‘™ „”ƒ† ™Š‡ –Ї› ‹–”‘†— ‡† –Ї 
technology. Qualcomm is actively involved in technology
related to semiconductor designing for mobile devices, tracking
devices, satellite phones, virtual reality, wireless charging,
communications, etc. Qualcomm is now known for its Snapdragon
brand which is responsible for marketing mobile processors and
‘†‡•ȋͶ ȌǤ
ƒ’†”ƒ‰‘ „‡ ƒ‡ ƒ „‹‰ ƒ‡ ‹ –Ї ’”‘ ‡••‘”• ƒ”‡– ƒˆ–‡” ‹– ‹–”‘†— ‡† –Ї ϐ‹”•– ͳ œ
’”‘ ‡••‘”™Š‡–Їƒ˜‡”ƒ‰‡•’‡‡†‘ˆ‘•–•ƒ”–’Š‘‡•™ƒ•‘Ž›ͷͳʹ œǤ
‹ ‡ ʹͲͲͷǡ ƒ’†”ƒ‰‘ Šƒ• ‘‡ ‘—– ™‹–Š ƒ —„‡” ‘ˆ •‡”‹‡•Ȅͳǡ ʹǡ ͵ǡ Ͷǡ ʹͲͲǡ ͶͲͲǡ
͸ͲͲǡƒ†ͺͲͲǤͺͲͲ•‡”‹‡•Šƒ•ƒŽ”‡ƒ†›”‡Ž‡ƒ•‡†ͺͲͲǡͺͲͳǡͺͲͷǡͺͲͺǡͺͳͲǡͺʹͲƒ†ͺʹͳǤ
The most common Qualcomm processor in the medium-to high-end phone market is either
ͺʹͲ‘”ͺʹͳǡ™Š‹ Š‹•–ЇŽƒ–‡•–˜‡”•‹‘Ǥ

8.16.2 Apple Mobile Processors


Apple does not manufacture microprocessors.
Instead, it enters into contracts with processor-
manufacturing companies, mainly Samsung and
TSMC, for making custom-built processors that
•—‹– ‹–• †‡•‹‰ ƒ† ’‡”ˆ‘”ƒ ‡ ‡š’‡ –ƒ–‹‘•Ǥ ‘”
‹•–ƒ ‡ǡͻͳͶ’”‘ ‡••‘”™ƒ•„—‹Ž–„›ƒ•—‰ǡ
™Š‹Ž‡–Їͻͳ͸˜‡”•‹‘™ƒ•„—‹Ž–„›Ǥ
Apple A series is designed for processors to be
—•‡†‹‹Š‘‡ǡ‹ƒ†ǡ‹ƒ†‘— Šƒ†’’އǤ
‘‡‘ˆ–Ї’”‘ ‡••‘”•‹–Ї•‡”‹‡•ƒ”‡Ͷǡͷǡͷǡ͸ǡ͸ǡ͹ǡͺǡͺǡͻǡͻƒ†ͳͲǤ
• Apple A10 Fusion‹•–ЇŽƒ–‡•–’”‘ ‡••‘”™Š‹ Š‹•—•‡†‹‹Š‘‡͹ƒ†‹Š‘‡͹Ž—•ǤͳͲ
‹•ƒ“—ƒ† ‘”‡„—‹Ž–‘ͳ͸ ‹ ’”‘ ‡••‘” ƒ’ƒ„އ‘ˆ”—‹‰ƒ–ʹǤͶ œ•’‡‡†ƒ†ƒ
Їšƒ ‘”‡‘™‡” ǤͳͲ‹•–™‹ ‡ƒ•ˆƒ•–ƒ•‹–•’”‡†‡ ‡••‘”ͻƒ†‹’”‘˜‡•‰”ƒ’Š‹ 
processing by 50%. This processor is manufactured by TSMC.
• Apple S series is designed for processors to be used in Apple Watch. Some of the processors
‹–Ї•‡”‹‡•ƒ”‡’’އͳǡ’’އͳƒ†’’އʹǤ
  Ї —””‡– ˜‡”•‹‘ǡ ’’އ ʹǡ ‹• ƒ †—ƒŽ ‘”‡ ’”‘ ‡••‘” ™‹–Š „—‹Ž–Ǧ‹  —•‡† ‹ ’’އ
Watch Series 2. The processor is manufactured by Samsung under a contract with Apple.
Computer Networks

• Apple W series is used in headphones for wireless audio connectivity. The current series,
’’އͳǡ‹•—•‡†‹™‹”‡Ž‡••Їƒ†’Š‘‡•ƒ†‹”‘†•Ǥ
• Apple T series‹•†‡•‹‰‡†–‘„‡—•‡†‹‘— Š •‡•‘”•‹ƒ ‘‘”‘ǤЇ‘Ž›˜‡”•‹‘
”‡Ž‡ƒ•‡†–‹ŽŽ†ƒ–‡‹•’’އͳǤ

8.37
8.16.3 Intel Atom and Core M Processors
–‡Ž ‹• ƒ ‡”‹ ƒ —Ž–‹ƒ–‹‘ƒŽ ‘’ƒ› •›‘›‘—• ™‹–Š  ƒ†
microprocessors. Atom is the brand name given for the low power-
‘•—‹‰ ƒ† Ž‘™Ǧ ‘•– ͵ʹǦ„‹– ƒ† ͸ͶǦ„‹– Š‹’• ƒ—ˆƒ –—”‡† ˆ‘”
smartphones and tablets.
–‡Ž ’”‘ ‡••‘”• ƒ”‡ „ƒ•‡† ‘ ͺ͸ ƒ” Š‹–‡ –—”‡ ™Š‹ Š ‹• ‘”‡ ’‘™‡”ˆ—Ž
than ARM but consumes more power compared to ARM architecture. The
latest versions of Intel processors have reduced the power consumption,
bringing it down to less than 5 watts, which is ideal for all mobile devices.
Though Atom processors in the beginning supported only Windows, they
‘™•—’’‘”–ƒŽŽƒŒ‘”‘„‹Ž‡‘’‡”ƒ–‹‰•›•–‡•Ǥ
Intel Atom processors ƒ”‡ —””‡–Ž› —•‡† ‹ –‘ ͷ ƒ† ͹ •‡”‹‡•Ǥ Ї•‡ Š‹’• ƒ”‡ ͸ͶǦ„‹–
“—ƒ† ‘”‡’”‘ ‡••‘”•‹ͳͶ•‹œ‡™‹–Š•’‡‡†•‘ˆ—’–‘ͳǤ͸ œ–Šƒ– ƒ„‡• ƒŽ‡†—’–‘ʹǤͶ
Ghz. Intel also released Intel Core M ultra low-voltage microprocessors designed for ultra-thin
‘–‡„‘‘•ǡ‘„‹Ž‡†‡˜‹ ‡•ƒ†ʹǦ‹Ǧͳ ‘˜‡”–‹„އ•ǤЇ’”‘ ‡••‘” ‘•—‡•ͶǤͷ™ƒ––•‘”އ••
power, making it ideal for long battery life. These are dual core processors with a speed of
ƒ„‘—–ͳǤͷ œ™Š‹ Š ƒ„‡• ƒŽ‡†—’–‘͵Ǥʹ œǤ –‡Ž‘”‡’”‘ ‡••‘”•‘ˆˆ‡”ͶͲΨ„‘‘•–‹
ƒ†‰”ƒ’Š‹ •’‡”ˆ‘”ƒ ‡ƒ• ‘’ƒ”‡†–‘–Ї‡ƒ”Ž‹‡”˜‡”•‹‘•Ǥ

8.16.4 Nvidia Tegra


Nvidia Corporation is a US-based technology company which
specializes in making processing units for graphics, gaming units
and mobile devices. Nvidia develops chips for smartphones, such
ƒ•–”ƒ•‹––‹‰ˆƒšǡ˜‘‹ ‡†ƒ–ƒǡ–ƒ„އ–•ƒ†‘„‹Ž‡†‡˜‹ ‡•—†‡”
the brand Tegra.
‡‰”ƒ ’”‘ ‡••‘”• ƒ”‡ „—‹Ž– ‘ ͸ͶǦ„‹–  ƒ” Š‹–‡ –—”‡Ǥ ‡‰”ƒ Šƒ• ƒŽ”‡ƒ†› ƒ”‡–‡† ‡‰”ƒ ͳǡ
‡‰”ƒ͵ǡ‡‰”ƒͶǡ‡‰”ƒͶ‹ǡ‡‰”ƒͳǡ‡‰”ƒͳǤ
‡‰”ƒͳ‹• —””‡–Ž›–Ї‘•–ƒ†˜ƒ ‡†‡‰”ƒ Š‹’‹–Їƒ”‡–ǤЇ’”‘ ‡••‘”‹•—ƒ†‘”‡
™‹–Š ʹͷ͸  ‘”‡• ƒ† Ͷ ˜‹†‡‘ ƒ’ƒ„‹Ž‹–‹‡•Ǥ Ї Š‹’• ƒ”‡ „—‹Ž– ‘ ʹͲ  –‡ А‘Ž‘‰›Ǥ Ї
’”‘ ‡••‘”‹• —””‡–Ž›—•‡†‹˜‹†‹ƒ †”‘‹†Ǥ
Supplement – Computer Science with Python–XII

The Tegra processors mainly used in smartphones and tablets are Tegra 4, Tegra 4i and Tegra
ͳǤ

8.16.5 MediaTek
MediaTek is a Taiwanese semiconductor company providing chips
for mobile devices, HDTVs and other electronic devices.
‡†‹ƒ‡ ’”‘ ‡••‘”• ƒ”‡ „—‹Ž– ‘ ͸ͶǦ„‹–  ƒ” Š‹–‡ –—”‡Ǥ Ї
Žƒ–‡•– ‡†‹ƒ‡ ’”‘ ‡••‘” •—’’‘”–• —’ –‘ ͵ œ •’‡‡†Ǥ Ї›
‘‡‹ƒ˜ƒ”‹‡–›‘ˆ ‘”‡••— Šƒ•†—ƒŽ ‘”‡ȋʹ ‘”‡Ȍǡ“—ƒ† ‘”‡
ȋͶ ‘”‡ȌǡЇšƒ ‘”‡ȋ͸ ‘”‡Ȍƒ††‡ ƒ ‘”‡ȋͳͲ ‘”‡ȌǤ
The latest processors from MediaTek, Helio X20 and Helio X25, are used in smartphones and
tablets. MediaTek processors are mostly popular with Chinese manufacturers. Xiaomi, Meizu,

8.38
‡ ‘‡ǡ—ǡ‡– Ǥǡ—•‡–Ї‹•ƒ”–’Š‘‡•Ǥ ‡”ǡ•—•ǡ‡‘˜‘ǡƒœ‘ ‹”‡ ǡ‘„‹Ž‡ƒ”‡
some of the other manufacturers that use MediaTek processors in their tablets.
‡Ž‹‘͵Ͳƒ† ‡Ž‹‘ʹ͹ǡ–ЇŽƒ–‡•–ˆ”‘–Ї ‘’ƒ›ǯ••–ƒ„އǡ—•‡ͳͲƒ†ʹͲ’”‘ ‡••‘”•
respectively. Both are deca core with 2 dual core and a single dual core built inside the processor.

8.16.6 HiSilicon
HiSilicon is a Chinese company specializing in semiconductor
technology. The company, owned by Huawei, creates chips based
on ARM architecture. It is the largest domestic integrated circuit
designer in China.
‘‡ ‘ˆ –Ї ’”‘ ‡••‘”• ”‡Ž‡ƒ•‡† „› ‹‹Ž‹ ‘ ƒ”‡ ͵ͳǡ ͵ʹǡ ͵ʹǡ ‹”‹ ͸ʹͲǡ ‹”‹ ͸ͷͲǡ
‹”‹ͻͳͲǡ‹”‹ͻʹͲǡ‹”‹ͻ͵Ͳǡ‹”‹ͻͷͲƒ†‹”‹ͻ͸ͲǤ‘‡‘ˆ–Ї†‡˜‹ ‡•™‹–Š‹”‹ͻͷͲ
ƒ”‡ ‘‘”ͺǡ —ƒ™‡‹ƒ–‡ͺƒ† —ƒ™‡‹‡†‹ƒƒ†͵Ǥ
Kirin 960‹•–ЇŽƒ–‡•–‘†‡Ž–‘„‡”‡Ž‡ƒ•‡†‹–Ї•‡”‹‡•Ǥ –‹•„—‹Ž–‘͸ͶǦ„‹–ƒ” Š‹–‡ –—”‡
‘ͳ͸ ‹ –‡ А‘Ž‘‰›ǤЇ’”‘ ‡••‘”‹•“—ƒ† ‘”‡ ƒ’ƒ„އ‘ˆƒ––ƒ‹‹‰ƒ•’‡‡†‘ˆʹǤͶ œǤ

8.16.7 Samsung Exynos


𛐑•‹•ƒ„”ƒ†‘ˆƒ•—‰އ –”‘‹ •™Š‹ Šƒ‡•’”‘ ‡••‘”•„ƒ•‡†‘ƒ” Š‹–‡ –—”‡Ǥ
‘‡ ‘ˆ –Ї ’”‘ ‡••‘”• ‹ –Ї •‡”‹‡• ƒ”‡ 𛐑• ͹ —ƒŽǡ 𛐑• ͹ͶʹͲǡ
𛐑•͹ –ƒ͹ͷͺͲǡ𛐑•͹ –ƒ͹ͺ͹ͲǤ
𛐑•ͺ –ƒͺͺͻͲ‹•–ЇŽƒ–‡•–’”‘ ‡••‘”ˆ”‘𛐑•ǤЇ’”‘ ‡••‘”
‹•‡“—‹’’‡†™‹–Š –ƒ‘”‡‘͸ͶǦ„‹–ƒ” Š‹–‡ –—”‡™‹–ŠƒŽ‹ Ǥ
Ї’”‘ ‡••‘”‹• ƒ’ƒ„އ‘ˆ”—‹‰ƒ–ƒ•’‡‡†‘ˆʹǤ͵ œ™‹–Š•—’’‘”–
ˆ‘” ͵ ‰ƒ‹‰ ƒ† Ͷ   ”‡•‘Ž—–‹‘Ǥ Ї Š‹’• ƒ”‡ „—‹Ž– ‘ ͳͶ 
technology. Exynos 8 Octa 8890‹•—•‡†‹ƒ•—‰ ƒŽƒš›͸ƒ†͸‡†‰‡Ǥ

8.17 ELECTRONIC MAIL (EMAIL)


ƒ‹Ž ‹• ƒ ‡–Š‘† ‘ˆ ‡š Šƒ‰‹‰ †‹‰‹–ƒŽ ‡••ƒ‰‡• ˆ”‘ ƒ •‡†‡” –‘ ‘‡ ‘” ‘”‡ ”‡ ‹’‹‡–•Ǥ
Some common email protocols are:
• Internet Message Access Protocol (IMAP): A protocol for receiving email messages on the
internet.
• ‘•– ˆϐ‹ ‡ ”‘–‘ ‘Ž ‡”•‹‘ ͵ ȋ͵Ȍǣ A protocol used by email clients to retrieve
messages from remote servers.
• Simple Mail Transfer Protocol (SMTP): A protocol used for sending email messages on
the internet.
• GOPHER: Another tool of the internet is Gopher, a menu-based program that enables us to
browse for information without knowing where the material is located. It lets us search a
list of resources and then sends the material to us.
Computer Networks

Some other networking-related terms are:


ͳǤ Domain Name System (DNS): ––”ƒ•Žƒ–‡•‡–™‘”ƒ††”‡••ȋ•— Šƒ• ƒ††”‡••‡•Ȍ‹–‘
terms understood by humans (such as domain names) and vice versa.
2. ‘ƒ‹ ‘•–‘ϐ‹‰—”ƒ–‹‘”‘–‘ ‘Žȋ Ȍǣ It automatically assigns internet addresses
to computers and users.
8.39
8.18 VIDEO CONFERENCING
Video conferencing is a communications technology that integrates video and audio to connect
users anywhere in the world as if they were in the same room. This term usually refers to
communication between three or more users who are in at least two locations, rather than
‘‡Ǧ‘Ǧ‘‡ ‘—‹ ƒ–‹‘ ƒ† ‹– ‘ˆ–‡ ‹ Ž—†‡• —Ž–‹’އ ’‡‘’އ ƒ– ‡ƒ Š Ž‘ ƒ–‹‘Ǥ ƒ Š —•‡”
or group of users who is participating in a video conference typically must have a computer, a
camera, a microphone, a video screen and a sound system.
Basically, this is a system that allows us to conduct meetings or trainings in different places
•‹—Ž–ƒ‡‘—•Ž›Ǥ ‘ǡ –Š‹• –‡ А‘Ž‘‰› ‹• ‡•’‡ ‹ƒŽŽ› ’‘’—Žƒ” ‹ –Ї ϐ‹‡Ž† ‘ˆ „—•‹‡•• „‡ ƒ—•‡ ‹–
allows meetings or conferences to be held without the need for all the participants to travel to
a single location, so it saves time and money.
The most popular software used for video conferencing is:
ȋƒȌ ƒ
ȋ „Ȍ ‹‰ƒ
(c) Skype

8.19 PROTOCOLS FOR CHAT AND VIDEO CONFERENCING


With the arrival of internet, communication formats such as chat and video conferencing,
etc., have gained popularity. In this section, we shall talk about some common chat and
video conferencing protocols. The most common chat protocol is IRC (Internet Relay Chat)
™Š‹Ž‡ –Ї ‘•– ‘‘ ˜‹†‡‘ ‘ˆ‡”‡ ‹‰ ’”‘–‘ ‘Ž• ƒ”‡ Ǥ͵ʹ͵ ƒ†   ȋ‡••‹‘ ‹–‹ƒ–‹‘
”‘–‘ ‘ŽȌǤ

8.19.1 IRC (Internet Relay Chat)


 ‹• ƒ ƒ’’Ž‹ ƒ–‹‘ Žƒ›‡” ’”‘–‘ ‘Ž –Šƒ– ƒŽŽ‘™• —•‡”• –‘ •Šƒ”‡ –‡š– ‡••ƒ‰‡•Ǥ – —•‡• Ž‹‡–
server model where the clients install IRC client program on their system so that they can
communicate with IRC chat server to transfer messages to other clients. In fact, the IRC client
•‡†• ”‡“—‡•– –‘  Ž‹‡– •‡”˜‡” ƒ† –Ї •‡”˜‡” ˆ‘”™ƒ”†• –Š‹• ”‡“—‡•– –‘ ƒ‘–Ї” Ž‹‡– –‘
enable them to communicate with each other. It provides one-to-one communication as well
ƒ•‰”‘—’ ‘—‹ ƒ–‹‘ˆ‘” Šƒ––‹‰ƒ†ϐ‹Ž‡•Šƒ”‹‰ǡ•— Šƒ•ƒŽ‹–›Ǥ ‡–™‘”••— Šƒ•
Supplement – Computer Science with Python–XII

–Ї†‡”‡–’”‘˜‹†‡•‡”˜‡”•ƒ†Їޒ—•†‘™Ž‘ƒ†ƒ  Ž‹‡–‘‘—”Ǥ


Ї ’”‘–‘ ‘Ž™ƒ•†‡˜‡Ž‘’‡†‘˜‡”ˆ‘—”›‡ƒ”••‹ ‡‹–™ƒ•ϐ‹”•–‹’އ‡–‡†ƒ•ƒ‡ƒ•ˆ‘”
users on a BBS to chat amongst themselves.

CTM: IRC is used for chatting by sending and receiving text messages. The sender sends request to IRC
server, which then forwards this request to another client to communicate with each other.

8.20 PROTOCOL FOR VoIP


‘  •–ƒ†• ˆ‘” ‘‹ ‡ ‘˜‡” –‡”‡– ”‘–‘ ‘ŽǤ ‘” –”ƒ•ˆ‡””‹‰ ‘ˆ ˜‘‹ ‡ǡ ˜‘‹ ‡ ‘˜‡” ‹–‡”‡–
’”‘–‘ ‘Ž‹•—•‡†ǤЇ˜‘‹ ‡ ƒŽŽ•ƒ”‡ϐ‹”•–†‹‰‹–‹œ‡†ǡ ‘’”‡••‡†ƒ†–Їˆ”ƒ‰‡–‡†‹–‘•ƒŽŽ
’ƒ ‡–•ǡ™Š‹ Šƒ”‡–Ї”‡Žƒ›‡†„› –‡”‡–”‘–‘ ‘Žȋ Ȍ ”‘••‡–™‘”Ǥ‘‹ ‡Ǧ‘˜‡”Ǧ ȋ‘ Ȍ
‹’އ‡–ƒ–‹‘ ‡ƒ„އ• —•‡”• –‘ ƒ””› ˜‘‹ ‡ –”ƒˆϐ‹  ȋFor exampleǡ –‡Ž‡’Š‘‡ ƒŽŽ• ƒ† ˆƒš‡•Ȍ
‘˜‡”ƒ ‡–™‘”Ǥ‘ǡ‘  ƒ„‡ƒ Š‹‡˜‡†‘ƒ›†ƒ–ƒ‡–™‘”–Šƒ–—•‡• ǡŽ‹‡–Ї‹–‡”‡–ǡ

8.40
‹–”ƒ‡–•ƒ†‘ ƒŽ”‡ƒ‡–™‘”•ȋȌǤ•–Ї†ƒ–ƒ‹•–”ƒ•‹––‡†‹–Їˆ‘”‘ˆ’ƒ ‡–•ǡ‘ 
uses packet switching technology where each packet follows best route to reach its destination.
‘ ƒŽŽ‘™•„‘–Š˜‘‹ ‡ƒ††ƒ–ƒ ‘—‹ ƒ–‹‘•–‘„‡”—‘˜‡”ƒ•‹‰Ž‡‡–™‘”ǡ™Š‹ Š ƒ
•‹‰‹ϐ‹ ƒ–Ž›”‡†— ‡‹ˆ”ƒ•–”— –—”‡ ‘•–•Ǥ
There are 3 main causes for the evolution of the voice-over IP market:
 ͳǤ ‘™Ǧ ‘•–’Š‘‡ ƒŽŽ•
 ʹǤ ††Ǧ‘•‡”˜‹ ‡•ƒ†—‹ϐ‹‡†‡••ƒ‰‹‰
 ͵Ǥ ‡”‰‹‰‘ˆ†ƒ–ƒȀ˜‘‹ ‡‹ˆ”ƒ•–”— –—”‡•
‡”˜‹ ‡•’”‘˜‹†‡†„›‘ ƒ”‡ǣ
Š‘‡–‘’Š‘‡ǡ–‘’Š‘‡ǡ’Š‘‡–‘ǡˆƒš–‘‡ƒ‹Žǡ‡ƒ‹Ž–‘ˆƒšǡˆƒš–‘ˆƒšǡ˜‘‹ ‡–‘‡ƒ‹Žǡ 
Š‘‡ǡ–”ƒ•’ƒ”‡–ȋȌǡ–‘ŽŽˆ”‡‡—„‡”ȋͳǦͺͲͲȌǡ Žƒ•••‡”˜‹ ‡•ǡ ƒŽŽ ‡–”‡ƒ’’Ž‹ ƒ–‹‘•ǡ
ǡ ‹ϐ‹‡† ‡••ƒ‰‹‰ǡ ‹”‡Ž‡•• ‘‡ –‹˜‹–›ǡ  ’’Ž‹ ƒ–‹‘• —•‹‰ ͹ǡ   ƒ† •‘ˆ–
switch implementation.
Ї˜ƒ”‹‘—•’”‘–‘ ‘Ž•—•‡†ˆ‘”‘ ƒ”‡ǣ
 ͳǤ Ǥ͵ʹ͵
 ʹǤ ‡••‹‘ ‹–‹ƒ–‹‘”‘–‘ ‘Žȋ Ȍ

CTM: VoIP is a protocol that is used for transmitting voice data and multimedia data over internet protocol.
It uses high speed broadband internet connection.

ͳǤ Ǥ͵ʹ͵”‘–‘ ‘Žˆ‘”‘ 


Ǥ͵ʹ͵‹•ƒ’”‘–‘ ‘Ž–Šƒ–’”‘˜‹†‡• ‘—‹ ƒ–‹‘ˆ‘”—Ž–‹‡†‹ƒ•‡”˜‹ ‡••— Šƒ•ƒ—†‹‘ǡ˜‹†‡‘
ƒ††ƒ–ƒ ‘—‹ ƒ–‹‘‘˜‡”’ƒ ‡–Ǧ„ƒ•‡†‡–™‘”Ǥ –•’‡ ‹ϐ‹‡•–Ї•–ƒ†ƒ”†•ƒ†’”‘–‘ ‘Ž•
ˆ‘”ƒŽŽ–Ї•‡•‡”˜‹ ‡•Ǥ• Ǥ͵ʹ͵’”‘˜‹†‡•˜ƒ”‹‘—• ‘—‹ ƒ–‹‘ˆƒ ‹Ž‹–‹‡•ǡ‹– ƒ„‡ƒ’’Ž‹‡†‹
ƒ™‹†‡˜ƒ”‹‡–›‘ˆƒ”‡ƒ•Ȅ ‘•—‡”ǡ„—•‹‡••ƒ†‡–‡”–ƒ‹‡–ƒ’’Ž‹ ƒ–‹‘•Ǥ Ǥ͵ʹ͵•—’’‘”–•
ƒŽŽ •‡–Ǧ—’ǡ –‡ƒ”†‘™ ƒ† ˆ‘”™ƒ”†‹‰Ȁ–”ƒ•ˆ‡”Ǥ  ‡› ˆ‡ƒ–—”‡ ‘ˆ Ǥ͵ʹ͵ ‹• —ƒŽ‹–› ‘ˆ ‡”˜‹ ‡
ȋ‘ȌǤ ‘ –‡ А‘Ž‘‰› ƒŽŽ‘™• ”‡ƒŽǦ–‹‡ ’”‹‘”‹–‹œƒ–‹‘ ƒ† –”ƒˆϐ‹  ƒƒ‰‡‡– ‘•–”ƒ‹–• –‘
„‡’Žƒ ‡†‘Dz„‡•–Ǧ‡ˆˆ‘”–dz’ƒ ‡–†‡Ž‹˜‡”›•›•–‡•Ž‹‡Ȁ ‘˜‡”–Ї”‡–Ǥ – ƒ„‡ƒ’’Ž‹‡†
in a variety of mechanisms:
• Audio only
• Audio and data
• Audio and video
• Audio, video and data

ʹǤ ”‘–‘ ‘Žˆ‘”‘ 


Ї ‡š’ƒ†‡† ˆ‘” ‘ˆ   ‹• ‡••‹‘ ‹–‹ƒ–‹‘ ”‘–‘ ‘ŽǤ   ‹• ƒ ‘—‹ ƒ–‹‘ ’”‘–‘ ‘Ž
ȋ‘”‡•’‡ ‹ϐ‹ ƒŽŽ›ǡƒ•‹‰ƒŽŽ‹‰’”‘–‘ ‘ŽȌ‘”‹‰‹ƒŽŽ›†‡˜‡Ž‘’‡†‹ͳͻͻ͸Ǥ –—•‡• ’”‘–‘ ‘Ž–Šƒ–
‡•–ƒ„Ž‹•Ї•ǡ ‘†‹ϐ‹‡• ƒ† –‡”‹ƒ–‡• ‘  –‡Ž‡’Š‘‡ ƒŽŽ•Ǥ – ’”‘˜‹†‡• ˜‹†‡‘ ‘ˆ‡”‡ ‹‰
Computer Networks

service to the users, so that a user can communicate with more than one person at a time. Other
 ƒ’’Ž‹ ƒ–‹‘•‹ Ž—†‡•–”‡ƒ‹‰—Ž–‹‡†‹ƒ†‹•–”‹„—–‹‘ǡ‹•–ƒ–‡••ƒ‰‹‰ƒ†‹ˆ‘”ƒ–‹‘ǡ
ϐ‹Ž‡ –”ƒ•ˆ‡”ǡ ˆƒš ‘˜‡”  ƒ† ‘Ž‹‡ ‰ƒ‡•Ǥ   –”ƒ•’ƒ”‡–Ž› •—’’‘”–• ƒ‡ ƒ’’‹‰ ƒ†
redirection services which support personal mobility.

8.41
8.21 NETWORK SECURITY CONCEPTS
Network is used for sharing, messaging and collaboration of data. However, the more network is
used for this purpose, the lesser is the security of data, either in terms of viruses or hacking and
other cyberattacks. To prevent the network from these malicious and/or unethical practices,
various strategies and choices are available that work as building blocks of network security.
These include password authentication, digital signature, challenge handshake authentication
protocol, etc.

8.22 TYPES OF THREATS AND PREVENTION


ͳǤ‹”—•‡•
‹”—•‡• ƒ”‡ •ƒŽŽ ’”‘‰”ƒ• –Šƒ– ƒ”‡ ™”‹––‡ ‹–‡–‹‘ƒŽŽ› –‘ †ƒƒ‰‡ –Ї †ƒ–ƒ ƒ† ϐ‹Ž‡• ‘ ƒ
system. These programs are spread from one computer system to another which interrupts the
normal functioning of a computer. Viruses can attack any part of a computer’s software such
ƒ•„‘‘–„Ž‘ ǡ‘’‡”ƒ–‹‰•›•–‡ǡ•›•–‡ƒ”‡ƒ•ǡϐ‹Ž‡•ƒ†ƒ’’Ž‹ ƒ–‹‘’”‘‰”ƒƒ ”‘•Ǥ‹”—•‡•
are most easily spread with email attachments.
‹”—•‡•ƒ”‡„”‘ƒ†Ž› Žƒ••‹ϐ‹‡†‹–‘–Š”‡‡–›’‡•ǣ
(a) ‹Ž‡ ˆ‡ –‘”‹”—•‡•ǣ‹”—•‡•–Šƒ–ƒ––ƒ Š–Ї•‡Ž˜‡•–‘ƒ’”‘‰”ƒϐ‹Ž‡Ǥ
(b) ‘‘–‡ –‘”‹”—•‡•ǣ Viruses that install themselves in boot sectors of hard drive.
(c) ƒ ”‘‹”—•‡•ǣЇ›‹ˆ‡ –†ƒ–ƒϐ‹Ž‡•ƒ† ‘””—’––Ї†ƒ–ƒǤ

Characteristics of Viruses:
(a) Speed of a computer system becomes slower than normal.
ȋ „Ȍ ‘’—–‡”•›•–‡ˆ”‡“—‡–Ž›Šƒ‰•—’Ǥ
(c) Computer restarts automatically after every few minutes.
(d) Various applications of computer do not function properly.
ȋ‡Ȍ ‹ƒŽ‘‰„‘š‡•ǡ‡—•ƒ†‘–Ї”‡””‘”‡••ƒ‰‡™‹†‘™•ƒ”‡†‹•–‘”–‡†Ǥ

Damage caused by Viruses:


ȋƒȌ Ї› ‘””—’–ϐ‹Ž‡ƒŽŽ‘ ƒ–‹‘–ƒ„އ™Š‹ Š”‡•—Ž–•‹ ‘””—’–‹‰–Ї‡–‹”‡ϐ‹Ž‡•›•–‡Ǥ
Supplement – Computer Science with Python–XII

ȋ „Ȍ ‡’Ž‹ ƒ–‹‘‘ˆϐ‹Ž‡•‘ —”•–Šƒ–†‡ ”‡ƒ•‡••’ƒ ‡‹Šƒ”††‹•Ǥ


ȋ Ȍ Ї› ƒ†‡•–”‘›•›•–‡’”‘‰”ƒ•ƒ†ϐ‹Ž‡•Ǥ
ȋ †Ȍ Ї› ƒ ƒ—•‡†‡•–”— –‹‘‘ˆ•’‡ ‹ϐ‹ ‡š‡ —–ƒ„އϐ‹Ž‡•ƒ†ƒŽ–‡”ƒ–‹‘‹†ƒ–ƒϐ‹Ž‡•”‡•—Ž–‹‰
in reinstallation of a system.
ȋ‡Ȍ Ї› ƒˆ‘”ƒ–•’‡ ‹ϐ‹ –”ƒ •‘–Ї†‹••‘”ˆ‘”ƒ––Ї‡–‹”‡†‹••Ǥ

Prevention from Viruses:


(a) Use antivirus software to permanently remove viruses.
(b) Always scan pen drives and other secondary storage media in order to detect viruses and
safeguard your system.
ȋ Ȍ ”‡“—‡–Ž›—’†ƒ–‡›‘—” ‘’—–‡”•›•–‡Ǥ

CTM: A virus is a malicious program that damages data and files of a system and can also corrupt the file
allocation table.

8.42
2. Worms
A worm is a self-replicating program that runs independently and travels across network
connections. The characteristics of viruses and worms are more or less same, but a worm
causes more damage.
CTM: A worm is a computer program which can self-replicate and propagate over the network, with or
without human intervention, and has malicious content.

Characteristics of Worm:
(a) It replicates itself.
ȋ „Ȍ Ž‹‡˜‹”—•ǡ™‘”†‘‡•‘–”‡“—‹”‡Š‘•–ƒ†‹–‹••‡ŽˆǦ ‘–ƒ‹‡†Ǥ
ȋ Ȍ –•’”‡ƒ†•ƒ ”‘••‡–™‘”•–Š”‘—‰Š‡ƒ‹Žǡ‹•–ƒ–‡••ƒ‰‹‰‘”Œ—ƒ‹Ž•Ǥ
(d) Worms run independently.
The various types of Worms are:
(a) Email Worms:‘”••’”‡ƒ†–Š”‘—‰Šƒ›‡ƒ‹Ž™Š‹ Š ‘–ƒ‹•ƒ›ϐ‹Ž‡ƒ––ƒ Š‡–‘”Ž‹
to any infected website.
(b) Instant Messaging Worms: Worms spread through instant messaging across the network
by sending mails to infected website.
(c) Internet Worms:Ї‹ˆ‡ –‡†™‘”™‹ŽŽ—•‡–Ї ‘–ƒ –Ž‹•–‘ˆ–Ї—•‡”ǯ• Šƒ–Ǧ”‘‘’”‘ϐ‹Ž‡
or instant-message program to send links to infected websites. These are not as effective
as email worms as the recipient needs to accept the message and click the link. The users
of the particular program are affected by it.
(d) File Sharing Network Worms: These types of worms are downloaded along with the
”‡“—‹”‡†ϐ‹Ž‡•†‘™Ž‘ƒ†‡†„›–Ї—•‡”Ǥ—•‡”‹•‘–ƒ™ƒ”‡ƒ„‘—––Š‹•™‘”ƒ†ǡ–Ї”‡ˆ‘”‡ǡ
™Š‡–Ї—•‡”†‘™Ž‘ƒ†•ƒ›ϐ‹Ž‡ǡ–Ї™‘”™‹ŽŽ ‘’›‹–•‡Žˆ‹–‘ƒ•Šƒ”‡†ˆ‘ކ‡”™‹–Šƒ
—ƒ••—‹‰ ƒ‡Ǥ Ї ƒ‘–Ї” —•‡” ‘ –Ї ‡–™‘” †‘™Ž‘ƒ†• ϐ‹Ž‡• ˆ”‘ –Ї •Šƒ”‡†
folder, the worm gets downloaded on their system also. In this way, the worm copies itself
ƒ†”‡’‡ƒ–•–Ї’”‘ ‡••Ǥ ʹͲͲͶǡƒ™‘” ƒŽŽ‡†DzŠƒ–„‘–dz‹ˆ‡ –‡†‹ŽŽ‹‘•‘ˆ ‘’—–‡”•
in this way and had the ability to steal personal information, including credit card details,
and send spam on a large scale.
Damage caused by Worms:
ȋƒȌ ™‘”ƒ› ‘””—’––Їϐ‹Ž‡•‘–ЇŠ‘•– ‘’—–‡”Ǥ
(b) It may affect communication between the host and other systems.
(c) It may disable the antivirus software on the host, which will enable it to cause more damage.
(d) Bulk email chaining can be created with an intention to guess email passwords.
(e) A worm consumes too much system memory (or network bandwidth), causing web servers,
network servers and individual computers to stop responding.

3. Trojan Horse
Computer Networks

”‘ŒƒŠ‘”•‡‹•ƒ‹†‘ˆ˜‹”—•–Šƒ–Ž‘‘••ƒˆ‡„—–Šƒ•Š‹††‡‡ˆˆ‡ –•Ǥ –‹•ƒŠ‹††‡ ‘†‡‹


a program such as a game or a spreadsheet that can damage the system when running these
applications. It can destroy or alter information on a computer system in the background. Unlike
˜‹”—•‡•ǡ ”‘Œƒ• †‘ ‘– ”‡’Ž‹ ƒ–‡ –Ї•‡Ž˜‡• „—– –Ї› ƒ”‡ †‡•–”— –‹˜‡Ǥ ”‘Œƒ• ƒ”‡ ‡š‡ —–ƒ„އ
programs, which means that when a user runs any application or plays games, they work
behind that application and can damage the system completely.
8.43
Ї”‡ƒ”‡•‡˜‡”ƒŽ–›’‡•‘ˆ”‘Œƒ ‘”•‡ǣ
ȋƒȌ ‡‘–‡ƒ ‡••”‘ŒƒŠ‘”•‡
ȋ „Ȍ ƒ–ƒ•‡†‹‰”‘Œƒ•
ȋ Ȍ ‡•–”— –‹˜‡”‘Œƒ•
ȋ †Ȍ ”‘š›”‘Œƒ•
ȋ‡Ȍ ”‘Œƒ•
ȋˆȌ ‡‹ƒŽǦ‘ˆǦ•‡”˜‹ ‡ƒ––ƒ ”‘Œƒ•
”‘Œƒ•ƒ”‡‰‡‡”ƒŽŽ›•’”‡ƒ†–Š”‘—‰Š‡ƒ‹Žƒ––ƒ Š‡–•ƒ†‡š Šƒ‰‡‘ˆ†‹••ƒ†‹ˆ‘”ƒ–‹‘
„‡–™‡‡ ‘’—–‡”•Ǥ‘”• ƒƒŽ•‘•’”‡ƒ†”‘Œƒ•ǤЇ†ƒƒ‰‡ ƒ—•‡†„›”‘Œƒ•‹••‹‹Žƒ”
–‘–Šƒ– ƒ—•‡†„›˜‹”—•‡•Ǥ‘‡–‹‡•–Ї—•‡”‹•—ƒ™ƒ”‡ƒ„‘—–ƒ”‘Œƒ„‡ ƒ—•‡‘ˆ‹–•ƒ•‹‰
effect as it runs as a hidden code.

CTM: Trojan horse is a hidden code that looks safe but it has some hidden effects while running
applications.

4. Spams
’ƒ‹•ƒ—™ƒ–‡†„—Žƒ‹Ž™Š‹ Š‹••‡–„›ƒ—ƒ—–Š‘”‹œ‡†‘”—‹†‡–‹ϐ‹‡†’‡”•‘‹‘”†‡”
–‘‡ƒ––Ї‡–‹”‡†‹••’ƒ ‡Ǥ ‘ǦƒŽ‹ ‹‘—•ˆ‘”ǡ‹–ϐŽ‘‘†•–Ї‹–‡”‡–™‹–Šƒ› ‘’‹‡•‘ˆ
the same message to be sent to a user which he may not otherwise receive. Generally, it is in the
form of pampering the user with various discount schemes, or commercial advertising, often
ˆ‘”†—„‹‘—•’”‘†— –•ǡ‰‡–”‹ Š“—‹ • Ї‡•ǡ‡– Ǥ‘„‹Ž‡’Š‘‡•’ƒ‹•ƒˆ‘”‘ˆ•’ƒ‹‰
–Šƒ–—•‡•–‡š–‡••ƒ‰‡•‡”˜‹ ‡‘ˆ‘„‹Ž‡’Š‘‡Ǥ
’ƒ• ƒ„‡ƒ˜‘‹†‡†„›—•‹‰‡ƒ‹Žϐ‹Ž–‡”‹‰ǡ•’ƒ–”ƒ’•ǡ‡– Ǥ

CTM: Spam refers to electronic junk mail that eats up the entire computer’s space.

8.23 COOKIES
 ‘‘‹‡ ‹• ƒŽ•‘ ‘™ ƒ• ƒ  ‘‘‹‡ǡ ™‡„ ‘‘‹‡ǡ ‹–‡”‡– ‘‘‹‡ ‘” „”‘™•‡” ‘‘‹‡Ǥ
Ї–Ї—•‡”„”‘™•‡•ƒ›™‡„•‹–‡ǡƒ ‘‘‹‡‹†‡–‹ϐ‹‡•—•‡”•ƒ†’”‡’ƒ”‡•™‡„’ƒ‰‡•ˆ‘”–Ї
Supplement – Computer Science with Python–XII

which are then sent to the web server for later use. Cookie is basically a piece of data that is
stored by the website on the user’s hard disk. The information is stored in the form of name
value pair. Generally, the cookies folder is stored in c:\windows\cookies.

Working of Cookies
 ͳǤ Ї—•‡”‡–‡”•–Їƒ‡‘ˆ–Ї™‡„•‹–‡‘–Ї„”‘™•‡”Ǥ
 ʹǤ Ї „”‘™•‡” ‘–ƒ –• –Ї  •‡”˜‡” –‘ ‘˜‡”– –Ї †‘ƒ‹ ƒ‡ ‹–‘  ƒ††”‡••Ǥ Ї
browser looks for the cookies on the hard disk.
 ͵Ǥ Ї ƒ††”‡••‹•—•‡†–‘ ‘–ƒ ––Ї ‘””‡•’‘†‹‰•‡”˜‡”ƒŽ‘‰™‹–Š ‘‘‹‡•†ƒ–ƒǤ
4. If no cookies data is supplied, then the website comes to know that the user is visiting the
™‡„•‹–‡ˆ‘”–Їϐ‹”•––‹‡Ǥ
5. The server creates an ID of a person which is then stored by cookies on the hard disk.

8.44
The information which is stored by a website is known as state information. The information
can be of the following types:
 ͳǤ ‘™ƒ›˜‹•‹–‘”•Šƒ˜‡˜‹•‹–‡†–Ї•‹–‡
2. How many are new visitors
 ͵Ǥ ‘™ƒ›ƒ”‡”‡’‡ƒ–˜‹•‹–‘”•
 ͶǤ Šƒ–‹•–Їˆ”‡“—‡ ›‘ˆƒ’ƒ”–‹ —Žƒ”˜‹•‹–‘”

CTM: Cookies are the messages which are stored by the website on a user’s hard disk whenever they visit
any website.

8.24 FIREWALL
ϐ‹”‡™ƒŽŽ‹•ƒ•‘ˆ–™ƒ”‡–Šƒ–’”‘–‡ –•–Ї’”‹˜ƒ–‡‡–™‘”ˆ”‘—ƒ—–Š‘”‹œ‡†—•‡”ƒ ‡••ǤЇ
ϐ‹”‡™ƒŽŽ ϐ‹Ž–‡”• –Ї ‹ˆ‘”ƒ–‹‘ ‘‹‰ ˆ”‘ –Ї ‹–‡”‡– –‘ –Ї ‡–™‘” ‘” ƒ ‘’—–‡” –‘
’”‘–‡ ––Ї•›•–‡Ǥ ‹”‡™ƒŽŽ‡š‹•–•„‘–Šƒ•ƒ•‘ˆ–™ƒ”‡•‘Ž—–‹‘ƒ†ƒ•ƒŠƒ”†™ƒ”‡ƒ’’Ž‹ ƒ–‹‘Ǥ 
–Їˆ‘”‘ˆŠƒ”†™ƒ”‡ϐ‹”‡™ƒŽŽ•— Šƒ•”‘—–‡”ǡ‹–’”‘–‡ –•–Ї‡–™‘”ǡƒ†‹–‡”•‘ˆ•‘ˆ–™ƒ”‡
ϐ‹”‡™ƒŽŽǡ ‹– Їޒ• ‹ ’”‡˜‡–‹‰ –Ї •’”‡ƒ† ‘ˆ ˜‹”—• ˆ”‘ ‘‡ ‘’—–‡” –‘ ƒ‘–Ї”Ǥ  ϐ‹”‡™ƒŽŽ
is a network security system, either hardware- or software-based, that controls incoming
ƒ†‘—–‰‘‹‰‡–™‘”–”ƒˆϐ‹ „ƒ•‡†‘ƒ•‡–‘ˆ”—އ•Ǥƒ”‹‘—•‡šƒ’އ•‘ˆϐ‹”‡™ƒŽŽ•ƒ”‡ 
ϐ‹”‡™ƒŽŽǡ‡– ‡ƒ”ϐ‹”‡™ƒŽŽǡ‡–• ”‡‡ʹͷǡ‡– Ǥ
ϐ‹”‡™ƒŽŽ ƒ—•‡˜ƒ”‹‘—•‡–Š‘†•ˆ‘”ϐ‹Ž–‡”‹‰–Ї‹ˆ‘”ƒ–‹‘•— Šƒ•ǣ
 ͳǤ ƒ ‡–ϐ‹Ž–‡”‹‰ǣ ’ƒ ‡–ϐ‹Ž–‡”‹‰ǡ–Ї†ƒ–ƒǡ™Š‹ Š‹•‘—–‰‘‹‰‘”‹ ‘‹‰‹–Їˆ‘”
‘ˆ ’ƒ ‡–•ǡ ‹• ϐ‹Ž–‡”‡†Ǥ ƒ ‡– ϐ‹Ž–‡” Ž‘‘• ƒ– ‡ƒ Š ’ƒ ‡– ‡–‡”‹‰ ‘” އƒ˜‹‰ –Ї ‡–™‘”
ƒ† ƒ ‡’–• ‘” ”‡Œ‡ –• ‹– „ƒ•‡† ‘ —•‡”Ǧ†‡ϐ‹‡† ”—އ•Ǥ ƒ ‡– ϐ‹Ž–‡”‹‰ ‹• ˆƒ‹”Ž› ‡ˆˆ‡ –‹˜‡
ƒ†–”ƒ•’ƒ”‡––‘—•‡”•ǡ„—–‹–‹•†‹ˆϐ‹ —Ž––‘ ‘ϐ‹‰—”‡Ǥ ƒ††‹–‹‘ǡ‹–‹••—• ‡’–‹„އ–‘ 
•’‘‘ϐ‹‰Ǥ
2. Proxy service:Ї‹ˆ‘”ƒ–‹‘™Š‹ Š‹•”‡“—‡•–‡†‹•‘–†‹”‡ –Ž›•‡––‘–Ї’‡”•‘™Š‘
ƒ‡•–Ї”‡“—‡•–Ǣ”ƒ–Ї”ǡ–Ї‹ˆ‘”ƒ–‹‘‹•ϐ‹”•–”‡ ‡‹˜‡†‹ϐ‹”‡™ƒŽŽƒ†–Ї•‡––‘–Ї
’”‘𛕇”˜‡”ǤЇ’”‘𛕇”˜‡”‹–‡” ‡’–•ƒŽŽ‡••ƒ‰‡•‡–‡”‹‰ƒ†އƒ˜‹‰–Ї‡–™‘”
and effectively hides the true network addresses.
 ͵Ǥ IP address blocking: If the data is coming from a network or website that contains some
—™ƒ–‡††ƒ–ƒǡ–Ї–Ї†ƒ–ƒˆ”‘–Šƒ–’ƒ”–‹ —Žƒ” ƒ††”‡••‘”†‘ƒ‹ƒ‡‹•„Ž‘ ‡†
„›ϐ‹”‡™ƒŽŽǤ
4. Protocol blocking:Їϐ‹”‡™ƒŽŽ ƒ„‡•‡––‘†‹•ƒŽŽ‘™ƒ’ƒ”–‹ —Žƒ”’”‘–‘ ‘Ž•‡”˜‹ ‡–‘ƒ
particular user or group of users.
5. Application Gateway: –ƒ’’Ž‹‡••‡ —”‹–›‡ Šƒ‹••–‘•’‡ ‹ϐ‹ ƒ’’Ž‹ ƒ–‹‘•ǡ•— Šƒ• 
and Telnet servers. This is very effective but can impose performance degradation.
 ͸Ǥ Circuit-level Gateway: –ƒ’’Ž‹‡••‡ —”‹–›‡ Šƒ‹••™Š‡ƒ‘” ‘‡ –‹‘‹•
‡•–ƒ„Ž‹•Ї†Ǥ  ‡ –Ї ‘‡ –‹‘ Šƒ• „‡‡ ƒ†‡ǡ ’ƒ ‡–• ƒ ϐŽ‘™ „‡–™‡‡ –Ї Š‘•–•
Computer Networks

without further checking.


7. Port blocking:Їϐ‹”‡™ƒŽŽ ƒ„‡—•‡†–‘„Ž‘ ƒ’ƒ”–‹ —Žƒ”„Ž‘ Ǥ ‡‡”ƒŽŽ›ǡ ƒ†
•‡”˜‹ ‡•—•‡’‘”–ͺͲƒ†’‘”–ʹͳǤ

8.45
Firewall protects the user from the following:
ͳǤ ‡‘–‡Ž‘‰‹„›‘–Ї”•™Š‘ƒ”‡‘–ƒ—–Š‘”‹œ‡†–‘‰ƒ‹ƒ ‡••–‘–Ї•›•–‡
2. Application backdoors
͵Ǥ •‡••‹‘Š‹Œƒ ‹‰
ͶǤ ƒ‹Ž„‘„•
5. Viruses and macros
͸Ǥ ’ƒ‘”Œ—ƒ‹Ž•

CTM: Firewall is a system that is designed to protect the network from illegal use by an unauthorized
person.

8.25 INDIA’S IT ACT


The Information Technology Act 2000 (also known as ITA-2000 or the IT Act) is an Act of
–Ї †‹ƒƒ”Ž‹ƒ‡–ȋ‘Ǥʹͳ‘ˆʹͲͲͲȌ‘–‹ϐ‹‡†‘ –‘„‡”ͳ͹ǡʹͲͲͲǤ
 –ǡʹͲͲͲŠƒ•„‡‡†‡ϐ‹‡†ƒ•ǣ
Dz  – –‘ ’”‘˜‹†‡ އ‰ƒŽ ”‡ ‘‰‹–‹‘ ˆ‘” –”ƒ•ƒ –‹‘• ƒ””‹‡† ‘—– „› ‡ƒ• ‘ˆ ‡Ž‡ –”‘‹  †ƒ–ƒ
interchange and other means of electronic communication, commonly referred to as ’electronic
commerce‘, which involve the use of alternatives to paper-based methods of communication
ƒ† •–‘”ƒ‰‡ ‘ˆ ‹ˆ‘”ƒ–‹‘ǡ –‘ ˆƒ ‹Ž‹–ƒ–‡ ‡Ž‡ –”‘‹  ϐ‹Ž‹‰ ‘ˆ †‘ —‡–• ™‹–Š –Ї ‘˜‡”‡–
ƒ‰‡ ‹‡• ƒ† ˆ—”–Ї” –‘ ƒ‡† –Ї †‹ƒ ‡ƒŽ ‘†‡ǡ –Ї †‹ƒ ˜‹†‡ ‡  –ǡ ͳͺ͹ʹǡ –Ї
ƒ‡”•ǯ ‘‘• ˜‹†‡ ‡  –ǡ ͳͺͻͳ ƒ† –Ї ‡•‡”˜‡ ƒ ‘ˆ †‹ƒ  –ǡ ͳͻ͵Ͷ ƒ† ˆ‘” ƒ––‡”•
‘‡ –‡†–Ї”‡™‹–Š‘”‹ ‹†‡–ƒŽ–Ї”‡–‘Ǥdz

8.26 CYBER LAW


The law that governs the cyber space is known as cyber law. It is the law which deals with
various computer-related activities. In essence, cyber law is an attempt to apply laws designed
for the physical world to human activity on the internet. In India, the IT Act, 2000, as amended
by the IT (Amendment) Act, 2008, is known as the cyber law. It has a separate Chapter XI entitled
Dzˆˆ‡ ‡•dz‹™Š‹ Š˜ƒ”‹‘—• ›„‡” ”‹‡•Šƒ˜‡„‡‡†‡ Žƒ”‡†ƒ•’‡ƒŽ‘ˆˆ‡ ‡•’—‹•Šƒ„އ™‹–Š
Supplement – Computer Science with Python–XII

‹’”‹•‘‡–ƒ†ϐ‹‡ǤŽƒ”‰‡—„‡”‘ˆ ›„‡”Ǧ ”‹‹ƒŽƒ –‹˜‹–‹‡••— Šƒ•Šƒ ‹‰’ƒ••™‘”†•


‘” ƒ ‡••‹‰ ϐ‹Ž‡• „› ƒ —ƒ—–Š‘”‹œ‡† ’‡”•‘ ‘” ‰‡––‹‰ ’”‹˜ƒ–‡ ‹ˆ‘”ƒ–‹‘ǡ ‡– Ǥǡ Šƒ˜‡ „‡‡
prevented by implementing cyber laws.
•–Ї—•ƒ‰‡‘ˆ‹–‡”‡–Šƒ•„‡‡‰”‘™‹‰ƒ–ƒ‡š’‘‡–‹ƒŽ”ƒ–‡ǡ‹–Šƒ•„‡ ‘‡˜‡”›‹’‘”–ƒ–
to protect individual users and organizations from unauthorized intruders into the system.

CTM: Cyber law defines all the legal and regulatory aspects of internet and the World Wide Web.

8.27 CYBER CRIMES


When any crime is committed over the internet, it is referred to as cyber crime. There are many
–›’‡•‘ˆ ›„‡” ”‹‡•ƒ†–Ї‘•– ‘‘‘‡•ƒ”‡‡š’Žƒ‹‡†„‡Ž‘™ǣ
 ͳǤ Hacking: Gaining knowledge about someone’s private and sensitive information by getting
access to their computer system illegally is known as hacking. This is different from ethical
hacking, which many organizations use to check their internet security protection. In
8.46
hacking, a criminal uses a variety of software so as to enter a person’s computer and that
person may not be aware of his computer being accessed from a remote location.
2. Theft: Theft occurs when a person downloads music, movies, games and software by violating
copyright. There are even peer-sharing websites which encourage software piracy and many
of these websites are now being targeted by the Federal Bureau of Investigation (FBI).
 ͵Ǥ Cyber Stalking: Cyber stalking is a kind of online harassment where the victim gets
unwanted abusive online messages and emails. Typically, these stalkers know their victims
ƒ† ‹•–‡ƒ† ‘ˆ ”‡•‘”–‹‰ –‘ ‘ˆϐŽ‹‡ •–ƒŽ‹‰ǡ –Ї› —•‡ –Ї ‹–‡”‡– –‘ •–ƒŽǤ ˆ –Ї› ‘–‹ ‡
–Šƒ– ›„‡”•–ƒŽ‹‰‹•‘–Šƒ˜‹‰–Ї†‡•‹”‡†‡ˆˆ‡ –ǡ–Ї›„‡‰‹‘ˆϐŽ‹‡•–ƒŽ‹‰ƒŽ‘‰™‹–Š
cyber stalking to make their victim’s life miserable.
4. Identity Theft:Š‹•Šƒ•„‡ ‘‡ƒƒŒ‘”’”‘„އ™‹–Š’‡‘’އ—•‹‰–Ї‹–‡”‡–ˆ‘” ƒ•Š
transactions and banking services. In this cyber crime, a criminal accesses data about a
person’s bank account, credit card, social security card, debit card and other sensitive
information to gain money or to buy things online in the victim’s name that can result in
ƒŒ‘”ϐ‹ƒ ‹ƒŽŽ‘••ˆ‘”–Ї˜‹ –‹ƒ†‡˜‡•’‘‹Ž–Ї˜‹ –‹ǯ• ”‡†‹–Š‹•–‘”›Ǥ
5. Malicious Software: These are internet-based software or programs known as pirated
software that are used to disrupt proper functioning of the network. The software is used
–‘ •–‡ƒŽ •‡•‹–‹˜‡ ‹ˆ‘”ƒ–‹‘ ‘” †ƒ–ƒ –Šƒ– ƒ ƒ—•‡ †ƒƒ‰‡ –‘ ‡š‹•–‹‰ •‘ˆ–™ƒ”‡ ‹ ƒ
computer system.
 ͸Ǥ Child Pornography: In this cyber crime, defaulters create, distribute or access materials
–Šƒ–•‡š—ƒŽŽ›‡š’Ž‘‹–—†‡”ƒ‰‡ Ћކ”‡ǤЇ ”‹‹ƒŽ••‘Ž‹ ‹–‹‘”•˜‹ƒ Šƒ–”‘‘•ˆ‘”–Ї
purpose of child pornography. The FBI has been spending a lot of time monitoring chat
”‘‘•ˆ”‡“—‡–‡†„› Ћކ”‡™‹–Š–ЇŠ‘’‡‘ˆ”‡†— ‹‰ƒ†’”‡˜‡–‹‰ Ћކƒ„—•‡ƒ†
soliciting.
7. Sales and Investment Fraud: With the increase in e-commerce, the application of digital
technology to fraudulent endeavours has become that much greater. The use of telephone
for fraudulent sales pitches, deceptive charitable solicitations or bogus investment
overtures is becoming increasingly common. There are some fraudulent sites that sell
’‘‘”“—ƒŽ‹–›’”‘†— –•ƒ– Їƒ’‡””ƒ–‡•ǤЇ›ƒŽ•‘’”‘‹•‡–Ї —•–‘‡”•Їƒ˜›†‹• ‘—–•
and freebies.
8. Electronic Funds Transfer Fraud: A cyber crime occurs when there is a transfer of
funds which may be intercepted and diverted. Valid credit card numbers can be hacked
electronically and then misused by a fraudulent person or organization.
 ͻǤ Defamation: It involves a cyber crime with the intent of lowering the dignity of someone by
hacking into their email account and sending mails using vulgar language to an unknown
person’s account.
ͳ
 ͲǤ Assault by Threat: It refers to threatening a person or his family members with dire
‘•‡“—‡ ‡•–Š”‘—‰Š–Ї—•‡‘ˆƒ ‘’—–‡”‡–™‘”ǡi.e., email, videos or phones.
ͳ
 ͳǤ Denial of Service (DoS) Attacks: A DoS attack is an attack by which legitimate users of
Computer Networks

a computer are denied access or use of the resources of that computer. Generally, DoS
attacks do not allow the attacker to modify or access information on the computer. A DoS
attack can be of the following types:
• Denial of Access to Information: Refers to an attack in which information sought by
a legitimate user is either destroyed or changed to some unsubtle form.
8.47
• Denial of Access to Applications: Refers to an attack that denies a user from accessing
an application by making it either unusable or unavailable. This is usually done to
prevent the user (or organization) from using applications to perform any task.
• Denial of Access to Systems: Refers to the unavailability of the system, including all
the applications installed on the system or any data stored on the system.
• Denial of Access to Communications: Refers to a common type of attack that can
”ƒ‰‡ˆ”‘ —––‹‰™‹”‡•ƒ†Œƒ‹‰”ƒ†‹‘ ‘—‹ ƒ–‹‘•–‘ϐŽ‘‘†‹‰‡–™‘”•
™‹–Ї𠇕•‹˜‡–”ƒˆϐ‹ Ǥ‡šƒ’އ‘ˆ–Š‹•–›’‡‘ˆƒ––ƒ ‹•ϐŽ‘‘†‹‰ƒ ‘’—–‡”™‹–Š
Œ—ƒ‹ŽǤ

8.28 IPR ISSUES


 •–ƒ†• ˆ‘” ‹–‡ŽŽ‡ –—ƒŽ ’”‘’‡”–› ”‹‰Š–• ™Š‹ Š ‹• –Ї ”‹‰Š– –‘ ‹–ƒ‰‹„އ ’”‘’‡”–› •— Š ƒ•
music, literature and artistic work created by a person. Intellectual property (IP) is a legal
term that refers to creations of the mind. Intellectual property rights may be protected by
’ƒ–‡–•ǡ ‘’›”‹‰Š–•ǡ‹†—•–”‹ƒŽ†‡•‹‰”‹‰Š–•ǡ–”ƒ†‡ƒ”•ǡ–”ƒ†‡†”‡••ƒ†ǡ‹•‘‡Œ—”‹•†‹ –‹‘•ǡ
trade secrets. The owner of intellectual property is the person who has developed the product
or the organization which has funded it. Safeguarding intellectual property from illegal use
ƒ „‡ †‘‡ „› ‰‹˜‹‰ •‘‡ ‡š Ž—•‹˜‡ ”‹‰Š–• –‘ –Ї ‘™‡” ‘ˆ –Šƒ– ’”‘’‡”–›Ǥ Ї•‡ ”‹‰Š–• ƒŽ•‘
promote creativity and dissemination and application of its result and encourage fair trading
which helps in developing social and economic areas of a country.
Ǧ”‡Žƒ–‡† ‹••—‡• ‹ †‹ƒ Ž‹‡ ’ƒ–‡–•ǡ –”ƒ†‡ƒ”•ǡ ‘’›”‹‰Š–•ǡ †‡•‹‰• ƒ† ‰‡‘‰”ƒ’Š‹ ƒŽ
‹†‹ ƒ–‹‘• ƒ”‡ ‰‘˜‡”‡† „› –Ї ƒ–‡–•  –ǡ ͳͻ͹Ͳ ƒ† ƒ–‡– —އ•ǡ ʹͲͲ͵ǡ ”ƒ†‡ƒ”•  –ǡ
ͳͻͻͻ ƒ† –Ї ”ƒ†‡ƒ”• —އ•ǡ ʹͲͲʹǡ †‹ƒ ‘’›”‹‰Š–•  –ǡ ͳͻͷ͹ǡ ‡•‹‰  –ǡ ʹͲͲͲ ƒ†
‡•‹‰ —އ•ǡ ʹͲͲͳǡ ƒ† –Ї ‡‘‰”ƒ’Š‹ ƒŽ †‹ ƒ–‹‘• ‘ˆ ‘‘†• ȋ‡‰‹•–”ƒ–‹‘ Ƭ ”‘–‡ –‹‘Ȍ
 –ǡͳͻͻͻƒ†–Ї ‡‘‰”ƒ’Š‹ ƒŽ †‹ ƒ–‹‘•‘ˆ ‘‘†•ȋ‡‰‹•–”ƒ–‹‘Ƭ”‘–‡ –‹‘Ȍ—އ•ǡʹͲͲʹǡ
respectively.

Prevention from Security Threats


There are various methods to protect network threats. These protection methods are as follows:
 ͳǤ Authorization: Authorization means Intrusion Detection. Authorization means to grant a
Supplement – Computer Science with Python–XII

person access to a network for legal use. It is an act of giving authority or legal identity
to a user to become an authorized user of the system. Authorization checks can also be
implemented to a program or process to make data free of risk, such as entering of viruses,
™‘”•‘””‘ŒƒŠ‘”•‡Ǥ
2. Authentication: To determine the identity of a person before granting access to private
or sensitive data or information is known as authentication. Verifying the identity of an
‹–”—†‡”‘”ƒ’‡”•‘‹•†‹ˆϐ‹ —Ž–ƒ†‡‡†• ‘’އš’”‘–‘ ‘Ž•„ƒ•‡†‘ ”›’–‘‰”ƒ’Š›Ǥ
 ͵Ǥ Privacy: The data which is accessible only to an authorized person is known as private data.
4. Secrecy: Hiding some relevant information from an unauthorized person is called secrecy.
5. Biometric System: Biometric system forms the most secure level of authorization. It
‹˜‘Ž˜‡•†‹‰‹–ƒŽ•‹‰ƒ–—”‡ǡϐ‹‰‡”’”‹–•ǡ”‡–‹ƒŽ’ƒ––‡”•ǡ‡– Ǥǡ–‘‡•–ƒ„Ž‹•Š‹†‡–‹–›Ǥ
 ͸Ǥ Password Protection: To protect the system or network from an unauthorized person, a
system must be password protected. A password protected system allows access to resources
based upon a secret word entered by the user.
8.48
7. File Permission:—•‡” ƒ‰‹˜‡ƒ ‡••–‘ƒ’‡”•‘–‘”‡ƒ†ƒϐ‹Ž‡ǡ™”‹–‡–‘ƒϐ‹Ž‡ǡ‘’‡ƒϐ‹Ž‡ǡ
‘†‹ˆ›ƒϐ‹Ž‡ǡ‡– Ǥ‹ˆˆ‡”‡––›’‡•‘ˆ’‡”‹••‹‘• ƒ„‡‰‹˜‡–‘ƒ•’‡ ‹ϐ‹ ’‡”•‘ƒ ‘”†‹‰
–‘–Ї‹”ƒ—–Š‘”‹œƒ–‹‘Ǥƒ Šϐ‹Ž‡Šƒ•ƒƒ ‡•• ‘–”‘ŽŽ‹•–ƒ––”‹„—–‡–Šƒ–†‡• ”‹„‡•™Š‹ Š—•‡”
‘”‰”‘—’ƒ ‘—–•Šƒ˜‡™Šƒ––›’‡‘ˆƒ ‡••–‘–Їϐ‹Ž‡Ǥ
  Š”‡‡–›’‡•‘ˆϐ‹Ž‡ƒ ‡••’‡”‹••‹‘•–Šƒ–ƒ”‡‰”ƒ–‡†–‘ƒ—•‡”ǣ
(a) Read:ŽŽ‘™•ƒ—•‡”–‘˜‹‡™ƒ†”‡ƒ†ƒϐ‹Ž‡Ǥ
(b) Write:ŽŽ‘™•ƒ—•‡”–‘‡†‹–ƒ†™”‹–‡‘ƒϐ‹Ž‡Ǥ
(c) Execute:ŽŽ‘™•ƒ—•‡”–‘‡š‡ —–‡ƒϐ‹Ž‡Ǥ
File access permission is granted to three types of users:
(a) Owner:‡ˆ‡”•–‘–Ї—•‡”™Š‘Šƒ• ”‡ƒ–‡†–Їϐ‹Ž‡Ǥ
(b) Group:‡ˆ‡”•–‘–Ї‰”‘—’‘ˆ—•‡”•™Š‹ Š‹•™‘”‹‰™‹–Š–Їϐ‹Ž‡‘™‡”Ǥ
(c) Others: Refers to all other users.
8. Firewall:ϐ‹”‡™ƒŽŽ‹•ƒ’ƒ”–‘ˆƒ ‘’—–‡”•›•–‡‘”‡–™‘”–Šƒ–‹•†‡•‹‰‡†–‘„Ž‘ 
unauthorized access while permitting authorized communication. It is a programmer
•‘ˆ–™ƒ”‡‘”†‡˜‹ ‡‘”•‡–‘ˆ†‡˜‹ ‡• ‘ϐ‹‰—”‡†–‘’‡”‹–ǡ†‡›ǡ‡ ”›’–ǡ†‡ ”›’–ǡ‘”’”‘š›
™ƒŽŽȋ‹ƒ†‘—–Ȍ ‘’—–‡”–”ƒˆϐ‹ „‡–™‡‡†‹ˆˆ‡”‡–•‡ —”‹–›†‘ƒ‹•„ƒ•‡†—’‘ƒ•‡–‘ˆ
rules and other criteria.
 ͻǤ Proper Security Policy: An organization’s security policy is a formal statement consisting
of the rules that its employees need to follow to access information about the organization.
The policy should clearly communicate the security goals to all the users, administrators
and managers of the organization. A good security policy must be:
¾ ‡ˆ‘” ‡†™‹–Šƒ†‡“—ƒ–‡•‡ —”‹–›–‘‘Ž•Ǥ
¾ ƒ„އ–‘†‡ϐ‹‡–Їƒ”‡ƒ•‘ˆ”‡•’‘•‹„‹Ž‹–›ˆ‘”ƒ—•‡”ǡƒƒ†‹‹•–”ƒ–‘”‘”ƒƒƒ‰‡”Ǥ
¾ ƒ„އ–‘ƒ†Œ—•–‹–•‡Žˆƒ ‘”†‹‰–‘–Ї Šƒ‰‹‰ ‘ϐ‹‰—”ƒ–‹‘•‘ˆ ‘’—–‡”‡–™‘”•Ǥ

8.29 HACKING
Hacking is the practice of modifying the features of a system in order to accomplish a goal
outside the creator’s original purpose. A person who consistently engages in hacking activities
and has accepted hacking as a lifestyle and philosophy of their choice is called a hacker.
‘’—–‡” Šƒ ‹‰ ‹• –Ї ‘•– ’‘’—Žƒ” ˆ‘” ‘ˆ Šƒ ‹‰ ‘™ƒ†ƒ›•ǡ ‡•’‡ ‹ƒŽŽ› ‹ –Ї ϐ‹‡Ž† ‘ˆ
‘’—–‡”•‡ —”‹–›Ǥ ‘™‡˜‡”Šƒ ‹‰‡š‹•–•‹ƒ›‘–Ї”ˆ‘”•ƒŽ•‘ǡ•— Šƒ•’Š‘‡Šƒ ‹‰ǡ
brain hacking, etc., and it is not limited to either of them.
Due to the mass attention given to black hat hackers by the media, the whole hacking term is
often mistaken for any security-related cyber crime.

8.30 INTRODUCTION TO WEB SERVICES


Computer Networks

–‡”‡–‘ˆˆ‡”••‡˜‡”ƒŽ‹’‘”–ƒ–ƒ†‡š–‡•‹˜‡Ž›—•‡†ˆ‡ƒ–—”‡•‘”•‡”˜‹ ‡•™Š‹ Šƒ”‡†‡• ”‹„‡†


as follows:

8.49
8.30.1 WWW (World Wide Web)
WWW is an information service that can be used for sending and receiving information over
–Ї ‹–‡”‡– –Š”‘—‰Š ‹–‡”Ž‹‡† Š›’‡”–‡š– †‘ —‡–•Ǥ ‡„ ’ƒ‰‡• ƒ› ‘–ƒ‹ –‡š–ǡ ‹ƒ‰‡•ǡ
videos and other multimedia components as well as web navigation features consisting of
Š›’‡”Ž‹•Ǥ Ї †‘ —‡–• ƒ”‡ ˆ‘”ƒ––‡† ‹ ƒ ƒ”—’ Žƒ‰—ƒ‰‡ ƒŽŽ‡†  ȋ ›’‡” ‡š–
Markup Language) that provides links to other documents as well as graphics, audio and video
ϐ‹Ž‡•Ǥ Ї ‘”ކ ‹†‡ ‡„ ‹• „ƒ•‡† —’‘ Ž‹‡–Ǧ•‡”˜‡” ƒ” Š‹–‡ –—”‡ ™Š‡”‡ ƒ Ž‹‡– •‡†• ƒ
”‡“—‡•–ƒ†–Ї•‡”˜‡”’”‘ ‡••‡•–Šƒ–”‡“—‡•–ƒ†•‡†•”‡•’‘•‡•Ǥ Ž‹‡–‹• ƒŽŽ‡†ƒ
web browser and a WWW server is called a web server.
CTM: WWW is a set of programs and protocols that allows the user to create and display multimedia web
pages and is linked to the internet.

8.30.2 Hyper Text Markup Language (HTML)


HTML is a language that is used to create web pages which are then displayed by web browsers.
Š‹•Žƒ‰—ƒ‰‡–‡ŽŽ•–Ї„”‘™•‡”Š‘™–‘†‹•’Žƒ›–‡š–ǡ’‹ –—”‡•ƒ†Ž‹•‘–Ї• ”‡‡Ǥ ‹•ƒ
language that supports multimedia documents and consists of audio, video, graphics, pictures,
etc. It also helps in creating hyperlinks so that various documents can be linked together.
Їƒ’‡”•‘ Ž‹ •‘ƒ•’‡ ‹ϐ‹‡†Ž‹ǡ–Ї†‘ —‡–”‡Žƒ–‡†–‘–Šƒ–Ž‹†‹•’Žƒ›•Ǥ ‹•ƒ
†‘ —‡–Žƒ›‘—–ƒ†Š›’‡”Ž‹•’‡ ‹ϐ‹ ƒ–‹‘Žƒ‰—ƒ‰‡ǡi.e., a language that uses various coded
elements known as tags for formatting the document and to specify the hyperlinks.
†‘ —‡– ƒ„‡™”‹––‡—•‹‰ƒ›–‡š–‡†‹–‘”•— Šƒ•‘”ʹƒ†•ƒ˜‡
ƒϐ‹Ž‡™‹–Ї𖇐•‹‘‡‹–Ї”.HTM or .HTML.
› †‘ —‡–ǡ‹‰‡‡”ƒŽǡ ‘–ƒ‹•ƒ–އƒ•––Š”‡‡‡Ž‡‡–•Ȅ ǡ ǡƒ†Ǥ
Ї•‡‡Ž‡‡–•ƒ”‡•’‡ ‹ϐ‹‡†„›–Їˆ‘ŽŽ‘™‹‰”‡•’‡ –‹˜‡–ƒ‰•ǣ
ͳǤ <HTML> . . .</HTML>
2. <HEAD> . . .</HEAD>
͵Ǥ <BODY> . . .</BODY>
<HTML>
The items in the HTML head element
Supplement – Computer Science with Python–XII

<HEAD> are not shown in the browser except


the title of the document which is
</HEAD> shown in the browser’s title bar.

<BODY> This is the section that holds


everything that is actually displayed.
</BODY> All the text, headers, tables, etc., are
written in the body tag.
</HTML>

The structure of HTML document is as follows:


<HTML>
<HEAD>
<TITLE>Š‹•‹•›ϐ‹”•–’ƒ‰‡</TITLE>
 ԙԙԙԙ</HEAD>
 ԙԙ<BODY> ƒ™”‹–‹‰›ϐ‹”•–’ƒ‰‡—•‹‰Š–ŽǤ
 ԙԙ</BODY>
8.50 </HTML>
‘™ǡ‡š‡ —–‡–Š‹•ϐ‹Ž‡—•‹‰ƒ›™‡„„”‘™•‡”ƒ†‹–™‹ŽŽ†‹•’Žƒ›ƒ’ƒ‰‡ƒ•„‡Ž‘™ǣ

CTM: HTML is a Markup language that enables users to create web pages and format them using predefined
tags. Tags are called coded elements.

8.30.3 Extensible Markup Language (XML)


𖇐•‹„އ ƒ”—’ ƒ‰—ƒ‰‡ ‹• ƒ –‡š–Ǧ„ƒ•‡† ƒ”—’ ƒ‰—ƒ‰‡ –Šƒ– ƒŽŽ‘™• –Ї —•‡” –‘ ”‡ƒ–‡
their own tags to store data in a structured format. However, these structured formats can be
”‡’”‡•‡–‡† ‹ †‹ˆˆ‡”‡– ™ƒ›•Ǥ  ǡ –Ї –ƒ‰• ƒ”‡ ‘– ’”‡†‡ϐ‹‡†Ǣ ”ƒ–Ї”ǡ –Ї› ƒ”‡ ”‡ƒ–‡†
by the user for their own purpose. Unlike HTML, in XML, tags are case-sensitive and each tag
—•–Šƒ˜‡ƒ ‘””‡•’‘†‹‰ Ž‘•‹‰–ƒ‰Ǥ –‹•ƒ‰‡‡”ƒŽǦ’—”’‘•‡•’‡ ‹ϐ‹ ƒ–‹‘–Šƒ–ƒŽŽ‘™•—•‡”•
to create custom Markup language. XML was designed to carry data and not to display data.
For formatting data, a separate style sheet known as cascading style sheet is used.
‹•”‡ ‘‡†‡†„›–Ї‘”ކ‹†‡‡„‘•‘”–‹—ȋ͵ȌǤ –‹•ƒˆ”‡‡‘’‡•–ƒ†ƒ”†Ǥ
Ї͵”‡ ‘‡†ƒ–‹‘•’‡ ‹ϐ‹‡•„‘–Š–ЇŽ‡š‹ ƒŽ‰”ƒƒ”ƒ†–Ї”‡“—‹”‡‡–•ˆ‘”’ƒ”•‹‰Ǥ
Structure of XML document:
<?xml version="1.0">
<Client>
<Clientid>C100</Clientid>
<Clientname>Johnson</Clientname>
<Company>APPLE</Company>
</Client>
<Client>
<Clientid>C101</Clientid>
<Clientname>McGraw</Clientname>
<Company>HCL</Company>
Computer Networks

</Client>
</xml>

CTM: XML is a Markup Language for creating documents in a structured format. Users can create their own
tags along with predefined tags already defined by HTML.

8.51
8.30.4 Hyper Text Transfer Protocol (HTTP)
‹•—•‡†–‘–”ƒ•ˆ‡”ƒŽŽϐ‹Ž‡•ƒ†‘–Ї”†ƒ–ƒȋ ‘ŽŽ‡ –‹˜‡Ž› ƒŽŽ‡†”‡•‘—” ‡•Ȍˆ”‘‘‡ ‘’—–‡”
–‘ƒ‘–Ї”‘–Ї‘”ކ‹†‡‡„ǤŠ‹•’”‘–‘ ‘Ž‹•—•‡†–‘–”ƒ•ˆ‡”Š›’‡”–‡š–†‘ —‡–•‘˜‡”
–Ї‹–‡”‡–Ǥ †‡ϐ‹‡•Š‘™–Ї†ƒ–ƒ‹•ˆ‘”ƒ––‡†ƒ†–”ƒ•‹––‡†‘˜‡”–Ї‡–™‘”ǤЇ
ƒ  Ž‹‡–ȋƒ„”‘™•‡”Ȍ•‡†•ƒ”‡“—‡•––‘ƒ •‡”˜‡”ȋ™‡„•‡”˜‡”Ȍǡ–Ї•‡”˜‡”•‡†•
”‡•’‘•‡•„ƒ –‘–Ї Ž‹‡–ǤŠ‹•–”ƒ•ˆ‡”‘ˆ”‡“—‡•–•ƒ†”‡•’‘•‡•‹•†‘‡ˆ‘ŽŽ‘™‹‰ 
protocol.
The main features of an HTTP document are:
 ͳǤ –‹•ƒ•–ƒ–‡Ž‡••’”‘–‘ ‘ŽǢ–Š‹•‡ƒ•–Šƒ–•‡˜‡”ƒŽ ‘ƒ†•ƒ”‡‡š‡ —–‡†•‹—Ž–ƒ‡‘—•Ž›
™‹–Š‘—–‘™‹‰–Ї ‘ƒ†™Š‹ Š‹•ƒŽ”‡ƒ†›‡š‡ —–‹‰„‡ˆ‘”‡ƒ‘–Ї” ‘ƒ†Ǥ
 ʹǤ –‹•ƒ‘„Œ‡ –Ǧ‘”‹‡–‡†’”‘–‘ ‘Ž–Šƒ–—•‡• Ž‹‡–•‡”˜‡”‘†‡ŽǤ
 ͵Ǥ Ї„”‘™•‡”ȋ Ž‹‡–Ȍ•‡†•”‡“—‡•––‘–Ї•‡”˜‡”ǡ–Ї•‡”˜‡”’”‘ ‡••‡•‹–ƒ†•‡†•”‡•’‘•‡•
to the client.
4. It is used for displaying web pages on the screen.

8.30.5 Domain Names


‘ ‘—‹ ƒ–‡‘˜‡”–Ї‹–‡”‡–ǡ™‡ ƒ—•‡ ƒ††”‡••‡•Ǥ—–‹–‹•‘–’‘••‹„އ–‘”‡‡„‡”
–Ї ƒ††”‡••‘ˆƒ’ƒ”–‹ —Žƒ”™‡„•‹–‡‘” ‘’—–‡”‡˜‡”›–‹‡Ǥ‘ƒ‹ƒ‡•ƒ‡‹–‡ƒ•‹‡”–‘
”‡•‘Ž˜‡ ƒ††”‡••‡•‹–‘ƒ‡•ǡfor example, cbse.nic.in, google.com, meritnation.com, etc. It is the
system which assigns names to some computers (web servers) and maintains a database of these
ƒ‡•ƒ† ‘””‡•’‘†‹‰ ƒ††”‡••‡•Ǥ‘ƒ‹ƒ‡•ƒ”‡—•‡†‹•–‘‹†‡–‹ˆ›’ƒ”–‹ —Žƒ”
web servers, for example, in the URL https://www.cbse.nic.in/welcome.htm, the domain name is
cbse.nic.in.
A domain name consists of the following parts.
 ͳǤ ‘’Ǧއ˜‡Ž†‘ƒ‹ƒ‡‘”’”‹ƒ”›†‘ƒ‹ƒ‡ǡƒ†
2. Sub-domain name(s).
For example,
In the domain name cbse.nic.in:
Supplement – Computer Science with Python–XII

in is the primary domain name


nic is the sub-domain of in
cbse is the sub-domain of nic.
The top-level domains are categorized into following domain names:
Generic Domain Names
·com - commercial business
  ȉ‡†—Ǧ†— ƒ–‹‘ƒŽ‹•–‹–—–‹‘•
·gov - Government agencies
·mil - Military
·net - Network organizations
  ȉ‘”‰Ǧ”‰ƒ‹œƒ–‹‘•ȋ‘Ǧ’”‘ϐ‹–Ȍ

8.52
‘—–”›’‡ ‹ϐ‹ ‘ƒ‹ƒ‡•
.in - India
·au - Australia
·ca - Canada
.ch - China
.nz - New Zealand
  Ǥ’Ǧƒ‹•–ƒ
  ǤŒ’Ǧ ƒ’ƒ
.us - United States of America

8.30.6 URL
URL stands for uniform resource locator that helps in locating a particular website or a web
page, for example, http://www.cbse.nic.in/academics.html ‹• ƒ  ˆ‘” ƒ •’‡ ‹ϐ‹  ™‡„•‹–‡Ǥ 
–Š‹• ǡ ǮŠ––’ǯ •–ƒ†• ˆ‘” Š›’‡”–‡š– –”ƒ•ˆ‡” ’”‘–‘ ‘Žǡ ƒ† Ǯ™™™Ǥ „•‡Ǥ‹ Ǥ‹ǯ ‹†‹ ƒ–‡• –Ї 
ƒ††”‡••‘”–Ї†‘ƒ‹ƒ‡™Š‡”‡–Ї•‘—” ‡‹•Ž‘ ƒ–‡†ǤǮƒ ƒ†‡‹ •ǤŠ–Žǯ•’‡ ‹ϐ‹‡•–Їƒ‡
‘ˆ–Ї•’‡ ‹ϐ‹‡†Š–Ž†‘ —‡–‘–Ї™‡„•‹–‡‘ˆǤ

CTM: URL stands for uniform resource locator that stores the address of a web page.

8.30.7 IP Address
The computers connected to a network also need to follow some rules to communicate with
each other. These sets of rules are known as protocols. Several types of protocols are used for
communication over networks. However, the most common one is the Transmission Control
”‘–‘ ‘ŽȀ –‡”‡–”‘–‘ ‘Ž‘”Ȁ Ǥ‡–™‘”—•‹‰Ȁ ‹•‘™ƒ•ƒȀ ‡–™‘”Ǥ
Ї‹–‡”‡–‹•ƒ‡šƒ’އ‘ˆ–ЇȀ ‡–™‘”ǤЇ”‡ˆ‘”‡ǡ‹–„‡ ‘‡•‹’‘”–ƒ––Šƒ–‡ƒ Š
†‡˜‹ ‡•Š‘—ކŠƒ˜‡ƒ—‹“—‡ƒ††”‡••–‘‹†‡–‹ˆ›‹–‘ƒȀ ‡–™‘”ǤŠ‹•—‹“—‡ƒ††”‡••‹•
‘™ƒ• ƒ††”‡••Ǥ ƒ††”‡••‹••Š‘”–ˆ‘” –‡”‡–”‘–‘ ‘Žȋ Ȍƒ††”‡••Ǥ ƒ††”‡••‹•ƒ
‹†‡–‹ϐ‹‡”ˆ‘”ƒ ‘’—–‡”‘”†‡˜‹ ‡‘ƒȀ ‡–™‘”Ǥ‡–™‘”•—•‹‰–ЇȀ ’”‘–‘ ‘Ž
”‘—–‡‡••ƒ‰‡•„ƒ•‡†‘–Ї ƒ††”‡••‘ˆ–Ї†‡•–‹ƒ–‹‘ǤЇˆ‘”ƒ–‘ˆ ƒ††”‡••‹•ƒ͵ʹǦ„‹–
—‡”‹ ƒ††”‡••™”‹––‡ƒ•ˆ‘—”—„‡”••‡’ƒ”ƒ–‡†„›’‡”‹‘†•Ǥƒ А—„‡” ƒ„‡Ͳ–‘ʹͷͷǤ
‘‡‡šƒ’އ•‘ˆ ƒ††”‡••‡•ƒ”‡ǣͳͻʹǤͳ͸ͺǤͳǤʹǡͳͲǤ͵ʹͶǤͳǤ͵ƒ†ͳͲͻǤͳ͵ͶǤʹǤʹǤ
••‡‡‹–Їƒ„‘˜‡‡šƒ’އ•ǡ–Ї—„‡”•‹ƒ ƒ††”‡••ƒ”‡‹–Ї†‡ ‹ƒŽˆ‘”ǤЇ
ƒ ƒ††”‡••‹•’”‘ ‡••‡†ǡ–Ї ‘’—–‡” ‘˜‡”–•–Ї•‡—„‡”•‹–‘„‹ƒ”›ˆ‘”‹–‡”ƒŽŽ›Ǥ
Їˆ‘ŽŽ‘™‹‰‹•ƒ‡šƒ’އ‘ˆ ƒ††”‡••‹–Ї†‡ ‹ƒŽˆ‘”ǣͳͻʹǤͳ͸ͺǤͳǤͳͲ
Ї’”‡ ‡†‹‰ ƒ††”‡••‹‹–•„‹ƒ”›ˆ‘”‹•ǣͳͳͲͲͲͲͲͲǤͳͲͳͲͳͲͲͲǤͲͲͲͲͲͲͲͳǤͲͲͲͲͳͲͳͲ
Ї ƒ††”‡••‘ˆƒ ‘’—–‡”‹•ƒ••‹‰‡†„›–Ї –‡”‡–‡”˜‹ ‡”‘˜‹†‡”ȋ Ȍ™Š‘•‡‹–‡”‡–
connection is used on that computer.
‘— ƒϐ‹†‘—––Ї ƒ††”‡••‘ˆ›‘—” ‘’—–‡”„›’‡”ˆ‘”‹‰–Їˆ‘ŽŽ‘™‹‰•–‡’•ǣ
Computer Networks

 ͳǤ Ž‹ –ЇStart button. A pop-up menu containing various options appears.
2. Open the Run†‹ƒŽ‘‰„‘šǤ
Type cmd in the Run †‹ƒŽ‘‰ „‘š ƒ† ’”‡•• –‡”Ǥ Ї ‘ƒ† ’”‘’– ȋ †Ȍ ™‹†‘™
opens.
8.53
 ͵Ǥ ›’‡ ‹’ ‘ϐ‹‰ ƒ† ’”‡•• –‡”Ǥ Ї ‘—–’—– ƒ’’‡ƒ”•ǡ †‹•’Žƒ›‹‰ –Ї  ƒ††”‡•• ‘ˆ ›‘—”
computer (as shown in the output window given below).

8.30.8 Website
A website is a collection of various web pages, images, videos, audios or other kinds of digital
ƒ••‡–•–Šƒ–ƒ”‡Š‘•–‡†‘‘‡‘”•‡˜‡”ƒŽ™‡„•‡”˜‡”•ǤЇϐ‹”•–’ƒ‰‡‘ˆƒ™‡„•‹–‡‹•‘™ƒ•
home page where all the links related to other documents are displayed. The web pages of a
website are written using HTML and the information is transferred over the internet through
’”‘–‘ ‘ŽǤЇ †‘ —‡–• ‘•‹•–‘ˆ•‡˜‡”ƒŽŠ›’‡”Ž‹•–Šƒ–ƒ”‡ƒ ‡••‡†–Š”‘—‰Š
’”‘–‘ ‘ŽǤšƒ’Ž‡•‘ˆ˜ƒ”‹‘—•™‡„•‹–‡•ƒ”‡ǣ „•‡Ǥ‹ Ǥ‹ǡ‰‘‘‰Ž‡Ǥ ‘ǡƒƒœ‘Ǥ‹ǡ‡– Ǥ

CTM: A website is a collection of several web pages which are related to each other through hyperlinks.

8.30.9 Web Page


A web page is an electronic document/page designed using HTML. It displays information in
–‡š–—ƒŽ‘”‰”ƒ’Š‹ ƒŽˆ‘”Ǥ”ƒ˜‡”•ƒŽˆ”‘‘‡™‡„’ƒ‰‡–‘ƒ‘–Ї”™‡„’ƒ‰‡‹•’‘••‹„އ–Š”‘—‰Š
hyperlinks.
™‡„’ƒ‰‡ ƒ„‡ Žƒ••‹ϐ‹‡†‹–‘–™‘–›’‡•ǣ
¾ Static web page: A web page which displays same kind of information whenever a user

Supplement – Computer Science with Python–XII

visits it is known as a static web page. A static web page generally has .htm or .html as
‡š–‡•‹‘Ǥ
¾ Dynamic web page: An interactive web page is a dynamic web page. A dynamic web

page uses scripting languages to display changing content on the web page. Such a page
‰‡‡”ƒŽŽ›Šƒ•Ǥ’Š’ǡǤƒ•’ǡ‘”ǤŒ•’ƒ•‡š–‡•‹‘Ǥ

8.30.10 Web Browser


It is a software that helps in accessing web pages and, thus, is also called web client. It helps
the user to navigate through the World Wide Web and display web pages. Some popular web
„”‘™•‡”•ƒ”‡ǣ‘œ‹ŽŽƒ ‹”‡ˆ‘šǡ’‡”ƒǡǡ‡„‹–ǡ ‡™‡ƒ•‡Žǡ‡– Ǥ

CTM: A web browser is a WWW client that navigates through the WWW and displays web pages.

8.54
8.30.11 Web Server
™‡„•‡”˜‡”‹•ƒ•‡”˜‡”–Šƒ–•–‘”‡•™‡„’ƒ‰‡•ƒ†™Š‡ƒ™‡„ Ž‹‡–•‡†•ƒ›”‡“—‡•––‘ƒ
•‡”˜‡”ǡ–Ї•‡”˜‡””‡•’‘†•–‘–Ї”‡“—‡•–ƒ††‹•’Žƒ›•–Ї”‡“—‡•–‡†™‡„’ƒ‰‡•Ǥ™‡„•‡”˜‡”
‹•ƒ’”‘‰”ƒ–Šƒ–”—•‘ƒ ‘’—–‡” ‘‡ –‡†–‘–Ї‹–‡”‡–Ǥ‡„•‡”˜‡”™ƒ‹–•ˆ‘”ƒ”‡“—‡•–ǡ
ϐ‹†•–Ї†‘ —‡–•ƒ†‰‡‡”ƒ–‡•‹ˆ‘”ƒ–‹‘ǡ‹ˆ”‡“—‹”‡†ǡƒ†•‡†•‹–„ƒ –‘–Ї„”‘™•‡”
–Šƒ–”‡“—‡•–‡†ˆ‘”‹–Ǥ•‹‰Ž‡™‡„•‡”˜‡”ƒ›•—’’‘”–—Ž–‹’އ™‡„•‹–‡•ǡ‘”ƒ•‹‰Ž‡™‡„•‹–‡
may be hosted on several linked or mirrored web servers.

Sends request
WEB WEB
Sends response

Fig. 8.34: Sending and Receiving Request

Some popular web servers are: Apache web server, Netscape enterprise web server, Microsoft
internet information server, etc.

CTM: A web server stores web documents and responds to the requests made by web browsers.

8.30.12 Web Hosting


Web hosting is a service which is provided by companies to its clients to allow them to
construct their own websites which are accessible to the internet users via World Wide Web.
Such companies are known as web hosts. These companies provide space on a web server they
own for use by their clients as well as provide internet connectivity. The websites which are
constructed display information for their organization in the form of web pages. The host may
also provide an interface or control panel for managing the web server so as to add news and
events related to their organization or for uploading some information which may be valuable
for the internet users. A client can also use control panel for installing scripts as well as other
modules and service applications like email. webhostingsitesindia.co.in is one of the top domain
name registration and web hosting companies in India. It is the only hosting company which
provides support in regional languages.

CTM: Web hosting is a service that is provided by the company to users to create web-based applications.

8.30.13 Domain Name Resolution (DNR)


You already know that communication between computers on a network takes place with the
Їޒ ‘ˆ  ƒ††”‡••‡•Ǥ ‘™‡˜‡”ǡ –‘ ƒ ‡•• ƒ ’ƒ”–‹ —Žƒ” ™‡„•‹–‡ǡ ›‘— —•‡ ‹–•  „‡ ƒ—•‡ ‹– ‹•
— Їƒ•‹‡”–‘”‡‡„‡”–Šƒ–Ї ƒ††”‡••ǤЇ›‘——•‡–Ї–‘ƒ ‡••ƒ™‡„•‹–‡ǡ›‘—”
‘’—–‡”‡‡†•–‘ϐ‹†‹–•ƒ– Š‹‰ ƒ††”‡••Ǥ ‘™†‘‡•‹–ϐ‹†–Š‹•ƒ††”‡••ǫЇƒ•™‡”‹•ǣ
by using the Domain Name Resolution (DNR). DNR is the name given to the process by which
›‘—” ‘’—–‡”ϐ‹†•–Ї ƒ††”‡••‡•‘ˆ†‘ƒ‹ƒ‡•Ǥ
Ї’”‘ ‡••–ƒ‡•’Žƒ ‡‹–Ї„ƒ ‰”‘—†ƒ† ƒ„‡‡š’Žƒ‹‡†‹–Їˆ‘ŽŽ‘™‹‰•–‡’•ǣ
Computer Networks

 ͳǤ –‡”–Ї†‘ƒ‹ƒ‡‘ˆ–Ї™‡„•‹–‡–Šƒ–›‘—™ƒ––‘ƒ ‡••‹–Ї‡„„”‘™•‡”Ǥ


2. The Web browser issues a command to the operating system of your computer to generate
–Ї ƒ††”‡••‘ˆ–Ї‰‹˜‡†‘ƒ‹ƒ‡Ǥ

8.55
Ї†‘ƒ‹ƒ‡‹•”‡•‘Ž˜‡†ƒ ‘”†‹‰–‘–Ї ‘ϐ‹‰—”ƒ–‹‘‘ˆ–Ї‘’‡”ƒ–‹‰•›•–‡›‘—ƒ”‡
—•‹‰Ǥ ‹ˆˆ‡”‡– ‘’‡”ƒ–‹‰ •›•–‡•ǡ •— Š ƒ• ‹†‘™• ǡ ‹†‘™• ͹ǡ ‹—š ƒ† ‹š Šƒ˜‡
†‹ˆˆ‡”‡– ‘ϐ‹‰—”ƒ–‹‘•Ǥ
This is done in the following manner:

¾ ‡‡”ƒŽŽ›ǡ –Ї ‘’‡”ƒ–‹‰ •›•–‡ ƒ‹–ƒ‹• ƒ  ϐ‹Ž‡ǡ ™Š‹ Š ‘–ƒ‹• ƒ Ž‹•– ‘ˆ –Ї 
ƒ††”‡••‡•‘ˆ•‘‡†‘ƒ‹ƒ‡•ǤЇ”‡ˆ‘”‡ǡ–Ї‘’‡”ƒ–‹‰•›•–‡ϐ‹”•– Ї •–Š‹•ϐ‹Ž‡–‘
ϐ‹†–Ї ƒ††”‡••‘ˆ–Ї‰‹˜‡†‘ƒ‹ƒ‡Ǥ
¾ ˆ–Ї ƒ††”‡••‹•‘–ˆ‘—†‹–Ї ϐ‹Ž‡ǡ–Ї‘’‡”ƒ–‹‰•›•–‡ ‘‡ –•–‘–Ї

server on a network. The DNS server maintains a directory containing a list of all the
†‘ƒ‹ƒ‡•ƒ† ƒ††”‡••‡•–Šƒ–ƒ”‡”‡‰‹•–‡”‡†‘–Ї‹–‡”‡–ǤЇ•‡”˜‡”ϐ‹†•
–Ї ƒ††”‡••‘ˆ–Ї‰‹˜‡†‘ƒ‹ƒ‡ƒ†”‡–—”•‹––‘–Ї‘’‡”ƒ–‹‰•›•–‡Ǥ
 ͵Ǥ ˆ–‡”‘„–ƒ‹‹‰–Ї ƒ††”‡••ǡ–Ї‘’‡”ƒ–‹‰•›•–‡•‡†•‹––‘–Ї‡„„”‘™•‡”–Šƒ–Šƒ•
”‡“—‡•–‡†‹–Ǥ

8.30.14 Web Scripting


Website Scripting is used for creating web pages to publish them on the web interactively. The
communication between web browser and web server happens through small programs called
™‡„• ”‹’–•Ǥ ”‹’–‹•ƒ’”‘‰”ƒ‹‰Žƒ‰—ƒ‰‡™Š‹ Šǡ™Š‡‡š‡ —–‡†ǡ†‹•’Žƒ›•–Ї™‡„’ƒ‰‡Ǥ
The written codes for a script may be used by the server side or may be used by the client
•‹†‡ƒ•’‡”–Ї”‡“—‹”‡‡–ǤЇ–ƒ••™Š‹ Šƒ”‡‡š‡ —–‡†„›ƒ™‡„•‡”˜‡”ƒ”‡‹–‡”’”‡–‡†ƒ†
automated through the web scripts written in Web Scripting Language.

CTM: A script is a list of commands embedded in a web page which are executed by a certain program or
scripting engine.

ͳǤ౧Ž‹‡–Ǧ‹†‡‡„ ”‹’–‹‰ƒ‰—ƒ‰‡•
Client-side scripting enables the user to interact with web pages. The client-side scripts are
†‘™Ž‘ƒ†‡† ƒ– –Ї Ž‹‡– ‡† ƒ† –Ї ‹–‡”’”‡–‡† ƒ† ‡š‡ —–‡† „› –Ї ™‡„ „”‘™•‡”Ǥ Ї
client-side scripting is browser dependent and, therefore, the browser must be scripting-
‡ƒ„އ† –Šƒ– ƒ ‹–‡”’”‡– –Ї • ”‹’– ‘†‡Ǥ šƒ’Ž‡• ‘ˆ Ž‹‡–Ǧ•‹†‡ • ”‹’–‹‰ ™Š‡”‡ ‹– ‹• —•‡†
are online games, downloading data from the server, etc.
Supplement – Computer Science with Python–XII

Some Popular Client-Side Scripting Languages are:


(a) JavaScript
(b) VBScript
ȋ Ȍ  
(a) JavaScript
  ƒ˜ƒ ”‹’–™ƒ•–Їϐ‹”•–™‡„• ”‹’–‹‰Žƒ‰—ƒ‰‡–‘„‡‹–”‘†— ‡†ƒ†‹–‹••–‹ŽŽ„›ˆƒ”–Ї‘•–
’‘’—Žƒ”Ǥ Ї ‘”‹‰‹ƒŽ ƒ‡ ‘ˆ ƒ˜ƒ ”‹’– ™ƒ• Dz‹˜‡ ”‹’–dz ƒ† ‹– ™ƒ• ϐ‹”•– ‹–”‘†— ‡† ‹
‡–• ƒ’‡ƒ˜‹‰ƒ–‘”ʹǤͲ‹ͳͻͻͷƒ†™ƒ•”‡ƒ‡† ƒ˜ƒ ”‹’–•‘ƒ•–‘ ‘””‡Žƒ–‡™‹–Š ƒ˜ƒ
Language. JavaScript is primarily used for client-side processing. It is a scripting language
ƒ† ‘– ƒ ’”‘‰”ƒ‹‰ Žƒ‰—ƒ‰‡Ǥ – ƒ ‡ƒ•‹Ž› „‡ ‡„‡††‡† ‹  –ƒ‰ ƒ† ‡š‡ —–‡•
immediately as the page is displayed. JavaScript, along with languages like XML, can call
‹‘Ž›–Ї”‡“—‹”‡††ƒ–ƒˆ”‘–Ї•‡”˜‡”™‹–Š‘—–”‡ ‡‹˜‹‰ƒˆ—ŽŽ™‡„’ƒ‰‡Ǥ

8.56
Example of Java Script is as follows:
<HTML>
<HEAD>
<TITLE>›ϐ‹”•–Œƒ˜ƒ• ”‹’–</TITLE>
</HEAD>
<BODY>
<SCRIPT LANGUAGE="JAVASCRIPT">
document.write("Welcome")
</SCRIPT>
</BODY>
</HTML>
JavaScript allows the user to perform several functions such as:
(i) Add scrolling or changing messages to the browser’s status line.
(ii) Update the contents of a form by using validation checks and make calculations.
(For exampleǡ‘‡–‡”‹‰–Їƒ”•‘ˆͷ•—„Œ‡ –•‘ˆƒ•–—†‡–ǡ‹–™‹ŽŽ ƒŽ —Žƒ–‡–‘–ƒŽ
marks and percentage.)
(iii) Display messages to the user, either in a new web page, which is a sub-part of the main
™‡„’ƒ‰‡ǡ‘”‹ƒŽ‡”–„‘š‡•Ǥ
(iv) Create and animate images that change when the user hovers the mouse over them.
(v) Detect the browser in use and display different contents for different browsers.
 ȋ˜‹Ȍ ‡–‡ –‹•–ƒŽŽ‡†’Ž—‰Ǧ‹•ƒ†‘–‹ˆ›–Ї—•‡”‹ˆƒ’Ž—‰Ǧ‹‹•”‡“—‹”‡†Ǥ

(b)  ”‹’–ȋ‹•—ƒŽƒ•‹  ”‹’–Ȍ


VBScript is a light weight programming language developed by Microsoft Corporation.
 ”‹’– ‹• –Ї †‡ˆƒ—Ž– • ”‹’–‹‰ Žƒ‰—ƒ‰‡ ˆ‘”  ȋ –‹˜‡ ‡”˜‡” ƒ‰‡•ȌǤ  ”‹’– ‹• ƒ
server-side scripting language. However, it may also be used for client-side scripting
ȋƒŽ–Š‘—‰Š‹–‹• —””‡–Ž›‘Ž›•—’’‘”–‡†„› –‡”‡–š’Ž‘”‡”ȌǤ
Some of the useful features of visual basic are not supported by VBScript such as strong
–›’‹‰ǡ‡š–‡†‡†‡””‘”–”ƒ’’‹‰ƒ†–Їƒ„‹Ž‹–›–‘’ƒ••ƒ˜ƒ”‹‡†—„‡”‘ˆ’ƒ”ƒ‡–‡”•–‘ƒ
sub-routine. However, its use is relatively widespread because it is easy to learn. VBScript
ƒ „‡ ‡ˆˆ‡ –‹˜‡Ž› —•‡† ˆ‘” ƒ—–‘ƒ–‹‰ †ƒ›Ǧ–‘Ǧ†ƒ› ‘ˆϐ‹ ‡ –ƒ•• ƒ• ™‡ŽŽ ƒ• ‘‹–‘”‹‰ ‹
Windows-based environment. When used for client-side web development in Microsoft
–‡”‡–š’Ž‘”‡”ǡ ”‹’–‹••‹‹Žƒ”‹ˆ— –‹‘–‘ ƒ˜ƒ ”‹’–Ǥ –‹•—•‡†–‘™”‹–‡‡š‡ —–ƒ„އ
functions that are embedded in or included from HTML pages and interact with the
‘ —‡–„Œ‡ –‘†‡ŽȋȌ‘ˆ–Ї’ƒ‰‡ǡ–‘’‡”ˆ‘”–ƒ••‘–’‘••‹„އ‹ ƒŽ‘‡Ǥ
 ”‹’–‹••‹’އ–‘ ”‡ƒ–‡ƒ† ƒ„‡™”‹––‡—•‹‰–‡š–‡†‹–‘”Ž‹‡‘–‡’ƒ†Ǥ•‹’އ
 ”‹’–†‘ —‡–‹••ƒ˜‡†™‹–ŠDzǤ˜„•dz‡š–‡•‹‘Ǥ
Computer Networks

8.57
šƒ’Ž‡‘ˆ ”‹’–‹•ƒ•ˆ‘ŽŽ‘™•ǣ
<HTML>
<HEAD>
<TITLE>›ϐ‹”•– ”‹’–</TITLE>
</HEAD>
<BODY>
<SCRIPT TYPEα̶–‡š–Ȁ˜„• ”‹’–̶ε
document.write("Welcome")
</SCRIPT>
</BODY>
</HTML>
(c) PHP (Hypertext Pre-Processor)
   •–ƒ†•ˆ‘” ›’‡”–‡š–”‡Ǧ’”‘ ‡••‘”Ǥ –‹•ƒ•‡”˜‡”Ǧ•‹†‡• ”‹’–‹‰Žƒ‰—ƒ‰‡–Šƒ–‹•—•‡†
–‘‡Šƒ ‡™‡„’ƒ‰‡•Ǥ‹–Š ǡƒ—•‡” ƒ†‘–Š‹‰•Ž‹‡ ”‡ƒ–‡—•‡”ƒ‡ƒ†’ƒ••™‘”†
login pages, check details from a form, create forums, picture galleries, etc. It was created
‹ͳͻͻͶ„›ƒ•—•‡”†‘”ˆ–‘ƒ†††›ƒ‹  ‘–‡––‘ƒ ’ƒ‰‡Ǥ ‹‹–‹ƒŽŽ›•–‘‘†
ˆ‘”Ǯ‡”•‘ƒŽ ‘‡ƒ‰‡ǯǡ„—–‘™‹–‹•–”ƒ•Žƒ–‡†ƒ•Ǯ  ›’‡”–‡š–”‡Ǧ’”‘ ‡••‘”ǯǤЇ
  ‘†‡ ‹• ‡„‡††‡† ™‹–Š‹ –Ї  ‘†‡ „‡–™‡‡ •’‡ ‹ƒŽ –ƒ‰•Ǥ Ї –Ї ’ƒ‰‡ ‹•
ƒ ‡••‡†ǡ–Ї•‡”˜‡”’”‘ ‡••‡•–Ї  ‘†‡ƒ†–Ї•‡†•–Ї‘—–’—–ˆ”‘–Ї• ”‹’–ƒ•
HTML code to the client.
  Ї•ƒŽ‹‡–ˆ‡ƒ–—”‡•‘ˆ ƒ”‡ƒ•ˆ‘ŽŽ‘™•ǣ
 ȋ‹Ȍ —•‡” ƒ ”‡ƒ–‡†›ƒ‹ ™‡„’ƒ‰‡•™‹–Š–Ї • ”‹’–‹‰Žƒ‰—ƒ‰‡Ǥ
 ȋ‹‹Ȍ –‹•ƒ•‡”˜‡”Ǧ•‹†‡• ”‹’–‹‰Žƒ‰—ƒ‰‡ƒ†ǡ–Ї”‡ˆ‘”‡ǡ–Ї • ”‹’–•ƒ”‡‡š‡ —–‡†‘
the server.
 ȋ‹‹‹Ȍ  ‹•ˆ”‡‡ƒ†ƒ‘’‡•‘—” ‡•‘ˆ–™ƒ”‡’”‘†— –Ǥ
 ȋ‹˜Ȍ  ’”‘˜‹†‡• ‘‡ –‹˜‹–›™‹–Šƒ›†ƒ–ƒ„ƒ•‡•ȋ›ǡ›„ƒ•‡ǡ”ƒ އƒ†ƒ›
others).
 ȋ˜Ȍ  ”—•‘†‹ˆˆ‡”‡–’Žƒ–ˆ‘”•ȋ ǡ‹—šǡ‹†‘™•ȌǤ
Supplement – Computer Science with Python–XII

 ȋ˜‹Ȍ  ‹• ‘’ƒ–‹„އ™‹–ŠƒŽ‘•–ƒŽŽ™‡„Ǧ•‡”˜‡”•—•‡†–‘†ƒ›ȋ’ƒ Їǡ ǡ‡– ǤȌǤ


 ȋ˜‹‹Ȍ   ‘ƒ†•ƒ”‡‡„‡††‡†™‹–Š‹ƒ•–ƒ†ƒ”† ’ƒ‰‡Ǥ
 ȋ˜‹‹‹Ȍ –••›–ƒš‹••‹‹Žƒ”–‘–Šƒ–‘ˆƒ†‡”ŽŽƒ‰—ƒ‰‡•™Š‹ Šƒ‡•‹–‡ƒ•›–‘—•‡Ǥ
 ȋ‹šȌ  ϐ‹Ž‡• ƒŠƒ˜‡‘‡‘ˆ–Їˆ‘ŽŽ‘™‹‰‡š–‡•‹‘•ǣ ǡ ͵‘” Ǥ
The structure of PHP Script is as follows:
<HTML>
<HEAD>
<TITLE>PHP Test</TITLE>
</HEAD>
<BODY>
<?php echo'<p>Hello World</p>'?>
</BODY>
8.58 </HTML>
ʹǤ౧‡”˜‡”Ǧ‹†‡ ”‹’–
 ‡”˜‡”Ǧ•‹†‡• ”‹’–‹‰‰‡–•‡š‡ —–‡†‘–Ї•‡”˜‡”„‡ˆ‘”‡†‹•’Žƒ›‹‰–Ї‹ˆ‘”ƒ–‹‘”‡“—‡•–‡†Ǥ

(a) ASP (Active Server Pages)


It is a technology that is used to create dynamic web pages so that the user can see these pages
™‹–Š‘—–ƒ›•’‡ ‹ϐ‹ ™‡„„”‘™•‡”ǤЇ—•‡”†‘‡•‘–”‡“—‹”‡ƒ›•’‡ ‹ϐ‹ ™‡„„”‘™•‡”–‘
view these pages. To create active server pages, a default scripting language is used, viz.
 ”‹’– ƒ† •‘‡–‹‡•  Ǥ  ’ƒ‰‡• ƒ”‡ •ƒ˜‡† ™‹–Š –Ї ‡š–‡•‹‘ Ǥ ƒ† ‘–
ǤŠ–ŽǤ›™‡„’ƒ‰‡–Šƒ– ‘–ƒ‹• ‘†‡ ƒ‘–„‡”—•‹’Ž›„›‡š‡ —–‹‰‹––Š”‘—‰Š
™‡„ „”‘™•‡”Ǣ ‹•–‡ƒ†ǡ –Ї ’ƒ‰‡ —•– „‡ ”‡“—‡•–‡† –Š”‘—‰Š ƒ ™‡„ •‡”˜‡” –Šƒ– •—’’‘”–•
ǤЇƒ„”‘™•‡””‡“—‡•–•ƒǡ–Ї™‡„•‡”˜‡”‰‡‡”ƒ–‡•ƒ’ƒ‰‡™‹–Š  ‘†‡
ƒ†•‡†•‹–„ƒ –‘–Ї„”‘™•‡”Ǥ‹•ƒŽ•‘–Ї•Š‘”––‡”—•‡†ˆ‘”’’Ž‹ ƒ–‹‘‡”˜‹ ‡
”‘˜‹†‡”Ǥ
ƒ”‹‘—••‡”˜‹ ‡•‘ˆˆ‡”‡†„›ƒ”‡ǣ
(i) It helps in creating interactive and dynamic web pages.
(ii) It allows access to any data or databases and returns the result to web browser.
(iii) It allows the user to dynamically edit, change or add any content of a web page.
 ȋ‹˜Ȍ –’”‘˜‹†‡••‡ —”‹–›–‘ƒ’ƒ‰‡ƒ•‹–‹•‘–‡š‡ —–‡†„›ƒ™‡„„”‘™•‡”Ǥ

(b) JSP (Java Server Pages)


  ƒ˜ƒ‡”˜‡”ƒ‰‡•ȋ Ȍ‹•ƒ–‡ А‘Ž‘‰›–Šƒ–Їޒ••‘ˆ–™ƒ”‡†‡˜‡Ž‘’‡”•–‘ ”‡ƒ–‡†›ƒ‹ 
™‡„’ƒ‰‡•„ƒ•‡†‘ ǡ‘”‘–Ї”†‘ —‡––›’‡•Ǥ –™ƒ•”‡Ž‡ƒ•‡†‹ͳͻͻͻ„›—
‹ ”‘•›•–‡•Ǥ ‹••‹‹Žƒ”–‘ ǡ„—–‹–—•‡•–Ї ƒ˜ƒ’”‘‰”ƒ‹‰Žƒ‰—ƒ‰‡Ǥ •Šƒ˜‡
dynamic scripting capability that is embedded in an HTML code. Java server pages can be
run by a compatible web server with a servlet container, such as Apache Tomcat or Jetty.
‘’”‘ ‡••ƒ ϐ‹Ž‡ǡ†‡˜‡Ž‘’‡”•‡‡†ƒ ‡‰‹‡ǡ™Š‹ Š‹• ‘‡ –‡†–‘ƒ‡„•‡”˜‡”Ǥ
Ї ’ƒ‰‡‹•–Ї ‘’‹Ž‡†‹–‘ƒ•‡”˜Ž‡–ǡ™Š‹ Š‹•Šƒ†Ž‡†„›–Ї•‡”˜Ž‡–‡‰‹‡ǤŠ‹•
’Šƒ•‡‹•‘™ƒ•–”ƒ•Žƒ–‹‘ǤЇ•‡”˜Ž‡–‡‰‹‡–ЇŽ‘ƒ†•–Ї•‡”˜Ž‡– Žƒ••ƒ†‡š‡ —–‡•
‹––‘ ”‡ƒ–‡†›ƒ‹  ǡ™Š‹ Š‹•–Ї•‡––‘–Ї„”‘™•‡”Ǥ ƒ˜ƒ‡”˜‡”ƒ‰‡• ‘’‹Ž‡”
‹•ƒ’”‘‰”ƒ–Šƒ–’ƒ”•‡• •ƒ† ‘˜‡”–•–Ї‹–‘‡š‡ —–ƒ„އ ƒ˜ƒ‡”˜Ž‡–•Ǥ
  Ї˜ƒ”‹‘—•ˆ‡ƒ–—”‡•‘ˆ ƒ”‡ƒ•ˆ‘ŽŽ‘™•ǣ
(i) Platform Independent:  ƒ „‡ †‡’Ž‘›‡† ƒ ”‘•• ƒ› ’Žƒ–ˆ‘”•Ǥ ŽŽ –Ї•‡
components can be run across web servers.
(ii) ‘ϐ‹‰—”‡†ˆ‘””‡—•ƒ„‹Ž‹–›ǣ  ‘’‘‡–• ƒ„‡”‡—•‡†ƒ ”‘•••‡”˜Ž‡–•ǡ ƒ˜ƒ‡ƒ•
ƒ†–‡”’”‹•‡ ƒ˜ƒ‡ƒ•ȋ ȌǤ
(iii) Simple and easy to use: ‹••‹’އ‹–Ї’”‘ ‡••‘ˆ†‡˜‡Ž‘’‡–ƒ†ƒ‹–‡ƒ ‡Ǥ

CTM: Scripting languages are also often used by applications as control or configure languages. An
example: Firefox is written in C/C++ and can be controlled with JavaScript.
Computer Networks

8.59
Table: 8.1: Difference between Client-Side Scripting and Server-Side Scripting
S.No. Client-Side Scripting Server-Side Scripting
1. Scripting runs through web browser. Scripting runs through web server.
2. The processing takes place on the end-user’s The processing takes place on the server side.
computer.
3. The browser receives the page sent by the server Server executes server-side scripts to send out a
and executes the client-side scripts. page but it does not execute client-side scripts.
4. Client-side scripting cannot be used to connect to Server-side scripting is used to connect to the
the databases on the web server. databases that reside on the web server.
5. Client-side scripting can be blocked by the user. Server-side scripting cannot be blocked by the
user.
6. Response from a client-side script is faster as Response from a server-side script is slower as
compared to a server-side script because the compared to a client-side script because the
scripts are processed on the local computer. scripts are processed on the remote computer.
7. Examples of client-side scripting languages are Examples of server-side scripting languages are
Javascript, VBScript, etc. PHP, JSP, ASP, ASP.Net, Ruby, Perl, etc.

8.31 WEB 2.0


Web 2.0 is often known as World Wide Web for second generation where people collaborate
with each other through social networking sites, blogs, wikis, folksonomies, video-sharing sites,
hosted services, web applications and mashups. Web 2.0 offers more dynamic pages instead
of static pages that allows users to create online applications. Web 2.0 also allows groups
of people to work on multiple applications. For example, a user can work on a document or
spreadsheet simultaneously, while in the background a computer keeps track of who made
what changes, where and when.
‡„ʹǤͲ–‘‘Ž•ƒ”‡ƒŽ•‘އ••‡š’‡•‹˜‡–Šƒ–”ƒ†‹–‹‘ƒŽ•‘ˆ–™ƒ”‡Ȅƒ›ƒ”‡‡˜‡ˆ”‡‡Ǥ‡ ƒ—•‡
they are web-based, the need is only to update the browser.
The various features of Web 2.0 are:
• Web-based applications can be accessed from anywhere.
• It provides multitasking.
Supplement – Computer Science with Python–XII

 Ȉ –‹•އ••‡š’‡•‹˜‡ƒ†’”‘˜‹†‡•†›ƒ‹ ’ƒ‰‡•Ǥ
 Ȉ ’‡ ‹ϐ‹ ’”‘„އ• ƒ„‡•‘Ž˜‡†„›—•‹‰•‹’އƒ’’Ž‹ ƒ–‹‘•Ǥ
• Value lies in content, not in the software used to display content.
• Transfer of data is readily shared.
 Ȉ ’Ž‘›‡‡•ƒ† —•–‘‡”• ƒ ”‡ƒ–‡–Ї‹”‘™‡™•‰”‘—’Ǥ
 Ȉ ‘ ‹ƒŽ–‘‘Ž•‡ ‘—”ƒ‰‡’‡‘’އ–‘ ”‡ƒ–‡ǡ ‘ŽŽƒ„‘”ƒ–‡ǡ‡†‹–ǡ ƒ–‡‰‘”‹œ‡ǡ‡š Šƒ‰‡ƒ†’”‘‘–‡
information.
Web 2.0 website uses a new programming language called AJAX (Asynchronous JavaScript and
XML).

8.60
Applications supported by Web 2.0 are as follows:
• Blogging
• Social bookmarking
• RSS
• Wikis and other collaborative applications
• Interactive encyclopaedias and dictionaries
• Advanced Gaming

CTM: Web 2.0 refers to added features and applications that make the web more interactive and easy to
provide information using newsgroups, social networking sites, RSS, etc.

8.32 E-COMMERCE
Ǧ ‘‡” ‡ȋ‡Ž‡ –”‘‹  ‘‡” ‡‘”Ȍ‹•–Ї„—›‹‰ƒ†•‡ŽŽ‹‰‘ˆ‰‘‘†•ƒ†•‡”˜‹ ‡•ǡ‘”–Ї
transmitting of funds or data over an electronic network, primarily the internet. These business
transactions occur either as business-to-business, business-to-consumer, consumer-to-consumer
or consumer-to-business. The terms e-commerce and e-business are often used interchangeably.
Ǧ ‘‡” ‡ ‹• ‘†— –‡† —•‹‰ ƒ ˜ƒ”‹‡–› ‘ˆ ƒ’’Ž‹ ƒ–‹‘•ǡ •— Š ƒ• ‡ƒ‹Žǡ ‘Ž‹‡ ƒ–ƒŽ‘‰—‡•
ƒ† •Š‘’’‹‰ ƒ”–•ǡ  ǡ ‹Ž‡ ”ƒ•ˆ‡” ”‘–‘ ‘Ž ƒ† ™‡„ •‡”˜‹ ‡•Ǥ Š‹• ‹ Ž—†‡• „—•‹‡••Ǧ–‘Ǧ
business activities and outreach such as using email for unsolicited ads (usually viewed as
spam) to consumers and other business prospects, as well as to send out e-newsletters to
subscribers. More companies now try to entice consumers directly online, using tools such as
digital coupons, social media marketing and targeted advertisements.

SELF PRODUCTS

E-COMMERCE BANK

CUSTOMERS

BANK PAYMENT

SHIPPING WAREHOUSE

The advantages of e-commerce include its round-the-clock availability, speed of access, wide
availability of goods and services to the consumer, easy accessibility and international reach.

8.32.1 Payment Transactions through E-Commerce


Computer Networks

1. Online Banking
Online banking, also known as internet banking, e-banking
or virtual banking, is an electronic payment system that
‡ƒ„އ• —•–‘‡”• ‘ˆ ƒ „ƒ ‘” ƒ ϐ‹ƒ ‹ƒŽ ‹•–‹–—–‹‘ –‘
‘†— –ƒ”ƒ‰‡‘ˆϐ‹ƒ ‹ƒŽ–”ƒ•ƒ –‹‘•–Š”‘—‰Š–Їϐ‹ƒ ‹ƒŽ
institution’s website. 8.61
2. Mobile Banking
Mobile banking‹•ƒ•‡”˜‹ ‡’”‘˜‹†‡†„›ƒ„ƒ‘”ƒϐ‹ƒ ‹ƒŽ‹•–‹–—–‹‘
–Šƒ– ƒŽŽ‘™• ‹–• —•–‘‡”• –‘ ‘†— – ƒ ”ƒ‰‡ ‘ˆ ϐ‹ƒ ‹ƒŽ –”ƒ•ƒ –‹‘•
remotely using a mobile device such as a mobile phone or tablet,
ƒ† —•‹‰ •‘ˆ–™ƒ”‡ǡ —•—ƒŽŽ› ƒŽŽ‡† ƒ ƒ’’ǡ ’”‘˜‹†‡† „› –Ї ϐ‹ƒ ‹ƒŽ
institution for the purpose.

8.32.2 Payment Apps and Services


ƒ›‡–ƒ’’•ƒ”‡ƒŽ•‘”‡ˆ‡””‡†–‘ƒ•‘„‹Ž‡ƒŽŽ‡–•ǤЇ”‡ƒ”‡ƒ›’ƒ›‡–ƒ’’•ƒ˜ƒ‹Žƒ„އ
‹–Їƒ”‡–™Š‹ Šƒ”‡˜‡”›‡ˆϐ‹ ‹‡––‘—•‡ƒ† ‘˜‡‹‡––‘Šƒ†Ž‡Ǥ
Їˆ‘ŽŽ‘™‹‰ƒ”‡•‘‡‘ˆ–Ї™ƒŽŽ‡–•™Š‹ Šƒ”‡ˆ”‡“—‡–Ž›—•‡†‹–Їƒ”‡–Ǥ
ͳǤ ‘‘‰Ž‡ƒŽŽ‡– ʹǤ ’’އƒ••„‘‘
͵Ǥ ƒ›–ƒŽŽ‡– ͶǤ ”‡‡ Šƒ”‰‡ƒŽŽ‡–
ͷǤ ‘„‹™‹ƒŽŽ‡– ͸Ǥ ƒ›
͹Ǥ “—ƒ”‡ƒŽŽ‡– ͺǤ ƒ›ƒŽ
ͻǤ ™‘ŽŽƒ ͳͲǤ ‡‘
ͳͳǤ Šƒ”ƒ– –‡”ˆƒ ‡ˆ‘”‘‡›ȋ Ȍ’’
The online mode of payment has brought about a drastic change to marketing. There are many
start-ups which are doing very well thanks to the online mode of payment. This revolution has
taken the world by storm.

8.33 CLOUD COMPUTING


Cloud computing provides computing and storage capacity services to the heterogeneous
community of end-recipients. The name comes from the use of clouds as an abstraction for
–Ї ‘’އš‹ˆ”ƒ•–”— –—”‡Ǥ
Ž‘—†‘’—–‹‰α‘ˆ–™ƒ”‡ƒ•ƒ‡”˜‹ ‡ΪŽƒ–ˆ‘”ƒ•ƒ‡”˜‹ ‡Ϊ ˆ”ƒ•–”— –—”‡ƒ•ƒ‡”˜‹ ‡
Ϊƒ–ƒƒ•ƒ‡”˜‹ ‡
Therefore, cloud computing:
Ȉ ”‘˜‹†‡• ƒ •Šƒ”‡† ’‘‘Ž
Supplement – Computer Science with Python–XII

‘ˆ ‘ϐ‹‰—”ƒ„އ ‘’—–‹‰ Servers


resources
Ȉ ”‘˜‹†‡•‘Ǧ†‡ƒ†‡–™‘” Application Desktops
Laptops
access
• Is provisioned by the Monitoring Collaboration Finance
Content
‡”˜‹ ‡”‘˜‹†‡” Communication
Platform

Identity
Queue
Object Storage Runtime Database

Infrastructure

Computer Network
Block Storage
Phones Tablets

Fig. 8.35: Components of Cloud Computing


8.62
It entrusts services with a user’s data, software and computation over a network. It has
considerable overlap with Software as a Service (SaaS).

Service Value Nets

Business Business Business Business


Service Service Service Service Business Community Community Community
Service Service Service Service
IT IT IT Community
Service Service Service Service Business IT IT
Service Service Service

Platform as a Service

Business Business IT IT IT IT Community Community


Service Service Service Service Service Service Service Service

Infrastructure as a Service

Server

Fig. 8.36: Cloud Architecture

¾ Software as a Service (SaaS)



• From the end-user’s point of view
• Apps are located in the cloud
• ‘ˆ–™ƒ”‡‡š’‡”‹‡ ‡•ƒ”‡†‡Ž‹˜‡”‡†–Š”‘—‰Š–Ї‹–‡”‡–
¾ Platform as a Service (PaaS)

• From the developer’s point of view (i.e., cloud users)
• Cloud providers offer an internet-based platform to developers who want to create
services but do not want to build their own cloud.
¾ Infrastructure as a Service (IaaS)

• Cloud providers build datacentres
• ‘™‡”ǡ• ƒŽ‡ǡŠƒ”†™ƒ”‡ǡ‡–™‘”‹‰ǡ•–‘”ƒ‰‡ǡ†‹•–”‹„—–‡†•›•–‡•ǡ‡– Ǥ
ƒԙDatacentre as a service
• Cloud users rent storage, computation and maintenance from cloud providers (pay-
as-you-go-like utility)
¾ Data as a Service (DaaS)

Data o Information o Knowledge o Intelligence
Computer Networks

• Infrastructure for web-scale data mining and knowledge discovery


• ’‘™‡”’‡‘’އ™‹–Š‘™Ž‡†‰‡
• ’‘™‡”ƒ’’Ž‹ ƒ–‹‘•ƒ†•‡”˜‹ ‡•™‹–Š‹–‡ŽŽ‹‰‡ ‡
‡‡ϐ‹–•‘ˆ Ž‘—† ‘’—–‹‰ǣЇ”‡ƒ”‡•‡˜‡”ƒŽ„‡‡ϐ‹–•‘ˆ Ž‘—† ‘’—–‹‰„‡ ƒ—•‡‘ˆ™Š‹ Š
it has become essential and popular these days.
8.63
¾ Reduces capital and operational costs

• ‘Ž‘‰‡””‡“—‹”‡†–‘ƒ‡Žƒ”‰‡—’ˆ”‘– ƒ’‹–ƒŽ‹˜‡•–‡–‘†ƒ–ƒ ‡–”‡•
• Ž‹‹ƒ–‡•–Ї‡‡†–‘’ŽƒƒŠ‡ƒ†ˆ‘”’”‘˜‹•‹‘‹‰
• Allows companies to start small and increase their resource investment as needed
(pay-as-you-go)
¾ ‹’Ž‹ϐ‹‡•ƒ’’†‡’Ž‘›‡–ƒ†ƒƒ‰‡‡–

• Common programming model across mobile, browser, client, server, cloud
• Access to strong ecosystem of widely deployed applications
• –‡‰”ƒ–‹‘™‹–Š‡š‹•–‹‰ ƒ••‡–•ȋ‘ˆ–™ƒ”‡Ϊ‡”˜‹ ‡•Ȍ

8.34 SETTING UP A COMPUTER NETWORK—AN EXAMPLE


Ї ‡–™‘” ˆ— –‹‘‹‰ ‹• „ƒ•‡† ‘ Ž‹‡–Ǧ‡”˜‡” ƒ” Š‹–‡ –—”‡ ™Š‹ Š ”‡“—‹”‡• ‡ˆˆ‡ –‹˜‡ ƒ†
‡ˆϐ‹ ‹‡– ‡–™‘” †‡•‹‰Ǥ – †‡ϐ‹‡• Š‘™ Ž‹‡–• ƒ”‡ ‘‡ –‡† –‘ •‡”˜‡” ƒ Š‹‡ȋ•Ȍ ‘ ƒ
network. The most important rule or methodology for network (LAN) design is the 80:20 rule.

The 80:20 Thumb Rule


Š‹•–Š—„”—އ•–ƒ–‡•–Šƒ–‹ƒ™‡ŽŽǦ‘”‰ƒ‹œ‡†ƒ††‡•‹‰‡†‡–™‘”ǡͺͲ’‡” ‡–‘ˆ–Ї–”ƒˆϐ‹ ‘
a given network segment is local (i.e., destined for a destination system in the same workgroup),
ƒ†‘–‘”‡–ŠƒʹͲ’‡” ‡–‘ˆ–Ї‡–™‘”–”ƒˆϐ‹ •Š‘—ކ‘˜‡ƒ ”‘••ƒ„ƒ „‘‡ǤЇ„ƒ „‘‡
‹ƒ‡–™‘”™Š‹ Š˜‹‘Žƒ–‡•–Š‹•ͺͲǣʹͲ”—އއƒ†•–‘‡–™‘” ‘‰‡•–‹‘ƒ†–”ƒˆϐ‹ Œƒ•Ǥ
‡‡’‹‰ –Ї ƒ„‘˜‡ •‹‰‹ϐ‹ ƒ– ”—އ ‹ ‹†ǡ އ– —• –ƒ‡ ƒ ‡šƒ’އ –‘ —†‡”•–ƒ† Š‘™ –‘ ‰‘
about LAN design.
‡†— ƒ–‹‘ƒŽ•‘ ‹‡–›ȋ•ƒ›†— ƒ–‹‘ƒŽ
‘ ‹‡–›Ȍǡ ™‹–Š ‹–• Їƒ† ‘ˆϐ‹ ‡ ‹ Їƒ‹ Computer Lab 1 Computer Lab 2 Computer Lab 3

(Tamil Nadu) and schools in various parts


of the globe, is setting up a new senior Administrative
Block
Principal’s
Office
Accounts
Office
secondary school, ‘SF School’, in Bahadurgarh
ȋ ƒ”›ƒƒȌǤ Ї Ǯ   Š‘‘Žǯ ™‹ŽŽ Šƒ˜‡ ͵ ‘’—–‡” Žƒ„• ™‹–Š ͵Ͳ ‘’—–‡”• ‹ ‡ƒ Š Žƒ„ǡ ‘‡
 ‘—–• ‘ˆϐ‹ ‡ ™‹–Š –Š”‡‡ ‘’—–‡”•ǡ ‘‡ †‹‹•–”ƒ–‹˜‡ „Ž‘  ™‹–Š ϐ‹˜‡ ‘’—–‡”•ǡ ƒ† ƒ
Supplement – Computer Science with Python–XII

”‹ ‹’ƒŽǯ•‘ˆϐ‹ ‡™‹–Š‘‡ ‘’—–‡”Ǥ


Let us see how a computer network can be set up in the school. First of all, we can draw a rough
sketch of the school with computers at various locations as follows:
 ͳǤ †‡’‡†‡–• ƒ„‡•‡–—’‹‡ƒ Š‘ˆ–Їˆ‘ŽŽ‘™‹‰„—‹Ž†‹‰•ǣ‘’—–‡”ƒ„ͳǡ‘’—–‡”
ƒ„ʹǡ‘’—–‡”ƒ„͵ǡ†‹‹•–”ƒ–‹˜‡Ž‘ ƒ† ‘—–•ˆϐ‹ ‡Ǥ
 ʹǤ Ї•‡• ƒ„‡•‡–—’‹–‘’‘Ž‘‰›—•‹‰ ƒ„އȋ‡ ‘‘‹ ƒŽǡ”‡Ž‹ƒ„އƒ†‡ƒ•‹Ž›
available).
 ͵Ǥ ‘” –Š‹•ǡ ‘‡ •™‹– Š ȋ™‹–Š •—‹–ƒ„އ —„‡” ‘ˆ ’‘”–•Ȍ ™‹ŽŽ „‡ ”‡“—‹”‡† ‹ ‡ƒ Š ‘ˆ –Ї•‡
buildings. More than one switch can be used in computer labs if a switch with more than
͵Ͳ’‘”–•‹•‘–ƒ˜ƒ‹Žƒ„އǤ
 ͶǤ ™‘‹–‡”‡– ‘‡ –‹‘•ȋ„”‘ƒ†„ƒ†ˆ‘”Š‹‰Š•’‡‡†Ȍ ƒ„‡’”‘ —”‡†‹†‹‹•–”ƒ–‹˜‡ˆϐ‹ ‡Ǥ
  ™‘ ‘‡ –‹‘••Š‘—ކ„‡’”‘ —”‡†ˆ”‘–™‘†‹ˆˆ‡”‡– ••‘–Šƒ–ǣ
 ȋƒȌ –‡”‡– ‘‡ –‹‘ ‹ †‹‹•–”ƒ–‹˜‡ ‘ˆϐ‹ ‡ ƒ „‡ ‡’– •‡’ƒ”ƒ–‡ ˆ”‘ –Ї ‘–Ї”
8.64 ‘’—–‡”Žƒ„•™Š‡”‡•–—†‡–•ƒ›†‘ƒŽ‘–‘ˆ‡š’‡”‹‡–ƒ–‹‘Ǥ
(b) If one internet connection is not working, the other can be used in case of urgent
”‡“—‹”‡‡–•Ǥ
5. These buildings can then be connected as follows:

Computer Lab 1 Computer Lab 2 Computer Lab 3

Administrative Principal’s Accounts


Block Office Office

͸Ǥ Š‹•‹–‡” ‘‡ –‹‘™‹ŽŽ‡•—”‡–Šƒ–‡ƒ Š„—‹Ž†‹‰‹•†‹”‡ –Ž› ‘‡ –‡†–‘†‹‹•–”ƒ–‹˜‡


block.
7. This way, internet connection will be available in each building irrespective of the status of
the other building.
8. Server (if any) of the school may be placed in the Administrative block so that it remains
•ƒˆ‡ȋ’Š›•‹ ƒŽŽ›Ȍƒ†ƒϐ‹”‡™ƒŽŽ ƒ„‡•‡–—’•‘–Šƒ––Ї™Š‘އ‡–™‘””‡ƒ‹••ƒˆ‡ˆ”‘
any kind of virus or intrusion attacks.
Ї”‡‹•‘‡‡†–‘’—–‹ƒ›‡š–”ƒ‡ˆˆ‘”–•‘”‡š’‡•‡•–‘Ž‹–Ї• Š‘‘Ž–‘‹–•Їƒ†‘ˆϐ‹ ‡Ǥ
This can be taken care of using the internet connections.
Tips to solve technical questions based on Networking
Where Server should be placed: Server should be placed in the building where the number
‘ˆ ‘’—–‡”•‹•ƒš‹—Ǥ
ͳǤ Suggest a suitable cable layout of connection: A suitable cable layout can be suggested
in the following two ways:
(a) On the basis of Server: First, the location of the Server is found out. Server should be
’Žƒ ‡†‹–Šƒ–„—‹Ž†‹‰™Š‡”‡–Ї—„‡”‘ˆ ‘’—–‡”•‹•ƒš‹—ȋƒ ‘”†‹‰–‘
–ЇͺͲǣʹͲ”—އȌǤˆ–‡”ϐ‹†‹‰–Ї•‡”˜‡”’‘•‹–‹‘ǡ‡ƒ Š„—‹Ž†‹‰†‹•–ƒ ‡‹• ‘’ƒ”‡†
with the Server building directly or indirectly (taking other building(s) in between).
The shortest distance is counted, whether it is directly or indirectly calculated.
(b) On the basis of distance from each building: The distance between each building is
compared to all other buildings, either directly or indirectly. The shortest distance
is calculated, whether it is direct or through some other building.
2. Where the following devices should be placed:
Server : Large number of computers in the building
HUB/Switch ǣƒ Š„—‹Ž†‹‰
Modem : In the server room
Repeater : It is used if the distances are higher than 70m. It regenerates
data and voice signals.
Router ǣЇ‘‡‹•”‡“—‹”‡†–‘„‡ ‘‡ –‡†–‘–Ї‘–Ї”
Best Layout : Star (from Server), BUS topology
Computer Networks

Best Cable ǣ™‹•–‡†ƒ‹”ǡ–Ї”‡–ƒ„އǡ‘ƒš‹ƒŽ ƒ„އȋ™Š‡†‹•–ƒ ‡‹•


in metres);
 ‘”Žƒ”‰‡†‹•–ƒ ‡•Ȅ ‹„”‡‘’–‹ • ƒ„އǤ
Best connecting technique : In hilly regions, radio waves should be used and city-to-city,
state-to-state satellite should be used.
8.65
MEMORY BYTES
¾ Internet is a network of networks that spreads all over the world.
¾ ARPANET was the ĮƌƐƚŝŶƚĞƌŶĞƚĨŽůůŽǁĞĚďLJE^&EdĂŶĚŽƚŚĞƌƐŵĂůůŶĞƚǁŽƌŬƐ͘
¾ ŐĂƚĞǁĂLJŝƐĂĚĞǀŝĐĞƚŚĂƚĐŽŶŶĞĐƚƐĚŝƐƐŝŵŝůĂƌŶĞƚǁŽƌŬƐ͘
¾ ďĂĐŬďŽŶĞŝƐĂĐĞŶƚƌĂůŝŶƚĞƌĐŽŶŶĞĐƟŶŐĚĞǀŝĐĞƚŚĂƚĐŽŶŶĞĐƚƐƚǁŽŽƌŵŽƌĞĐŽŵƉƵƚĞƌƐ͘
¾ dŽƉŽůŽŐLJŝƐĂǁĂLJŽĨĐŽŶŶĞĐƟŶŐĐŽŵƉƵƚĞƌƐƉŚLJƐŝĐĂůůLJŽƌůŽŐŝĐĂůůLJ͘
¾ ^ƚĂƌƚŽƉŽůŽŐLJƵƐĞƐĂĐĞŶƚƌĂůŚƵďǁŚĞƌĞĞĂĐŚĐŽŵƉƵƚĞƌŝŶĚŝƌĞĐƚůLJĐŽŶŶĞĐƚƐǁŝƚŚƚŚĞŽƚŚĞƌĐŽŵƉƵƚĞƌŽŶƚŚĞŶĞƚǁŽƌŬ͘
¾ ƐĞƚŽĨƌƵůĞƐƚŚĂƚŐŽǀĞƌŶƐŝŶƚĞƌŶĞƚŝƐĐĂůůĞĚƉƌŽƚŽĐŽů͘
¾ dWƉƌŽƚŽĐŽůŝƐƌĞƐƉŽŶƐŝďůĞĨŽƌƐĞƋƵĞŶƟĂůĂƌƌĂŶŐĞŵĞŶƚŽĨƉĂĐŬĞƚƐ͘
¾ /WƉƌŽƚŽĐŽůŝƐƌĞƐƉŽŶƐŝďůĞĨŽƌĨƌĂŐŵĞŶƚĂƟŽŶŽĨĚĂƚĂŝŶƚŽƉĂĐŬĞƚƐĂŶĚƐĞŶĚƐƚŚŽƐĞƉĂĐŬĞƚƐŝŶƌĂŶĚŽŵŽƌĚĞƌ͘
¾ &dWƉƌŽƚŽĐŽůŝƐƵƐĞĚƚŽƐŚĂƌĞĮůĞƐĂĐƌŽƐƐŶĞƚǁŽƌŬƐ͘
¾ d>EdŝƐĂƌĞŵŽƚĞůŽŐŝŶǁŚĞƌĞĂƵƐĞƌĐĂŶůŽŐŝŶŽŶĂŶŽƚŚĞƌƵƐĞƌ͛ƐƐLJƐƚĞŵ͘
¾ ,ddWŝƐƵƐĞĚĨŽƌĚŝƐƉůĂLJŝŶŐǁĞďƉĂŐĞƐ͘
¾ tĞďďƌŽǁƐĞƌŝƐĂŶĂƉƉůŝĐĂƟŽŶƉƌŽŐƌĂŵƚŚĂƚŚĞůƉƐŝŶŽƉĞŶŝŶŐǁĞďƉĂŐĞƐ͘
¾ dŚĞĮƌƐƚƉĂŐĞŽĨĂŶLJǁĞďƐŝƚĞŝƐŬŶŽǁŶĂƐŚŽŵĞƉĂŐĞ͘
¾ ŽŵŵƵŶŝĐĂƟŽŶŵĞĚŝĂŝƐĂƚƌĂŶƐŵŝƐƐŝŽŶŵĞĚŝĂĨŽƌƚƌĂŶƐŵŝƫŶŐĚĂƚĂĂĐƌŽƐƐƚŚĞŶĞƚǁŽƌŬ͘
¾ 'ƵŝĚĞĚŵĞĚŝĂŝƐĂůƐŽŬŶŽǁŶĂƐǁŝƌĞĚŵĞĚŝĂǁŚŝůĞƵŶŐƵŝĚĞĚŵĞĚŝĂŝƐĂůƐŽŬŶŽǁŶĂƐǁŝƌĞůĞƐƐŵĞĚŝĂ͘
¾ >E͕DE͕tEĂŶĚWEĂƌĞƚŚĞĨŽƵƌƚLJƉĞƐŽĨŶĞƚǁŽƌŬƐ͘
¾ sŝƌƵƐĞƐĂƌĞŵĂůŝĐŝŽƵƐƉƌŽŐƌĂŵƐƚŚĂƚĐĂŶĚĂŵĂŐĞĮůĞƐ͕ĚŝƐŬƐ͕ĮůĞĂůůŽĐĂƟŽŶƚĂďůĞ͕ĞƚĐ͘
¾ ^ƉĂŵƐĂƌĞƵŶƐŽůŝĐŝƚĞĚŵĂŝůƐƚŚĂƚĞĂƚƵƉƚŚĞĚŝƐŬƐƉĂĐĞ͘
¾ ,ƵďƌĞĨĞƌƐƚŽĂŶĞƚǁŽƌŬŝŶŐĐŽŵƉŽŶĞŶƚǁŚŝĐŚĂĐƚƐĂƐĂĐŽŶǀĞƌŐĞŶĐĞƉŽŝŶƚŽĨĂŶĞƚǁŽƌŬĂůůŽǁŝŶŐƚŚĞƚƌĂŶƐĨĞƌŽĨ
ĚĂƚĂƉĂĐŬĞƚƐ͘
¾ ^ǁŝƚĐŚƌĞĨĞƌƐƚŽĂĚĞǀŝĐĞǁŚŝĐŚĮůƚĞƌƐĂŶĚĨŽƌǁĂƌĚƐĚĂƚĂƉĂĐŬĞƚƐĂĐƌŽƐƐƚŚĞŶĞƚǁŽƌŬ͘
¾ tĞƐƟŶŐƐĞƌǀŝĐĞŝƐĂƚLJƉĞŽĨŝŶƚĞƌŶĞƚŚŽƐƟŶŐƐĞƌǀŝĐĞƚŚĂƚĂůůŽǁƐŝŶĚŝǀŝĚƵĂůƐĂŶĚŽƌŐĂŶŝnjĂƟŽŶƐƚŽŚŽƐƚƚŚĞŝƌŽǁŶ
ǁĞďƐŝƚĞĂŶĚƵƐĞƌƐǁŝƚŚŽŶůŝŶĞƐLJƐƚĞŵƐƚŽƐƚŽƌĞŝŶĨŽƌŵĂƟŽŶƐƵĐŚĂƐŝŵĂŐĞƐ͕ǀŝĚĞŽƐ͕ĞƚĐ͘
¾ ĚĂƚĂĐŚĂŶŶĞůŝƐƚŚĞŵĞĚŝƵŵƵƐĞĚƚŽĐĂƌƌLJŝŶĨŽƌŵĂƟŽŶŽƌĚĂƚĂĨƌŽŵŽŶĞƉŽŝŶƚƚŽĂŶŽƚŚĞƌ͘

OBJECTIVE TYPE QUESTIONS


1. &ŝůůŝŶƚŚĞďůĂŶŬƐ͘
Supplement – Computer Science with Python–XII

(ĂͿ dŚƌŽƵŐŚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘LJŽƵĐĂŶĞƐƚĂďůŝƐŚĐŽŶƚĂĐƚǁŝƚŚĂŶLJŽŶĞŝŶƚŚĞǁŽƌůĚ͘
 ;ďͿ dŚĞŵĂŝŶĨƵŶĐƚŝŽŶŽĨ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƚŽĚŝǀŝĚĞƚŚĞŵĞƐƐĂŐĞŽƌĚĂƚĂŝŶƚŽƉĂĐŬĞƚƐŽĨĂĚĞĨŝŶŝƚĞ
ƐŝnjĞŽŶƚŚĞƐŽƵƌĐĞĐŽŵƉƵƚĞƌ͘
 ;ĐͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ƌĞĨĞƌƐƚŽǁŝƌĞůĞƐƐĨŝĚĞůŝƚLJǁŚŝĐŚĞŶĂďůĞƐƵƐƚŽĐŽŶŶĞĐƚƚŽƚŚĞ/^WǁŝƚŚŽƵƚĂŶLJĐĂďůĞ͘
 ;ĚͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐĂƐŽĨƚǁĂƌĞƚŚĂƚĞŶĂďůĞƐƵƐƚŽĂĐĐĞƐƐƚŚĞŝŶƚĞƌŶĞƚĂŶĚĞdžƉůŽƌĞǁĞďƐŝƚĞƐ͘
 ;ĞͿ tĞďƉĂŐĞĐŽŶƐƚŝƚƵƚĞƐƚŚĞ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ĨͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƐŽŵĞŽŶĞǁŝƚŚĂƐƚƌŽŶŐŝŶƚĞƌĞƐƚŝŶŚŽǁƚŚŝŶŐƐǁŽƌŬ͕ǁŚŽůŝŬĞƐƚŽĐƌĞĂƚĞĂŶĚ
ŵŽĚŝĨLJƚŚŝŶŐƐĨŽƌƚŚĞŝƌŽǁŶĞŶũŽLJŵĞŶƚ͘
 ;ŐͿ ĐŽŵƉƵƚĞƌ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐĂƐŵĂůůƐŽĨƚǁĂƌĞƉƌŽŐƌĂŵƚŚĂƚƐƉƌĞĂĚƐĨƌŽŵŽŶĞĐŽŵƉƵƚĞƌƚŽ
ĂŶŽƚŚĞƌĂŶĚŝŶƚĞƌĨĞƌĞƐǁŝƚŚƚŚĞŶŽƌŵĂůĨƵŶĐƚŝŽŶŝŶŐŽĨĐŽŵƉƵƚĞƌ͘
 ;ŚͿ ůĞĐƚƌŽŶŝĐũƵŶŬŵĂŝůŽƌũƵŶŬŶĞǁƐŐƌŽƵƉƉŽƐƚŝŶŐƐĂƌĞŬŶŽǁŶĂƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ŝͿ ŝŐŝƚĂůƐŝŐŶĂƚƵƌĞŵĞĞƚƐƚŚĞŶĞĞĚĨŽƌ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ĂŶĚŝŶƚĞŐƌŝƚLJ͘
 ;ũͿ dŚĞĨŝƌƐƚŶĞƚǁŽƌŬƚŚĂƚƉůĂŶƚĞĚƚŚĞƐĞĞĚŽĨŝŶƚĞƌŶĞƚǁĂƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ŬͿ dŚĞƉƌŽƚŽĐŽůƵƐĞĚĨŽƌŝŶƚĞƌŶĞƚŝƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ůͿ ĚĞǀŝĐĞƵƐĞĚƚŽĐŽŶŶĞĐƚĚŝƐƐŝŵŝůĂƌŶĞƚǁŽƌŬƐŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ŵͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƌĞƐƉŽŶƐŝďůĞĨŽƌŚĂŶĚůŝŶŐƚŚĞĂĚĚƌĞƐƐŽĨƚŚĞĚĞƐƚŝŶĂƚŝŽŶĐŽŵƉƵƚĞƌƐŽƚŚĂƚĞĂĐŚ
8.66 ƉĂĐŬĞƚŝƐĚĞůŝǀĞƌĞĚƚŽŝƚƐƉƌŽƉĞƌĚĞƐƚŝŶĂƚŝŽŶ͘
 ;ŶͿdƌŝĐŬŝŶŐƉĞŽƉůĞƚŚƌŽƵŐŚĂƵƚŚĞŶƚŝĐͲůŽŽŬŝŶŐĞŵĂŝůƐŽƌǁĞďƐŝƚĞƐŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ŽͿƉƌŽŐƌĂŵĚĞƐŝŐŶĞĚƚŽƌĞƉůŝĐĂƚĞĂŶĚĞĂƚƵƉĂĐŽŵƉƵƚĞƌ͛ƐƐƚŽƌĂŐĞŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ƉͿĚŝŐŝƚĂůĚŽĐƵŵĞŶƚŝƐƐƵĞĚƚŽĂƐŝƚĞďLJĂĐĞƌƚŝĨŝĐĂƚŝŽŶĂƵƚŚŽƌŝƚLJŽĨƚŚĞŝŶƚĞƌŶĞƚŝƐĐĂůůĞĚĂ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ƋͿdŽĐŽŶŶĞĐƚĐŽŵƉƵƚĞƌƐůŽĐĂƚĞĚŝŶĂƐƉĞĐŝĨŝĐďƵŝůĚŝŶŐŽƌĐĂŵƉƵƐŝƐŬŶŽǁŶĂƐ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ƌͿ
tŝͲ&ŝ͕ŝŶĨƌĂƌĞĚĂŶĚůƵĞƚŽŽƚŚĂƌĞĞdžĂŵƉůĞƐŽĨ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ƐͿ/ŶƚĞƌƐƉĂĐĞŝƐĂ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ƚͿ
ƐĞƌǀĞƌƚŚĂƚƉƌŽǀŝĚĞƐŝƚƐƐĞƌǀŝĐĞƐƚŽŽƚŚĞƌǁŽƌŬƐƚĂƚŝŽŶƐŽŶĂŶĞƚǁŽƌŬŝƐĂ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ƵͿdŚĞƚĞĐŚŶŝƋƵĞŽĨƐǁŝƚĐŚŝŶŐŝŶǁŚŝĐŚĚĂƚĂŝƐĚŝǀŝĚĞĚŝŶƚŽƐŵĂůůĞƌĨƌĂŐŵĞŶƚƐŝƐĐĂůůĞĚ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
 ;ǀͿ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐĂĚĞĚŝĐĂƚĞĚůŝŶŬďĞƚǁĞĞŶƚŚĞƐĞŶĚĞƌĂŶĚƚŚĞƌĞĐĞŝǀĞƌ͘
 ;ǁͿ ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ŝƐƚŚĞŵĞĂƐƵƌŝŶŐƵŶŝƚŽĨƐƉĞĞĚĂƚǁŚŝĐŚƚŚĞĚĂƚĂƚƌĂŶƐĨĞƌƚĂŬĞƐƉůĂĐĞ͘
 ;džͿůů ƚŚĞ ĐŽŵƉƵƚĞƌƐ ĂƌĞ ĐŽŶŶĞĐƚĞĚ ǁŝƚŚ ĞĂĐŚ ŽƚŚĞƌ ŝŶ ĂŶ ƵŶŽƌŐĂŶŝnjĞĚ ŵĂŶŶĞƌ ŝŶ ƚŽƉŽůŽŐLJ
................................ .
 ;LJͿ /Ŷ͕͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘ĂůůĐŽŵƉƵƚĞƌƐƐŚĂƌĞĞƋƵŝǀĂůĞŶƚƌĞƐƉŽŶƐŝďŝůŝƚLJĨŽƌƉƌŽĐĞƐƐŝŶŐĚĂƚĂ͘
Answers: (aͿ /ŶƚĞƌŶĞƚ   ;ďͿ dW   ;ĐͿ tŝͲ&ŝ
   ;ĚͿ ƌŽǁƐĞƌ   ;ĞͿ tŽƌůĚtŝĚĞtĞď ;ĨͿ ,ĂĐŬĞƌ
   ;ŐͿ sŝƌƵƐ   ;ŚͿ ^WD   ;ŝͿ ƵƚŚĞŶƚŝĐĂƚŝŽŶ
   ;ũͿ ZWEd   ;ŬͿ dWͬ/W   ;ůͿ 'ĂƚĞǁĂLJ
   ;ŵͿ /W   ;ŶͿ ,ĂĐŬŝŶŐ   ;ŽͿ tKZD
   ;ƉͿ ŝŐŝƚĂůĐĞƌƚŝĨŝĐĂƚĞ ;ƋͿ >E  
   ;ƌͿ ŽŵŵƵŶŝĐĂƚŝŽŶDĞĚŝƵŵƐ ;ƐͿ EĞƚǁŽƌŬ   ;ƚͿ ĞĚŝĐĂƚĞĚƐĞƌǀĞƌ
   ;ƵͿ WĂĐŬĞƚƐǁŝƚĐŚŝŶŐ ;ǀͿ ŝƌĐƵŝƚƐǁŝƚĐŚŝŶŐ ;ǁͿ ďŝƚƐͬƐĞĐŽŶĚ
   ;džͿ DĞƐŚ   ;LJͿ WĞĞƌͲƚŽͲƉĞĞƌŶĞƚǁŽƌŬ
2. ^ƚĂƚĞǁŚĞƚŚĞƌƚŚĞĨŽůůŽǁŝŶŐƐƚĂƚĞŵĞŶƚƐĂƌĞdƌƵĞŽƌ&ĂůƐĞ͘
(ĂͿ ƐĞƚŽĨƌƵůĞƐƚŚĂƚŐŽǀĞƌŶƐŝŶƚĞƌŶĞƚŝƐĐĂůůĞĚƉƌŽƚŽĐŽů͘
 ;ďͿ ƌĞƉĞĂƚĞƌŚĂŶĚůĞƐĚŝĨĨĞƌĞŶƚƉƌŽƚŽĐŽůƐ͘
 ;ĐͿ ŚƵďŝƐŬŶŽǁŶĂƐĂŶŝŶƚĞůůŝŐĞŶƚĚĞǀŝĐĞŽŶƚŚĞŶĞƚǁŽƌŬ͘
 ;ĚͿ ůŽĐĂƚŝŽŶŽŶĂŶĞƚƐĞƌǀĞƌŝƐĐĂůůĞĚĂǁĞďƐŝƚĞ͘
 ;ĞͿ ĚŽĐƵŵĞŶƚƚŚĂƚƵƐĞƐ,ddWŝƐĐĂůůĞĚĂǁĞďƉĂŐĞ͘
 ;ĨͿ ƐǁŝƚĐŚŝƐĂĚĞǀŝĐĞƵƐĞĚƚŽƐĞŐŵĞŶƚŶĞƚǁŽƌŬƐŝŶƚŽƐƵďͲŶĞƚǁŽƌŬƐŽƌƐƵďŶĞƚƐ͘
 ;ŐͿ ŵĂŝůŚĞůƉƐƵƐƚŽƐĞŶĚĂŶĚƌĞĐĞŝǀĞŵĞƐƐĂŐĞƐƚŚƌŽƵŐŚǀŝĚĞŽĐŽŶĨĞƌĞŶĐŝŶŐ͘
 ;ŚͿ dŚĞĚĞŐĞŶĞƌĂƚŝŽŶŽĨĂƐŝŐŶĂůŽǀĞƌĂĚŝƐƚĂŶĐĞŽŶĂŶĞƚǁŽƌŬŝƐĐĂůůĞĚĂƚƚĞŶƵĂƚŝŽŶ͘
 ;ŝͿ ŽĂdžŝĂůĐĂďůĞƉŽƐƐĞƐƐĞƐŚŝŐŚĞƌƚĞŶƐŝůĞƐƚƌĞŶŐƚŚƚŚĂŶŽƉƚŝĐĂůĨŝďƌĞ͘
 ;ũͿ tŚĞŶƚǁŽĞŶƚŝƚŝĞƐĂƌĞĐŽŵŵƵŶŝĐĂƚŝŶŐĂŶĚĚŽŶŽƚǁĂŶƚĂƚŚŝƌĚƉĂƌƚLJƚŽůŝƐƚĞŶ͕ƚŚŝƐƐŝƚƵĂƚŝŽŶŝƐĚĞĨŝŶĞĚ
ĂƐƐĞĐƵƌĞĐŽŵŵƵŶŝĐĂƚŝŽŶ͘
Answers: (ĂͿ dƌƵĞ ;ďͿ &ĂůƐĞ ;ĐͿ &ĂůƐĞ ;ĚͿ dƌƵĞ ;ĞͿ dƌƵĞ ;ĨͿ dƌƵĞ
(ŐͿ &ĂůƐĞ ;ŚͿ dƌƵĞ ;ŝͿ &ĂůƐĞ ;ũͿ dƌƵĞ
3. DƵůƚŝƉůĞŚŽŝĐĞYƵĞƐƚŝŽŶƐ;DYƐͿ
(ĂͿ ĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬ͗
 ;ŝͿ /ƐĂĐŽůůĞĐƚŝŽŶŽĨŚĂƌĚǁĂƌĞĐŽŵƉŽŶĞŶƚƐĂŶĚĐŽŵƉƵƚĞƌƐ
 ;ŝŝͿ /ƐŝŶƚĞƌĐŽŶŶĞĐƚĞĚďLJĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůƐ
 ;ŝŝŝͿ ůůŽǁƐƐŚĂƌŝŶŐŽĨƌĞƐŽƵƌĐĞƐĂŶĚŝŶĨŽƌŵĂƚŝŽŶ
 ;ŝǀͿ ůůŽĨƚŚĞĂďŽǀĞ
 ;ďͿ tŚĂƚŝƐĂĨŝƌĞǁĂůůŝŶĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬ͍
 ;ŝͿ dŚĞƉŚLJƐŝĐĂůďŽƵŶĚĂƌLJŽĨŶĞƚǁŽƌŬ
Computer Networks

 ;ŝŝͿ ŶŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵŽĨĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬ
 ;ŝŝŝͿ ƐLJƐƚĞŵĚĞƐŝŐŶĞĚƚŽƉƌĞǀĞŶƚƵŶĂƵƚŚŽƌŝnjĞĚĂĐĐĞƐƐ
 ;ŝǀͿ ǁĞďďƌŽǁƐŝŶŐƐŽĨƚǁĂƌĞ
 ;ĐͿ tŚĂƚŝƐƚŚĞƵƐĞŽĨƌŝĚŐĞŝŶƚŚĞŶĞƚǁŽƌŬ͍
 ;ŝͿ dŽĐŽŶŶĞĐƚ>EƐ   ;ŝŝͿ dŽƐĞƉĂƌĂƚĞ>EƐ
 ;ŝŝŝͿ dŽĐŽŶƚƌŽůŶĞƚǁŽƌŬƐƉĞĞĚ ;ŝǀͿ ůůŽĨƚŚĞĂďŽǀĞ
8.67
 ;ĚͿ ĂĐŚ/WƉĂĐŬĞƚŵƵƐƚĐŽŶƚĂŝŶ͗
 ;ŝͿ KŶůLJ^ŽƵƌĐĞĂĚĚƌĞƐƐ   ;ŝŝͿ KŶůLJĞƐƚŝŶĂƚŝŽŶĂĚĚƌĞƐƐ
 ;ŝŝŝͿ ^ŽƵƌĐĞĂŶĚĞƐƚŝŶĂƚŝŽŶĂĚĚƌĞƐƐ ;ŝǀͿ ^ŽƵƌĐĞŽƌĞƐƚŝŶĂƚŝŽŶĂĚĚƌĞƐƐ
 ;ĞͿ tŚŝĐŚŽĨƚŚĞƐĞŝƐŶŽƚĂĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů͍
 ;ŝͿ ^ĂƚĞůůŝƚĞ ;ŝŝͿ DŝĐƌŽǁĂǀĞ ;ŝŝŝͿ ZĂĚŝŽǁĂǀĞ ;ŝǀͿ tŝͲ&ŝ
 ;ĨͿ DE^ƚĂŶĚƐĨŽƌ͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘͘
(i) Metropolitan Area Network (ii) Main Area Network
 ;ŝŝŝͿ DĞƚƌŽƉŽůŝƚĂŶĐĐĞƐƐEĞƚǁŽƌŬ ;ŝǀͿ DĞƚƌŽĐĐĞƐƐEĞƚǁŽƌŬ
 ;ŐͿ tŚŝĐŚŽĨƚŚĞƐĞŝƐŶŽƚĂŶĞdžĂŵƉůĞŽĨƵŶŐƵŝĚĞĚŵĞĚŝĂ͍
 ;ŝͿ KƉƚŝĐĂů&ŝďƌĞĂďůĞ ;ŝŝͿ ZĂĚŝŽǁĂǀĞ ;ŝŝŝͿ ůƵĞƚŽŽƚŚ ;ŝǀͿ ^ĂƚĞůůŝƚĞ
 ;ŚͿ /ŶǁŚŝĐŚƚŽƉŽůŽŐLJĂƌĞĂůůƚŚĞŶŽĚĞƐĐŽŶŶĞĐƚĞĚƚŚƌŽƵŐŚĂƐŝŶŐůĞŽĂdžŝĂůĐĂďůĞ͍
 ;ŝͿ ^ƚĂƌ ;ŝŝͿ dƌĞĞ ;ŝŝŝͿ ƵƐ ;ŝǀͿ ZŝŶŐ
 ;ŝͿ tŚŝĐŚŽĨƚŚĞĨŽůůŽǁŝŶŐŝƐƚŚĞƐŵĂůůĞƐƚŶĞƚǁŽƌŬ͍
 ;ŝͿ tE ;ŝŝͿ DE ;ŝŝŝͿ >E ;ŝǀͿ tŝͲ&ŝ
 ;ũͿ tŚŝĐŚƉƌŽƚŽĐŽůŝƐƵƐĞĚĨŽƌƚŚĞƚƌĂŶƐĨĞƌŽĨŚLJƉĞƌƚĞdžƚĐŽŶƚĞŶƚŽǀĞƌƚŚĞǁĞď͍
 ;ŝͿ ,dD> ;ŝŝͿ ,ddW ;ŝŝŝͿ dWͬ/W ;ŝǀͿ &dW
Answers: ;ĂͿ ;ŝǀͿ ;ďͿ ;ŝŝŝͿ ;ĐͿ ;ŝͿ ;ĚͿ ;ŝŝŝͿ ;ĞͿ ;ŝǀͿ ;ĨͿ ;ŝͿ
  ;ŐͿ ;ŝͿ ;ŚͿ ;ŝŝŝͿ ;ŝͿ ;ŝŝŝͿ ;ũͿ ;ŝŝͿ

SOLVED QUESTIONS
1. ĞĨŝŶĞĂŶĞƚǁŽƌŬ͘tŚĂƚŝƐŝƚƐŶĞĞĚ͍
Ans.  ŶĞƚǁŽƌŬ ŝƐ ĂŶ ŝŶƚĞƌĐŽŶŶĞĐƚĞĚ ĐŽůůĞĐƚŝŽŶ ŽĨ ĂƵƚŽŶŽŵŽƵƐ ĐŽŵƉƵƚĞƌƐ ƚŚĂƚ ĐĂŶ ƐŚĂƌĞ ĂŶĚ ĞdžĐŚĂŶŐĞ
ŝŶĨŽƌŵĂƚŝŽŶ͘
Need for networking:
(a) Resource sharing:ZĞƐŽƵƌĐĞƐĂƌĞƐŚĂƌĞĚďLJĂůůĐŽŵƉƵƚĞƌƐŽǀĞƌƚŚĞŶĞƚǁŽƌŬĨŽƌĞĨĨĞĐƚŝǀĞƵƚŝůŝnjĂƚŝŽŶ͘
 ;ďͿ File sharing:ĨŝůĞŝŶĂŶĞƚǁŽƌŬĐĂŶďĞĂĐĐĞƐƐĞĚĨƌŽŵĂŶLJǁŚĞƌĞ͘
2. Write two advantages and two disadvantages of network.
Ans. Advantages of network:
 ;ĂͿ tĞĐĂŶƐŚĂƌĞƌĞƐŽƵƌĐĞƐƐƵĐŚĂƐƉƌŝŶƚĞƌƐĂŶĚƐĐĂŶŶĞƌƐ͘
 ;ďͿ tĞĐĂŶƐŚĂƌĞĚĂƚĂĂŶĚĂĐĐĞƐƐĨŝůĞƐĨƌŽŵĂŶLJĐŽŵƉƵƚĞƌ͘
Disadvantages of network:
 ;ĂͿ /ĨƚŚĞƌĞŝƐĂŶLJƉƌŽďůĞŵŝŶƚŚĞƐĞƌǀĞƌ͕ƚŚĞŶŶŽĐŽŵŵƵŶŝĐĂƚŝŽŶĐĂŶƚĂŬĞƉůĂĐĞ͘
 ;ďͿ EĞƚǁŽƌŬĨĂƵůƚƐĐĂŶĐĂƵƐĞůŽƐƐŽĨĚĂƚĂ͘
 ;ĐͿ /ĨƚŚĞƌĞŝƐŶŽƉƌŝǀĂĐLJŵĞĐŚĂŶŝƐŵƵƐĞĚ͕ƚŚĞŶƚŚĞĞŶƚŝƌĞŶĞƚǁŽƌŬĐĂŶďĞĂĐĐĞƐƐĞĚďLJĂŶƵŶĂƵƚŚŽƌŝnjĞĚ
Supplement – Computer Science with Python–XII

person.
3. tŚĂƚŝƐZWEd͍tŚĂƚŝƐE^&Ed͍
Ans. ZWEd;ĚǀĂŶĐĞĚZĞƐĞĂƌĐŚWƌŽũĞĐƚŐĞŶĐLJEĞƚǁŽƌŬͿŝƐĂƉƌŽũĞĐƚƐƉŽŶƐŽƌĞĚďLJh^ĞƉĂƌƚŵĞŶƚŽĨĞĨĞŶĐĞ͘
  E^&Ed͕ĚĞǀĞůŽƉĞĚďLJƚŚĞEĂƚŝŽŶĂů^ĐŝĞŶĐĞ&ŽƵŶĚĂƚŝŽŶ͕ǁĂƐĂŚŝŐŚĐĂƉĂĐŝƚLJŶĞƚǁŽƌŬĂŶĚƐƚƌŝĐƚůLJƵƐĞĚĨŽƌ
ĂĐĂĚĞŵŝĐĂŶĚĞŶŐŝŶĞĞƌŝŶŐƌĞƐĞĂƌĐŚ͘
4. tŚĂƚĂƌĞƚŚĞǀĂƌŝŽƵƐƚLJƉĞƐŽĨŶĞƚǁŽƌŬƐ͍
Ans. ŶĞƚǁŽƌŬŝƐĂŶŝŶƚĞƌĐŽŶŶĞĐƚŝŽŶŽĨƐĞǀĞƌĂůŶŽĚĞƐƚŚƌŽƵŐŚƐŽŵĞĐŽŵŵƵŶŝĐĂƚŝŽŶŵĞĚŝĂǁŝƚŚƚŚĞŐŽĂůŽĨ
ƐŚĂƌŝŶŐĚĂƚĂ͕ĨŝůĞƐĂŶĚƌĞƐŽƵƌĐĞƐ͘dŚĞƌĞĂƌĞƚŚƌĞĞƚLJƉĞƐŽĨŶĞƚǁŽƌŬƐ͗
 ;ĂͿ >ŽĐĂůƌĞĂEĞƚǁŽƌŬ;>EͿ
 ;ďͿ DĞƚƌŽƉŽůŝƚĂŶƌĞĂEĞƚǁŽƌŬ;DEͿ
 ;ĐͿ tŝĚĞƌĞĂEĞƚǁŽƌŬ;tEͿ
5. EĂŵĞƚŚĞǀĂƌŝŽƵƐůĂLJĞƌƐŽĨĐŽĂdžŝĂůĐĂďůĞ͘
Ans. ŽĂdžŝĂůĐĂďůĞĐŽŶƐŝƐƚƐŽĨƚŚĞĨŽůůŽǁŝŶŐůĂLJĞƌƐ͗
 ;ĂͿ ŵĞƚĂůůŝĐƌŽĚͲƐŚĂƉĞĚŝŶŶĞƌĐŽŶĚƵĐƚŽƌ  ;ďͿ ŶŝŶƐƵůĂƚŽƌĐŽǀĞƌŝŶŐƚŚĞƌŽĚ
 ;ĐͿ ŵĞƚĂůůŝĐŽƵƚĞƌĐŽŶĚƵĐƚŽƌĐĂůůĞĚƐŚŝĞůĚ  ;ĚͿ ŶŝŶƐƵůĂƚŽƌĐŽǀĞƌŝŶŐƚŚĞƐŚŝĞůĚ
 ;ĞͿ ƉůĂƐƚŝĐĐŽǀĞƌ
8.68
6. tŚĂƚŝƐĂƐƉĂŵŵĂŝů͍ ΀^ϮϬϭϱ΁
Ans. ^ƉĂŵ ŝƐ ƚŚĞ ĂďƵƐĞ ŽĨ ĞůĞĐƚƌŽŶŝĐ ŵĞƐƐĂŐŝŶŐ ƐLJƐƚĞŵƐ ;ŝŶĐůƵĚŝŶŐ ŵŽƐƚ ďƌŽĂĚĐĂƐƚ ŵĞĚŝĂ͕ ĚŝŐŝƚĂů ĚĞůŝǀĞƌLJ
ƐLJƐƚĞŵƐͿƚŽƐĞŶĚƵŶƐŽůŝĐŝƚĞĚďƵůŬŵĞƐƐĂŐĞƐŝŶĚŝƐĐƌŝŵŝŶĂƚĞůLJ͘
7. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶ&dWĂŶĚ,ddW͘ ΀^ϮϬϭϱ΁
Ans. &dWŝƐĂƉƌŽƚŽĐŽůƚŽƚƌĂŶƐĨĞƌĨŝůĞƐŽǀĞƌƚŚĞŝŶƚĞƌŶĞƚ͘,ddWŝƐĂƉƌŽƚŽĐŽůǁŚŝĐŚĂůůŽǁƐƚŚĞƵƐĞŽĨ,dD>ƚŽ
ďƌŽǁƐĞǁĞďƉĂŐĞƐŝŶƚŚĞtŽƌůĚtŝĚĞtĞď͘
8. KƵƚŽĨƚŚĞĨŽůůŽǁŝŶŐ͕ǁŚŝĐŚŝƐƚŚĞĨĂƐƚĞƐƚ;ĂͿtŝƌĞĚ͕ĂŶĚ;ďͿtŝƌĞůĞƐƐŵĞĚŝƵŵŽĨĐŽŵŵƵŶŝĐĂƚŝŽŶ͍/ŶĨƌĂƌĞĚ͕
ŽĂdžŝĂůĂďůĞ͕ƚŚĞƌŶĞƚĂďůĞ͕DŝĐƌŽǁĂǀĞ͕KƉƚŝĐĂů&ŝďƌĞ͘ ΀^ϮϬϭϱ΁
Ans. (a) Wired:KƉƚŝĐĂů&ŝďƌĞ
;ďͿ Wireless:/ŶĨƌĂƌĞĚŽƌDŝĐƌŽǁĂǀĞ
9. tŚĂƚŝƐĂǁŽƌŵ͍,ŽǁŝƐŝƚƌĞŵŽǀĞĚ͍ ΀^ϮϬϭϱ΁
Ans. ǁŽƌŵŝƐĂƐĞůĨͲƌĞƉůŝĐĂƚŝŶŐĐŽŵƉƵƚĞƌƉƌŽŐƌĂŵ͘/ƚƵƐĞƐĂŶĞƚǁŽƌŬƚŽƐĞŶĚĐŽƉŝĞƐŽĨŝƚƐĞůĨƚŽŽƚŚĞƌĐŽŵƉƵƚĞƌƐ
ŽŶƚŚĞŶĞƚǁŽƌŬĂŶĚŝƚŵĂLJĚŽƐŽǁŝƚŚŽƵƚĂŶLJƵƐĞƌŝŶƚĞƌǀĞŶƚŝŽŶ͘DŽƐƚŽĨƚŚĞĐŽŵŵŽŶĂŶƚŝǀŝƌƵƐ;ĂŶƚŝͲ
ǁŽƌŵͿƐŽĨƚǁĂƌĞƌĞŵŽǀĞǁŽƌŵ͘
10. /ůůƵƐƚƌĂƚĞƚŚĞůĂLJŽƵƚĨŽƌĐŽŶŶĞĐƚŝŶŐĨŝǀĞĐŽŵƉƵƚĞƌƐŝŶĂƵƐĂŶĚĂ^ƚĂƌƚŽƉŽůŽŐLJŽĨEĞƚǁŽƌŬƐ͘
Ans. Bus topology
Server

BACKBONE

Nodes
Dropline

Star topology
Computer

Computer Computer
HUB

Computer Printer
11. /ŶŶĞƚǁŽƌŬŝŶŐ͕ǁŚĂƚŝƐtE͍,ŽǁŝƐŝƚĚŝĨĨĞƌĞŶƚĨƌŽŵ>E͍ ΀^ϮϬϭϭ΁
Ans. /ŶƚĞƌŶĞƚŝƐĂŶĞdžĂŵƉůĞŽĨtE;tŝĚĞƌĞĂEĞƚǁŽƌŬͿ͘DŽƐƚtEƐĞdžŝƐƚƚŽĐŽŶŶĞĐƚ>EƐƚŚĂƚĂƌĞŶŽƚŝŶ
ƚŚĞƐĂŵĞŐĞŽŐƌĂƉŚŝĐĂůĂƌĞĂ͘tEŝƐĚŝĨĨĞƌĞŶƚĨƌŽŵ>EĚƵĞƚŽŝƚƐŶĞƚǁŽƌŬƌĂŶŐĞ͘tEŝƐĨŽƌĐŽŶŶĞĐƚŝŶŐ
ĐŽŵƉƵƚĞƌƐĂŶLJǁŚĞƌĞŝŶƚŚĞǁŽƌůĚǁŝƚŚŽƵƚĂŶLJŐĞŽŐƌĂƉŚŝĐĂůůŝŵŝƚĂƚŝŽŶǁŚĞƌĞĂƐ>EŝƐĐŽŶĨŝŶĞĚǁŝƚŚŝŶ
Computer Networks

ĂƌĂŶŐĞŽĨϭϬϬŵƚŽϱϬϬŵ͘
12. tŚĂƚŝƐŵĞĂŶƚďLJƚŽƉŽůŽŐLJ͍EĂŵĞƐŽŵĞƉŽƉƵůĂƌƚŽƉŽůŽŐŝĞƐ͘
Ans. dŽƉŽůŽŐLJŝƐƚŚĞĂƌƌĂŶŐĞŵĞŶƚďLJǁŚŝĐŚĐŽŵƉƵƚĞƌƐĂƌĞĐŽŶŶĞĐƚĞĚǁŝƚŚĞĂĐŚŽƚŚĞƌ͕ĞŝƚŚĞƌƉŚLJƐŝĐĂůůLJŽƌ
ůŽŐŝĐĂůůLJ͘
dŚĞƉŽƉƵůĂƌƚŽƉŽůŽŐŝĞƐĂƌĞ͗
;ĂͿ ƵƐŽƌ>ŝŶĞĂƌdŽƉŽůŽŐLJ ;ďͿ ZŝŶŐdŽƉŽůŽŐLJ
;ĐͿ ^ƚĂƌdŽƉŽůŽŐLJ ;ĚͿ dƌĞĞdŽƉŽůŽŐLJ 8.69
13. tŚLJĂƌĞĨŝďƌĞŽƉƚŝĐĐĂďůĞƐďĞĐŽŵŝŶŐƉŽƉƵůĂƌ͍
Ans. &ŝďƌĞŽƉƚŝĐƚƌĂŶƐŵŝƐƐŝŽŶŝƐďĞĐŽŵŝŶŐŝŶĐƌĞĂƐŝŶŐůLJƉŽƉƵůĂƌĚƵĞƚŽŝƚƐŶŽŝƐĞƌĞƐŝƐƚĂŶĐĞ͕ůŽǁĂƚƚĞŶƵĂƚŝŽŶĂŶĚ
ŚŝŐŚďĂŶĚǁŝĚƚŚĐĂƉĂďŝůŝƚŝĞƐ͘
14. tŚĂƚĨĂĐƚŽƌƐƐŚŽƵůĚďĞƚĂŬĞŶŝŶƚŽĐŽŶƐŝĚĞƌĂƚŝŽŶǁŚŝůĞŽƉƚŝŶŐĨŽƌĂƉĂƌƚŝĐƵůĂƌƚŽƉŽůŽŐLJ͍
Ans. dŚĞƌĞĂƌĞĂŶƵŵďĞƌŽĨĨĂĐƚŽƌƐǁŚŝĐŚĂƌĞƚŽďĞĐŽŶƐŝĚĞƌĞĚ͗
 ;ĂͿ ŽƐƚ ;ďͿ &ůĞdžŝďŝůŝƚLJ
 ;ĐͿ ZĞůŝĂďŝůŝƚLJ
15. tŚĂƚŝƐĂŵŽĚĞŵ͍tŚĂƚĂƌĞƚŚĞƚǁŽƚLJƉĞƐŽĨŵŽĚĞŵƐ͍
Ans. DŽĚĞŵƐƚĂŶĚƐĨŽƌŵŽĚƵůĂƚŽƌĚĞŵŽĚƵůĂƚŽƌƚŚĂƚĐŽŶǀĞƌƚƐĂŶĂůŽŐƐŝŐŶĂůƐƚŽĚŝŐŝƚĂůƐŝŐŶĂůƐĂƚƚŚĞƐĞŶĚĞƌ͛Ɛ
ĞŶĚ͘/ƚĐŽŶǀĞƌƚƐĚŝŐŝƚĂůƐŝŐŶĂůƐďĂĐŬƚŽĂŶĂůŽŐƐŝŐŶĂůƐĂƚƚŚĞƌĞĐĞŝǀĞƌ͛ƐĞŶĚ͘
  dŚĞƚǁŽƚLJƉĞƐŽĨŵŽĚĞŵƐĂƌĞ͗ŝŶƚĞƌŶĂůŵŽĚĞŵĂŶĚĞdžƚĞƌŶĂůŵŽĚĞŵ͘
16. tŚĂƚŝƐƌĞŵŽƚĞůŽŐŝŶ͍tŚĂƚŝƐdĞůŶĞƚ͍
Ans. ZĞŵŽƚĞůŽŐŝŶŝƐƚŚĞƉƌŽĐĞƐƐŽĨĂĐĐĞƐƐŝŶŐĂŶĞƚǁŽƌŬĨƌŽŵĂƌĞŵŽƚĞƉůĂĐĞǁŝƚŚŽƵƚĂĐƚƵĂůůLJďĞŝŶŐƉƌĞƐĞŶƚ
ĂƚƚŚĞƉůĂĐĞŽĨǁŽƌŬŝŶŐ͘dĞůŶĞƚŝƐĂŶŝŶƚĞƌŶĞƚƵƚŝůŝƚLJƚŚĂƚůĞƚƐƵƐůŽŐŽŶƚŽĂƌĞŵŽƚĞĐŽŵƉƵƚĞƌƐLJƐƚĞŵ͘
ƵƐĞƌŝƐĂďůĞƚŽůŽŐŝŶƚŚĞƐLJƐƚĞŵĨŽƌƐŚĂƌŝŶŐŽĨĨŝůĞƐǁŝƚŚŽƵƚďĞŝŶŐƚŚĞĂĐƚƵĂůƵƐĞƌŽĨƚŚĂƚƐLJƐƚĞŵ͘
17. ƌŝĞĨůLJĞdžƉůĂŝŶ&dW͘
Ans. &dWƐƚĂŶĚƐĨŽƌ&ŝůĞdƌĂŶƐĨĞƌWƌŽƚŽĐŽů͘/ƚŝƐƚŚĞƐƚĂŶĚĂƌĚŵĞĐŚĂŶŝƐŵƉƌŽǀŝĚĞĚďLJdWͬ/WĨŽƌĐŽƉLJŝŶŐĂĨŝůĞ
ĨƌŽŵŽŶĞŚŽƐƚƚŽĂŶŽƚŚĞƌ͘tŚŝůĞƐŚĂƌŝŶŐĨŝůĞƐĨƌŽŵŽŶĞƐLJƐƚĞŵƚŽĂŶŽƚŚĞƌ͕ǁĞŵĂLJĞŶĐŽƵŶƚĞƌƐĞǀĞƌĂů
ƉƌŽďůĞŵƐͶƚǁŽƐLJƐƚĞŵƐŵĂLJŚĂǀĞĚŝĨĨĞƌĞŶƚĚŝƌĞĐƚŽƌLJƐƚƌƵĐƚƵƌĞƐ͕ƚǁŽƐLJƐƚĞŵƐŵĂLJŚĂǀĞĚŝĨĨĞƌĞŶƚĨŝůĞͲ
ŶĂŵŝŶŐ ĐŽŶǀĞŶƚŝŽŶƐ͕ Žƌ ƚǁŽ ƐLJƐƚĞŵƐ ŵĂLJ ŚĂǀĞ ĚŝĨĨĞƌĞŶƚ ǁĂLJƐ ƚŽ ƌĞƉƌĞƐĞŶƚ ƚĞdžƚ ĂŶĚ ĚĂƚĂ͘ ůů ƚŚĞƐĞ
ƉƌŽďůĞŵƐĂƌĞƐŽůǀĞĚďLJ&dW͘
18. tŚĂƚŝƐƉƌŽƚŽĐŽů͍EĂŵĞƐŽŵĞĐŽŵŵŽŶůLJƵƐĞĚƉƌŽƚŽĐŽůƐ͘
Ans. ƉƌŽƚŽĐŽůŵĞĂŶƐƚŚĞƌƵůĞƐƚŚĂƚĂƌĞĂƉƉůŝĐĂďůĞĨŽƌĂŶĞƚǁŽƌŬ͕ŽƌǁĞĐĂŶƐĂLJƚŚĞĐŽŵŵŽŶƐĞƚŽĨƌƵůĞƐƵƐĞĚ
ĨŽƌĐŽŵŵƵŶŝĐĂƚŝŽŶŝŶŶĞƚǁŽƌŬ͘
  ŝĨĨĞƌĞŶƚƚLJƉĞƐŽĨƉƌŽƚŽĐŽůƐĂƌĞ͗
(a) HTTP:,LJƉĞƌdĞdžƚdƌĂŶƐĨĞƌWƌŽƚŽĐŽů
 ;ďͿ FTP:&ŝůĞdƌĂŶƐĨĞƌWƌŽƚŽĐŽů
 ;ĐͿ SLIP:^ĞƌŝĂů>ŝŶĞ/ŶƚĞƌŶĞƚWƌŽƚŽĐŽů
(d) PPP:WŽŝŶƚͲƚŽͲWŽŝŶƚWƌŽƚŽĐŽů
(e) TCP/IP:dƌĂŶƐŵŝƐƐŝŽŶŽŶƚƌŽůWƌŽƚŽĐŽůͬ/ŶƚĞƌŶĞƚWƌŽƚŽĐŽů
(f) SMTP:^ŝŵƉůĞDĂŝůdƌĂŶƐĨĞƌWƌŽƚŽĐŽů
(g) POP: WŽƐƚKĨĨŝĐĞWƌŽƚŽĐŽů
(h) IMAP:/ŶƚĞƌŶĞƚDĂŝůĐĐĞƐƐWƌŽƚŽĐŽů
19. tŚĂƚŝƐdWͬ/W͍
Ans. dWͬ/W ;dƌĂŶƐŵŝƐƐŝŽŶ ŽŶƚƌŽů WƌŽƚŽĐŽůͬ/ŶƚĞƌŶĞƚ WƌŽƚŽĐŽůͿ ŝƐ Ă ƉƌŽƚŽĐŽů ĨŽƌ ĐŽŵŵƵŶŝĐĂƚŝŽŶ ďĞƚǁĞĞŶ
Supplement – Computer Science with Python–XII

ĐŽŵƉƵƚĞƌƐƵƐĞĚĂƐĂƐƚĂŶĚĂƌĚĨŽƌƚƌĂŶƐŵŝƚƚŝŶŐĚĂƚĂŽǀĞƌŶĞƚǁŽƌŬƐĂŶĚŝƐƚŚĞďĂƐŝƐĨŽƌƐƚĂŶĚĂƌĚ/ŶƚĞƌŶĞƚ
ƉƌŽƚŽĐŽůƐ͘/ƚŝƐĂůƐŽƌĞƐƉŽŶƐŝďůĞĨŽƌĂƐƐĞŵďůŝŶŐƉĂĐŬĞƚƐĂƚƚŚĞƌĞĐĞŝǀĞƌ͛ƐƐŝĚĞ͘
20. ,ŽǁŝƐ&dWĚŝĨĨĞƌĞŶƚĨƌŽŵ,ddW͍
Ans. &dWŝƐĂƉƌŽƚŽĐŽůƵƐĞĚƚŽƵƉůŽĂĚĨŝůĞƐĨƌŽŵĂǁŽƌŬƐƚĂƚŝŽŶƚŽĂŶ&dWƐĞƌǀĞƌŽƌĚŽǁŶůŽĂĚĨŝůĞƐĨƌŽŵĂŶ&dW
ƐĞƌǀĞƌƚŽĂǁŽƌŬƐƚĂƚŝŽŶ͕ǁŚĞƌĞĂƐ,ddWŝƐĂƉƌŽƚŽĐŽůƵƐĞĚƚŽƚƌĂŶƐĨĞƌĨŝůĞƐĨƌŽŵĂtĞďƐĞƌǀĞƌŽŶƚŽĂ
ďƌŽǁƐĞƌŝŶŽƌĚĞƌƚŽǀŝĞǁĂǁĞďƉĂŐĞƚŚĂƚŝƐŽŶƚŚĞŝŶƚĞƌŶĞƚ͘
21. ĞĨŝŶĞDŽďŝůĞŽŵŵƵŶŝĐĂƚŝŽŶĂŶĚtŝƌĞůĞƐƐŽŵŵƵŶŝĐĂƚŝŽŶ͘
Ans. DŽďŝůĞŽŵŵƵŶŝĐĂƚŝŽŶĞƐƐĞŶƚŝĂůůLJƌĞĨĞƌƐƚŽĂĐŽŵƉƵƚŝŶŐĚĞǀŝĐĞƚŚĂƚŝƐŶŽƚĐŽŶƚŝŶƵŽƵƐůLJĐŽŶŶĞĐƚĞĚƚŽƚŚĞ
ďĂƐĞŽƌĐĞŶƚƌĂůŶĞƚǁŽƌŬ͘dŚŝƐŵĂLJŝŶĐůƵĚĞůĂƉƚŽƉƐ͕ŶĞǁůLJͲĐƌĞĂƚĞĚƐŵĂƌƚƉŚŽŶĞƐĂŶĚĂůƐŽWƐ͘tŝƌĞůĞƐƐ
ŽŵŵƵŶŝĐĂƚŝŽŶŝƐƐŝŵƉůLJĚĂƚĂĐŽŵŵƵŶŝĐĂƚŝŽŶǁŝƚŚŽƵƚƚŚĞƵƐĞŽĨĂůĂŶĚůŝŶĞ͘dŚŝƐŵĂLJŝŶǀŽůǀĞĂĐĞůůƵůĂƌ
ƚĞůĞƉŚŽŶĞ͕ĂƚǁŽͲǁĂLJƌĂĚŝŽ͕ĂĨŝdžĞĚǁŝƌĞůĞƐƐĐŽŶŶĞĐƚŝŽŶ͕ĂůĂƐĞƌŽƌƐĂƚĞůůŝƚĞĐŽŵŵƵŶŝĐĂƚŝŽŶ͘
22. tŚĂƚŝƐDŽďŝůĞWƌŽĐĞƐƐŽƌ͍
Ans. DŽďŝůĞWƌŽĐĞƐƐŽƌƐĂƌĞƌĞƋƵŝƌĞĚƚŽƌƵŶĂŶŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵ͕ďĞŝƚĚĞƐŬƚŽƉ͕ůĂƉƚŽƉŽƌŵŽďŝůĞ͘dŚĞLJƉƌŽǀŝĚĞ
ŶĞĐĞƐƐĂƌLJƌĞƐŽƵƌĐĞƐƚŽƐƚĂƌƚĂŶŽƉĞƌĂƚŝŶŐƐLJƐƚĞŵ͕ƌƵŶĂƉƉůŝĐĂƚŝŽŶƐĂŶĚĚŽƚĂƐŬƐ͘
23. EĂŵĞĂŶLJĨŽƵƌƉŽƉƵůĂƌŵŽďŝůĞƉƌŽĐĞƐƐŽƌƐŝŶƚŚĞŵĂƌŬĞƚ͘
Ans. &ŽƵƌ ƉŽƉƵůĂƌ ŵŽďŝůĞ ƉƌŽĐĞƐƐŽƌƐ ĂƌĞ YƵĂůĐŽŵŵ ^ŶĂƉĚƌĂŐŽŶ͕ ƉƉůĞ͛Ɛ DŽďŝůĞ WƌŽĐĞƐƐŽƌƐ͕ ,ŝ^ŝůŝĐŽŶ ĂŶĚ
^ĂŵƐƵŶŐdžLJŶŽƐ͘
8.70
24. tŚĂƚĂƌĞƚŚĞĂĚǀĂŶƚĂŐĞƐŽĨĞͲĐŽŵŵĞƌĐĞĂƉƉůŝĐĂƚŝŽŶƐ͍
Ans. dŚĞĂĚǀĂŶƚĂŐĞƐŽĨĞͲĐŽŵŵĞƌĐĞĂƉƉůŝĐĂƚŝŽŶƐŝŶĐůƵĚĞƚŚĞŝƌƌŽƵŶĚͲƚŚĞͲĐůŽĐŬĂǀĂŝůĂďŝůŝƚLJ͕ƚŚĞƐƉĞĞĚŽĨĂĐĐĞƐƐ͕
ƚŚĞǁŝĚĞĂǀĂŝůĂďŝůŝƚLJŽĨŐŽŽĚƐĂŶĚƐĞƌǀŝĐĞƐĨŽƌƚŚĞĐŽŶƐƵŵĞƌ͕ĞĂƐLJĂĐĐĞƐƐŝďŝůŝƚLJĂŶĚŝŶƚĞƌŶĂƚŝŽŶĂůƌĞĂĐŚ͘
25. ĞĨŝŶĞǁĞďďƌŽǁƐĞƌĂŶĚǁĞďƐĞƌǀĞƌ͘
Ans. Web Browser:ǁĞďďƌŽǁƐĞƌŝƐĂƐŽĨƚǁĂƌĞǁŚŝĐŚŝƐƵƐĞĚĨŽƌĚŝƐƉůĂLJŝŶŐƚŚĞĐŽŶƚĞŶƚŽŶǁĞďƉĂŐĞ;ƐͿ͘
/ƚŝƐƵƐĞĚďLJƚŚĞĐůŝĞŶƚƚŽǀŝĞǁǁĞďƐŝƚĞƐ͘džĂŵƉůĞƐŽĨǁĞďďƌŽǁƐĞƌͶ'ŽŽŐůĞŚƌŽŵĞ͕&ŝƌĞĨŽdž͕/ŶƚĞƌŶĞƚ
džƉůŽƌĞƌ͕^ĂĨĂƌŝ͕KƉĞƌĂ͕ĞƚĐ͘
Web Server:ǁĞďƐĞƌǀĞƌŝƐĂƐŽĨƚǁĂƌĞǁŚŝĐŚĞŶƚĞƌƚĂŝŶƐƚŚĞƌĞƋƵĞƐƚ;ƐͿŵĂĚĞďLJĂǁĞďďƌŽǁƐĞƌ͘ǁĞď
ƐĞƌǀĞƌŚĂƐĚŝĨĨĞƌĞŶƚƉŽƌƚƐƚŽŚĂŶĚůĞĚŝĨĨĞƌĞŶƚƌĞƋƵĞƐƚƐĨƌŽŵǁĞďďƌŽǁƐĞƌ͕ůŝŬĞŐĞŶĞƌĂůůLJ&dWƌĞƋƵĞƐƚŝƐ
ŚĂŶĚůĞĚĂƚWŽƌƚϭϭϬĂŶĚ,ddWƌĞƋƵĞƐƚŝƐŚĂŶĚůĞĚĂƚWŽƌƚϴϬ͘džĂŵƉůĞŽĨǁĞďƐĞƌǀĞƌŝƐƉĂĐŚĞ͘
26. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶyD>ĂŶĚ,dD>͘
Ans. /Ŷ ,dD> ;,LJƉĞƌ dĞdžƚ DĂƌŬƵƉ >ĂŶŐƵĂŐĞͿ͕ ďŽƚŚ ƚĂŐ ƐĞŵĂŶƚŝĐƐ ĂŶĚ ƚŚĞ ƚĂŐ ƐĞƚ ĂƌĞ ĨŝdžĞĚ͕ ǁŚĞƌĞĂƐ yD>
;džƚĞŶƐŝďůĞDĂƌŬƵƉ>ĂŶŐƵĂŐĞͿŝƐĂŵĞƚĂͲůĂŶŐƵĂŐĞĨŽƌĚĞƐĐƌŝďŝŶŐŵĂƌŬƵƉůĂŶŐƵĂŐĞƐ͘yD>ƉƌŽǀŝĚĞƐƚŚĞ
ĨĂĐŝůŝƚLJ ƚŽ ĚĞĨŝŶĞ ƚĂŐƐ ĂŶĚ ƚŚĞ ƐƚƌƵĐƚƵƌĂů ƌĞůĂƚŝŽŶƐŚŝƉƐ ďĞƚǁĞĞŶ ƚŚĞŵ͘ ůů ƚŚĞ ƐĞŵĂŶƚŝĐƐ ŽĨ ĂŶ yD>
ĚŽĐƵŵĞŶƚǁŝůůĞŝƚŚĞƌďĞĚĞĨŝŶĞĚďLJƚŚĞĂƉƉůŝĐĂƚŝŽŶƐƚŚĂƚƉƌŽĐĞƐƐƚŚĞŵŽƌďLJƐƚLJůĞƐŚĞĞƚƐ͘
27. tŚĂƚŝƐǁĞƐƚŝŶŐ͍
Ans. tĞƐƚŝŶŐŝƐĂŵĞĂŶƐŽĨŚŽƐƚŝŶŐǁĞďƐĞƌǀĞƌĂƉƉůŝĐĂƚŝŽŶƐŽŶĂĐŽŵƉƵƚĞƌƐLJƐƚĞŵƚŚƌŽƵŐŚǁŚŝĐŚĞůĞĐƚƌŽŶŝĐ
ĐŽŶƚĞŶƚŽŶƚŚĞŝŶƚĞƌŶĞƚŝƐƌĞĂĚŝůLJĂǀĂŝůĂďůĞƚŽĂŶLJǁĞďͲďƌŽǁƐĞƌĐůŝĞŶƚ͘
28. tŚĂƚŝƐŚĂĐŬŝŶŐ͍
Ans. ,ĂĐŬŝŶŐŝƐĂƉƌŽĐĞƐƐŽĨĂĐĐĞƐƐŝŶŐĂĐŽŵƉƵƚĞƌƐLJƐƚĞŵŽƌŶĞƚǁŽƌŬǁŝƚŚŽƵƚŬŶŽǁŝŶŐƚŚĞĂĐĐĞƐƐĂƵƚŚŽƌŝnjĂƚŝŽŶ
ĐƌĞĚĞŶƚŝĂůŽĨƚŚĂƚƐLJƐƚĞŵ͘,ĂĐŬŝŶŐĐĂŶďĞŝůůĞŐĂůŽƌĞƚŚŝĐĂůĚĞƉĞŶĚŝŶŐŽŶƚŚĞŝŶƚĞŶƚŝŽŶŽĨƚŚĞŚĂĐŬĞƌ͘
29. tŚĂƚĂƌĞĐŽŽŬŝĞƐ͍
Ans. ŽŽŬŝĞƐĂƌĞŵĞƐƐĂŐĞƐƚŚĂƚĂǁĞďƐĞƌǀĞƌƚƌĂŶƐŵŝƚƐƚŽĂǁĞďďƌŽǁƐĞƌƐŽƚŚĂƚƚŚĞǁĞďƐĞƌǀĞƌĐĂŶŬĞĞƉ
ƚƌĂĐŬŽĨƚŚĞƵƐĞƌ͛ƐĂĐƚŝǀŝƚLJŽŶĂƐƉĞĐŝĨŝĐǁĞďƐŝƚĞ͘ŽŽŬŝĞƐĂƌĞƐĂǀĞĚŝŶƚŚĞĨŽƌŵŽĨƚĞdžƚĨŝůĞƐŝŶƚŚĞĐůŝĞŶƚ
ĐŽŵƉƵƚĞƌ͘
30. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶĐƌĂĐŬŝŶŐĂŶĚŚĂĐŬŝŶŐ͘
Ans. ƌĂĐŬŝŶŐŝƐĚĞĨŝŶĞĚĂƐĂŶĂƚƚĞŵƉƚƚŽƌĞŵŽǀĞƚŚĞĐŽƉLJƉƌŽƚĞĐƚŝŽŶƐŝŶƐĞƌƚĞĚŝŶƚŽƐŽĨƚǁĂƌĞƉƌŽŐƌĂŵƐ͘
ƉƌŽŐƌĂŵƐƵĐĐĞƐƐĨƵůůLJƐƚƌŝƉƉĞĚŽĨƉƌŽƚĞĐƚŝŽŶƐŝƐƚŚĞŶŬŶŽǁŶĂƐŚĂǀŝŶŐďĞĞŶ͞ƌĂĐŬĞĚ͘͟,ĂĐŬŝŶŐĐĂŶďĞ
ĞƚŚŝĐĂůͬůĞŐĂůďƵƚĐƌĂĐŬŝŶŐŝƐĂƚŽƚĂůůLJŝůůĞŐĂůŵĞƚŚŽĚĂŶĚŝƐĂůƐŽĐĂůůĞĚƉŝƌĂĐLJ͘
31. tŚĂƚŝƐǁĞďƐĐƌŝƉƚŝŶŐ͍
Ans. ƐĐƌŝƉƚŝƐĂƐŵĂůůďŝƚŽĨĐŽĚĞƚŚĂƚĞŶĂďůĞƐǁĞďďƌŽǁƐĞƌƐƚŽĚŽƐŽŵĞƚŚŝŶŐƌĂƚŚĞƌƚŚĂŶũƵƐƚĚŝƐƉůĂLJŝŶŐƐƚĂƚŝĐ
ƌĞƐƵůƚƐ͘^ĐƌŝƉƚƐĂƌĞƵƐĞĚŝŶǁĞďĚĞƐŝŐŶƚŽĐƌĞĂƚĞĚLJŶĂŵŝĐƉĂŐĞƐ͘dŚĞƌĞĂƌĞƚǁŽĐĂƚĞŐŽƌŝĞƐŽĨǁĞďƐĐƌŝƉƚƐ͗
ůŝĞŶƚͲ^ŝĚĞ^ĐƌŝƉƚǁŚŝĐŚĐĂŶďĞǁƌŝƚƚĞŶďLJƵƐŝŶŐ:ĂǀĂ^ĐƌŝƉƚ͕s^ĐƌŝƉƚ͕ĂŶĚ^ĞƌǀĞƌͲ^ŝĚĞ^ĐƌŝƉƚ͕ǁŚŝĐŚĐĂŶ
ďĞǁƌŝƚƚĞŶŝŶW,W;ƵƐĞĚĨŽƌĐůŝĞŶƚͲƐŝĚĞƐĐƌŝƉƚŝŶŐĂůƐŽͿĂŶĚ:^W͘
32. EĂŵĞƐŽŵĞǁĞďƐĐƌŝƉƚŝŶŐůĂŶŐƵĂŐĞƐ͘
Ans. dŚĞƌĞĂƌĞŵĂŶLJƐĐƌŝƉƚŝŶŐůĂŶŐƵĂŐĞƐĂǀĂŝůĂďůĞƚŽĚĂLJ͘DŽƐƚĐŽŵŵŽŶĂƌĞs^ĐƌŝƉƚ͕:ĂǀĂ^ĐƌŝƉƚ͕^W͕W,W͕
WZ>ĂŶĚ:^W͘
33. tŚĂƚŝƐLJďĞƌƌŝŵĞ͍
Ans. tŚĞŶĂŶLJĐƌŝŵĞŝƐĐŽŵŵŝƚƚĞĚŽǀĞƌƚŚĞŝŶƚĞƌŶĞƚ͕ŝƚŝƐƌĞĨĞƌƌĞĚƚŽĂƐLJďĞƌƌŝŵĞ͘
34. tŚĂƚŝƐtĞďϮ͘Ϭ͍
Ans. tĞďϮ͘ϬŝƐĂĐŽŶĐĞƉƚƚŚĂƚƚĂŬĞƐƚŚĞŶĞƚǁŽƌŬĂƐĂƉůĂƚĨŽƌŵĨŽƌŝŶĨŽƌŵĂƚŝŽŶƐŚĂƌŝŶŐ͕ŝŶƚĞƌŽƉĞƌĂďŝůŝƚLJ͕ƵƐĞƌͲ
ĐĞŶƚƌĞĚĚĞƐŝŐŶ͕ĂŶĚĐŽůůĂďŽƌĂƚŝŽŶŽŶƚŚĞŝŶƚĞƌŶĞƚŽƌtŽƌůĚtŝĚĞtĞď͘tĞďϮ͘ϬƐŝƚĞĂůůŽǁƐƵƐĞƌƐƚŽ
ŝŶƚĞƌĂĐƚĂŶĚĐŽůůĂďŽƌĂƚĞǁŝƚŚĞĂĐŚŽƚŚĞƌ͘džĂŵƉůĞƐŽĨtĞďϮ͘ϬŝŶĐůƵĚĞƐŽĐŝĂůŶĞƚǁŽƌŬŝŶŐƐŝƚĞƐ͕ĨĂĐĞŬ͕
ŐŽŽŐůĞн͕ƚǁŝƚƚĞƌ͕ĞƚĐ͘
Computer Networks

35. 'ŝǀĞŽŶĞĂĚǀĂŶƚĂŐĞŽĨďƵƐƚŽƉŽůŽŐLJŽĨŶĞƚǁŽƌŬ͘ůƐŽƐƚĂƚĞŚŽǁĨŽƵƌĐŽŵƉƵƚĞƌƐĐĂŶďĞĐŽŶŶĞĐƚĞĚǁŝƚŚ
ĞĂĐŚŽƚŚĞƌƵƐŝŶŐƐƚĂƌƚŽƉŽůŽŐLJŽĨŶĞƚǁŽƌŬ͘
Ans. /ŶďƵƐƚŽƉŽůŽŐLJ͕ƚŚĞǁŽƌŬƐƚĂƚŝŽŶƐĐĂŶĞĂƐŝůLJďĞĞdžƚĞŶĚĞĚŽƌƌĞŵŽǀĞĚ͘/ŶƐƚĂƌƚŽƉŽůŽŐLJ͕ĨŽƵƌĐŽŵƉƵƚĞƌƐ
ĐĂŶďĞĐŽŶŶĞĐƚĞĚǁŝƚŚĞĂĐŚŽƚŚĞƌƚŚƌŽƵŐŚĂƐĞƌǀĞƌ͘

8.71
36. tƌŝƚĞ ƚǁŽ ĂĚǀĂŶƚĂŐĞƐ ŽĨ ƵƐŝŶŐ ĂŶ ŽƉƚŝĐĂů ĨŝďƌĞ ĐĂďůĞ ŽǀĞƌ ĂŶ ƚŚĞƌŶĞƚ ĐĂďůĞ ƚŽ ĐŽŶŶĞĐƚ ƚǁŽ ƐĞƌǀŝĐĞ
ƐƚĂƚŝŽŶƐǁŚŝĐŚĂƌĞϮϬϬŵĂǁĂLJĨƌŽŵĞĂĐŚŽƚŚĞƌ͘ ΀^ϮϬϭϯ΁
Ans. KƉƚŝĐĂůĨŝďƌĞĐĂďůĞŐƵĂƌĂŶƚĞĞƐƐĞĐƵƌĞƚƌĂŶƐŵŝƐƐŝŽŶĂŶĚĂǀĞƌLJŚŝŐŚƚƌĂŶƐŵŝƐƐŝŽŶĐĂƉĂĐŝƚLJ͘KƉƚŝĐĂůĨŝďƌĞ
ĐĂďůĞŝƐŝŵŵƵŶĞƚŽĞůĞĐƚƌŝĐĂůĂŶĚŵĂŐŶĞƚŝĐŝŶƚĞƌĨĞƌĞŶĐĞ͘
37. tƌŝƚĞƚǁŽĐŚĂƌĂĐƚĞƌŝƐƚŝĐƐŽĨtŝͲ&ŝ͘ ΀^ϮϬϭϰ΁
Ans. ;ĂͿ /ƚĂůůŽǁƐĂŶĞůĞĐƚƌŽŶŝĐĚĞǀŝĐĞƚŽĞdžĐŚĂŶŐĞĚĂƚĂŽƌĐŽŶŶĞĐƚƚŽƚŚĞŝŶƚĞƌŶĞƚǁŝƌĞůĞƐƐůLJƵƐŝŶŐŵŝĐƌŽǁĂǀĞƐ͘
 ;ďͿ EĞƚǁŽƌŬƌĂŶŐĞŽĨtŝͲ&ŝŝƐŵƵĐŚůĞƐƐƚŚĂŶŽƚŚĞƌŶĞƚǁŽƌŬƚĞĐŚŶŽůŽŐŝĞƐůŝŬĞǁŝƌĞĚ>E͘
38. tŚĂƚŝƐƚŚĞĚŝĨĨĞƌĞŶĐĞďĞƚǁĞĞŶŵĂŝůĂŶĚŚĂƚ͍ ΀^ϮϬϭϰ΁
Ans. ;ĂͿ ŚĂƚŝƐĂƚLJƉĞŽĨƐŽĨƚǁĂƌĞǁŚŝůĞŵĂŝůŝƐĂƉƌŽƚŽĐŽů͘
 ;ďͿ ŚĂƚƌĞƋƵŝƌĞƐƚŚĞƉĞƌŵŝƐƐŝŽŶŽĨďŽƚŚƉĂƌƚŝĞƐǁŚŝůĞŵĂŝůĚŽĞƐŶŽƚ͘
 ;ĐͿ ŚĂƚŝƐƚLJƉŝĐĂůůLJƐŽĨƚǁĂƌĞĚĞƉĞŶĚĞŶƚǁŚŝůĞŵĂŝůŝƐŶŽƚ͘
 ;ĚͿ ŚĂƚŶĞĞĚƐĂĐĐŽƵŶƚƐŽŶƚŚĞƐĂŵĞƉƌŽǀŝĚĞƌǁŚŝůĞŵĂŝůĚŽĞƐŶŽƚ͘
39. tŚĂƚĂƌĞsŽ/W͍
Ans. sŽ/WĂƌĞĐŽŵŵƵŶŝĐĂƚŝŽŶƉƌŽƚŽĐŽůƐĂŶĚƚƌĂŶƐŵŝƐƐŝŽŶƚĞĐŚŶŽůŽŐŝĞƐĨŽƌĚĞůŝǀĞƌLJŽĨǀŽŝĐĞĐŽŵŵƵŶŝĐĂƚŝŽŶ
ĂŶĚŵƵůƚŝŵĞĚŝĂƐĞƐƐŝŽŶƐŽǀĞƌ/ŶƚĞƌŶĞƚWƌŽƚŽĐŽů;/WͿŶĞƚǁŽƌŬƐ͕ƐƵĐŚĂƐƚŚĞŝŶƚĞƌŶĞƚ͘ůƐŽ͕ǁĞĐĂŶƐĂLJƚŚĂƚ
sŽ/WĂƌĞ/WƚĞĐŚŶŽůŽŐLJ͕ŝŶƚĞƌŶĞƚƚĞůĞƉŚŽŶLJĂŶĚďƌŽĂĚďĂŶĚƚĞůĞƉŚŽŶLJ͘
40. džƉĂŶĚƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
  ;ĂͿ yD> ;ďͿ '^D
  ;ĐͿ ^D^ ;ĚͿ DE
Ans. ;ĂͿ yD>ʹdžƚĞŶƐŝďůĞDĂƌŬƵƉ>ĂŶŐƵĂŐĞ
 ;ďͿ '^Dʹ'ůŽďĂů^LJƐƚĞŵĨŽƌDŽďŝůĞĐŽŵŵƵŶŝĐĂƚŝŽŶ
 ;ĐͿ ^D^ʹ^ŚŽƌƚDĞƐƐĂŐŝŶŐ^ĞƌǀŝĐĞ
 ;ĚͿ DEʹDĞƚƌŽƉŽůŝƚĂŶƌĞĂEĞƚǁŽƌŬ
41. ,ŽǁŵĂŶLJƐǁŝƚĐŚŝŶŐƚĞĐŚŶŝƋƵĞƐĂƌĞƚŚĞƌĞ͍džƉůĂŝŶĂŶLJŽŶĞ͘
Ans. dŚĞƌĞĂƌĞƚŚƌĞĞƐǁŝƚĐŚŝŶŐƚĞĐŚŶŝƋƵĞƐ͗
  ;ĂͿ ŝƌĐƵŝƚ^ǁŝƚĐŚŝŶŐ ;ďͿ WĂĐŬĞƚ^ǁŝƚĐŚŝŶŐ
 ;ĐͿ DĞƐƐĂŐĞ^ǁŝƚĐŚŝŶŐ
Circuit Switching: /Ŷ ƚŚŝƐ ƚĞĐŚŶŝƋƵĞ͕ ĨŝƌƐƚ ƚŚĞ ĐŽŵƉůĞƚĞ ƉŚLJƐŝĐĂů ĐŽŶŶĞĐƚŝŽŶ ďĞƚǁĞĞŶ ƚǁŽ ĐŽŵƉƵƚĞƌƐ ŝƐ
ĞƐƚĂďůŝƐŚĞĚ ĂŶĚ ƚŚĞŶ ĚĂƚĂ ŝƐ ƚƌĂŶƐŵŝƚƚĞĚ ĨƌŽŵ ƚŚĞ ƐŽƵƌĐĞ ĐŽŵƉƵƚĞƌ ƚŽ ƚŚĞ ĚĞƐƚŝŶĂƚŝŽŶ ĐŽŵƉƵƚĞƌ͘ dŚĞ
ĞŶƚŝƌĞĚĞĚŝĐĂƚĞĚůŝŶĞŝƐƵƐĞĚďLJƚŚĞĐĂůůĞƌĂŶĚƚŚĞƌĞĐĞŝǀĞƌĂŶĚŶŽŽƚŚĞƌƵƐĞƌĐĂŶƵƐĞŝƚĞǀĞŶŝĨƚŚĞůŝŶĞ
ďĞĐŽŵĞƐŝĚůĞ͘tŚĞŶƚŚĞĚĂƚĂƚƌĂŶƐŵŝƐƐŝŽŶŝƐŽǀĞƌ͕ƚŚĞůŝŶĞŝƐĚŝƐĐŽŶŶĞĐƚĞĚĂŶĚŝƐĂǀĂŝůĂďůĞĨŽƌƚŚĞŶĞdžƚ
ĐŽŵŵƵŶŝĐĂƚŝŽŶ͘
42. ,ŽǁĂƌĞdƌŽũĂŶŚŽƌƐĞƐĚŝĨĨĞƌĞŶƚĨƌŽŵtŽƌŵƐ͍DĞŶƚŝŽŶĂŶLJŽŶĞĚŝĨĨĞƌĞŶĐĞ͘ ΀^ĂŵƉůĞWĂƉĞƌ΁
Ans. dƌŽũĂŶŚŽƌƐĞŝƐĂƚĞƌŵƵƐĞĚƚŽĚĞƐĐƌŝďĞŵĂůǁĂƌĞƚŚĂƚĂƉƉĞĂƌƐƚŽƚŚĞƵƐĞƌƚŽƉĞƌĨŽƌŵĂĚĞƐŝƌĂďůĞĨƵŶĐƚŝŽŶ
Supplement – Computer Science with Python–XII

ďƵƚǁŚŝĐŚ͕ŝŶĨĂĐƚ͕ĨĂĐŝůŝƚĂƚĞƐƵŶĂƵƚŚŽƌŝnjĞĚĂĐĐĞƐƐƚŽƚŚĞƵƐĞƌ͛ƐĐŽŵƉƵƚĞƌƐLJƐƚĞŵ͘
  ĐŽŵƉƵƚĞƌtŽƌŵŝƐĂƐĞůĨͲƌĞƉůŝĐĂƚŝŶŐƉƌŽŐƌĂŵ͘/ƚƵƐĞƐĂŶĞƚǁŽƌŬƚŽƐĞŶĚĐŽƉŝĞƐŽĨŝƚƐĞůĨƚŽŽƚŚĞƌŶŽĚĞƐ
ĂŶĚƚŚĂƚƚŽŽǁŝƚŚŽƵƚŚƵŵĂŶŝŶƚĞƌǀĞŶƚŝŽŶ͘
43. tŚĂƚŝƐĂĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů͍EĂŵĞƚŚĞďĂƐŝĐƚLJƉĞƐŽĨĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůƐĂǀĂŝůĂďůĞ͘
Ans. ĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůŝƐĂůƐŽŬŶŽǁŶĂƐĐŽŵŵƵŶŝĐĂƚŝŽŶŵĞĚŝĂŽƌƚƌĂŶƐŵŝƐƐŝŽŶŵĞĚŝĂ͘ŽŵŵƵŶŝĐĂƚŝŽŶ
ŵĞĚŝĂĐĂŶďĞǁŝƌĞůĞƐƐŽƌǁŝƌĞĚ͘tŝƌĞůĞƐƐŵĞĚŝĂŝƐĂůƐŽŬŶŽǁŶĂƐƵŶŐƵŝĚĞĚŵĞĚŝĂǁŚŝůĞǁŝƌĞĚŵĞĚŝĂŝƐ
ĂůƐŽŬŶŽǁŶĂƐŐƵŝĚĞĚŵĞĚŝĂ͘
  &ŽůůŽǁŝŶŐĂƌĞƚŚƌĞĞďĂƐŝĐƚLJƉĞƐŽĨĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞůƐĂǀĂŝůĂďůĞ͗
  ;ĂͿ dǁŝƐƚĞĚWĂŝƌĂďůĞƐ ;ďͿ ŽĂdžŝĂůĂďůĞƐ
 ;ĐͿ &ŝďƌĞͲŽƉƚŝĐĂďůĞƐ
44. ĞĨŝŶĞďĂƵĚ͕ďƉƐĂŶĚƉƐ͘,ŽǁĂƌĞƚŚĞƐĞŝŶƚĞƌůŝŶŬĞĚ͍
Ans. BaudŝƐĂƵŶŝƚŽĨŵĞĂƐƵƌĞŵĞŶƚĨŽƌƚŚĞŝŶĨŽƌŵĂƚŝŽŶͲĐĂƌƌLJŝŶŐĐĂƉĂĐŝƚLJŽĨĂĐŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů͘
bps (bits per second)ƌĞĨĞƌƐƚŽĂƚŚŽƵƐĂŶĚďŝƚƐƚƌĂŶƐŵŝƚƚĞĚƉĞƌƐĞĐŽŶĚ͘
Bps (Bytes per second)ƌĞĨĞƌƐƚŽĂƚŚŽƵƐĂŶĚďLJƚĞƐƚƌĂŶƐŵŝƚƚĞĚƉĞƌƐĞĐŽŶĚ͘
  ůůƚŚĞƐĞƚĞƌŵƐĂƌĞŵĞĂƐƵƌĞŵĞŶƚƵŶŝƚƐƵƐĞĚƚŽƌĞĨĞƌƚŽƚŚĞĂŵŽƵŶƚŽĨŝŶĨŽƌŵĂƚŝŽŶƚƌĂǀĞůůŝŶŐƚŚƌŽƵŐŚĂ
ƐŝŶŐůĞĐŚĂŶŶĞůĂƚĂŶLJŽŶĞƉŽŝŶƚŽĨƚŝŵĞ͘
8.72
45. ŝĨĨĞƌĞŶƚŝĂƚĞďĞƚǁĞĞŶƐƚĂƌƚŽƉŽůŽŐLJĂŶĚďƵƐƚŽƉŽůŽŐLJ͘
Ans. dŚĞŵĂŝŶƉŽŝŶƚƐŽĨĚŝĨĨĞƌĞŶĐĞďĞƚǁĞĞŶƐƚĂƌƚŽƉŽůŽŐLJĂŶĚďƵƐƚŽƉŽůŽŐLJĂƌĞ͗
Star topology Bus topology
ĐĞŶƚƌĂůŚƵďŝƐƌĞƋƵŝƌĞĚƚŽĐŽŶŶĞĐƚĂůůĐŽŵƉƵƚĞƌƐǁŝƚŚ ůŽŶŐĐĂďůĞŬŶŽǁŶĂƐďĂĐŬďŽŶĞŝƐƵƐĞĚƚŽĐŽŶŶĞĐƚĂůů
ĞĂĐŚŽƚŚĞƌ͘ ĐŽŵƉƵƚĞƌƐǁŝƚŚĞĂĐŚŽƚŚĞƌ͘
dŚĞĚĂƚĂŝƐƚƌĂŶƐŵŝƚƚĞĚĨƌŽŵƚŚĞƐĞŶĚĞƌƚŽƚŚĞƌĞĐĞŝǀĞƌ dŚĞĚĂƚĂŝƐƚƌĂŶƐŵŝƚƚĞĚƚŚƌŽƵŐŚĂůŽŶŐĐĂďůĞĨƌŽŵƚŚĞ
ďLJƉĂƐƐŝŶŐƚŚƌŽƵŐŚƚŚĞŚƵď͘ ƐĞŶĚĞƌƚŽƚŚĞƌĞĐĞŝǀĞƌ͘
EŽĐŽůůŝƐŝŽŶƚĂŬĞƐƉůĂĐĞƚŚƌŽƵŐŚƚƌĂŶƐŵŝƐƐŝŽŶŽĨĚĂƚĂ͘ ŽůůŝƐŝŽŶĐĂŶƚĂŬĞƉůĂĐĞĂƐƚŚĞĚĂƚĂĐĂŶďĞƚƌĂŶƐŵŝƚƚĞĚ
ĨƌŽŵďŽƚŚĞŶĚƐĂƚƚŚĞƐĂŵĞƚŝŵĞ͘
/ĨƚŚĞĐĞŶƚƌĂůŚƵďĨĂŝůƐ͕ƚŚĞĞŶƚŝƌĞŶĞƚǁŽƌŬƐŚƵƚƐĚŽǁŶ͘ /ĨƚŚĞƌĞŝƐĂďƌĞĂŬŝŶĂĐĂďůĞ͕ŶŽƚƌĂŶƐŵŝƐƐŝŽŶƚĂŬĞƐƉůĂĐĞ͘
46. ĞĨŝŶĞƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
  ;ĂͿ Z:Ͳϰϱ ;ďͿ ƚŚĞƌŶĞƚ ;ĐͿ ƚŚĞƌŶĞƚĐĂƌĚ
  ;ĚͿ ,Ƶď ;ĞͿ ^ǁŝƚĐŚ
Ans. (a) RJ-45:Z:ͲϰϱŝƐĂƐƚĂŶĚĂƌĚƚLJƉĞŽĨĐŽŶŶĞĐƚŽƌĨŽƌŶĞƚǁŽƌŬĐĂďůĞƐĂŶĚŶĞƚǁŽƌŬƐ͘/ƚŝƐĂŶϴͲƉŝŶĐŽŶŶĞĐƚŽƌ
ƵƐƵĂůůLJƵƐĞĚǁŝƚŚƚŚĞƌŶĞƚĐĂďůĞƐ͘
 ;ďͿ Ethernet:ƚŚĞƌŶĞƚŝƐĂ>EĂƌĐŚŝƚĞĐƚƵƌĞĚĞǀĞůŽƉĞĚďLJyĞƌŽdžŽƌƉ͘ĂůŽŶŐǁŝƚŚĂŶĚ/ŶƚĞů͘/ƚƵƐĞƐ
ĂďƵƐŽƌƐƚĂƌƚŽƉŽůŽŐLJĂŶĚƐƵƉƉŽƌƚƐĚĂƚĂƚƌĂŶƐĨĞƌƌĂƚĞƐŽĨƵƉƚŽϭϬŵďƉƐ͘
 ;ĐͿ Ethernet card: dŚĞĐŽŵƉƵƚĞƌƉĂƌƚƐŽĨƚŚĞƌŶĞƚĂƌĞĐŽŶŶĞĐƚĞĚƚŚƌŽƵŐŚĂƐƉĞĐŝĂůĐĂƌĚĐĂůůĞĚƚŚĞƌŶĞƚ
ĐĂƌĚ͘/ƚĐŽŶƚĂŝŶƐĐŽŶŶĞĐƚŝŽŶƐĨŽƌĞŝƚŚĞƌĐŽĂdžŝĂůŽƌƚǁŝƐƚĞĚƉĂŝƌĐĂďůĞƐ
(d) Hub: /ŶĐŽŵƉƵƚĞƌŶĞƚǁŽƌŬŝŶŐ͕ĂŚƵďŝƐĂƐŵĂůů͕ƐŝŵƉůĞ͕ůŽǁͲĐŽƐƚĚĞǀŝĐĞƚŚĂƚũŽŝŶƐŵƵůƚŝƉůĞĐŽŵƉƵƚĞƌƐ
together.
(e) Switch: ƐǁŝƚĐŚŝƐĂƐŵĂůůŚĂƌĚǁĂƌĞĚĞǀŝĐĞƚŚĂƚũŽŝŶƐŵƵůƚŝƉůĞĐŽŵƉƵƚĞƌƐƚŽŐĞƚŚĞƌǁŝƚŚŝŶŽŶĞůŽĐĂů
area network (LAN).
47. ĞĨŝŶĞƚŚĞĨŽůůŽǁŝŶŐĚĂƚĂĐŽŵŵƵŶŝĐĂƚŝŶŐĚĞǀŝĐĞƐ͗
  ;ĂͿ ZĞƉĞĂƚĞƌ ;ďͿ ƌŝĚŐĞ
  ;ĐͿ ZŽƵƚĞƌ ;ĚͿ 'ĂƚĞǁĂLJ
Ans. (a) Repeater:/ƚŝƐĂĚĞǀŝĐĞƚŚĂƚĂŵƉůŝĨŝĞƐĂŶĚƌĞƐƚŽƌĞƐƚŚĞƐŝŐŶĂůďĞĨŽƌĞŝƚŐĞƚƐĚĞŐƌĂĚĞĚĂŶĚƚƌĂŶƐŵŝƚƐƚŚĞ
ŽƌŝŐŝŶĂůƐŝŐŶĂůďĂĐŬƚŽƚŚĞĚĞƐƚŝŶĂƚŝŽŶ͘ƌĞƉĞĂƚĞƌŝƐĂƌĞŐĞŶĞƌĂƚŽƌĂŶĚŶŽƚĂŶĂŵƉůŝĨŝĞƌ͘
 ;ďͿ Bridge:ďƌŝĚŐĞŝƐĂĚĞǀŝĐĞĚĞƐŝŐŶĞĚƚŽĐŽŶŶĞĐƚƚǁŽ>EƐĞŐŵĞŶƚƐ͘dŚĞƉƵƌƉŽƐĞŽĨĂďƌŝĚŐĞŝƐƚŽĨŝůƚĞƌ
ƚƌĂĨĨŝĐ ŽŶ Ă >E͘ ƌŝĚŐĞ ƌĞůĂLJƐ ĨƌĂŵĞƐ ďĞƚǁĞĞŶ ƚǁŽ ŽƌŝŐŝŶĂůůLJ ƐĞƉĂƌĂƚĞ ƐĞŐŵĞŶƚƐ͘ tŚĞŶ Ă ĨƌĂŵĞ
ĞŶƚĞƌƐĂďƌŝĚŐĞ͕ƚŚĞďƌŝĚŐĞŶŽƚŽŶůLJƌĞŐĞŶĞƌĂƚĞƐƚŚĞƐŝŐŶĂůďƵƚĂůƐŽĐŚĞĐŬƐƚŚĞƉŚLJƐŝĐĂůĂĚĚƌĞƐƐŽĨ
ƚŚĞĚĞƐƚŝŶĂƚŝŽŶĂŶĚĨŽƌǁĂƌĚƐƚŚĞŶĞǁĐŽƉLJŽŶůLJƚŽƚŚĂƚƉŽƌƚ͘
 ;ĐͿ Router:ZŽƵƚĞƌƐŽƉĞƌĂƚĞŝŶƚŚĞƉŚLJƐŝĐĂů͕ĚĂƚĂůŝŶŬĂŶĚŶĞƚǁŽƌŬůĂLJĞƌƐŽĨƚŚĞK^/ŵŽĚĞů͘dŚĞLJĚĞĐŝĚĞ
ƚŚĞƉĂƚŚĂƉĂĐŬĞƚƐŚŽƵůĚƚĂŬĞ͘ƌŽƵƚĞƌŝƐĂŶĞƚǁŽƌŬŝŶŐĚĞǀŝĐĞǁŚŽƐĞƐŽĨƚǁĂƌĞĂŶĚŚĂƌĚǁĂƌĞĂƌĞ
ƵƐƵĂůůLJƚĂŝůŽƌĞĚƚŽƚŚĞƚĂƐŬƐŽĨƌŽƵƚŝŶŐĂŶĚĨŽƌǁĂƌĚŝŶŐĚĂƚĂƉĂĐŬĞƚƐĂĐƌŽƐƐŶĞƚǁŽƌŬ͘
(d) Gateway:ŐĂƚĞǁĂLJŽƉĞƌĂƚĞƐŽŶĂůůƚŚĞƐĞǀĞŶůĂLJĞƌƐŽĨK^/ŵŽĚĞů͘ŶĞƚǁŽƌŬŐĂƚĞǁĂLJŝƐĂĐŽŵƉƵƚĞƌ
ǁŚŝĐŚŚĂƐŝŶƚĞƌŶĞƚͲǁŽƌŬŝŶŐĐĂƉĂďŝůŝƚLJŽĨũŽŝŶŝŶŐƚŽŐĞƚŚĞƌƚǁŽŶĞƚǁŽƌŬƐƚŚĂƚƵƐĞĚŝĨĨĞƌĞŶƚďĂƐĞƉƌŽƚŽĐŽůƐ͘
'ĂƚĞǁĂLJĐŽŶǀĞƌƚƐŽŶĞƉƌŽƚŽĐŽůƚŽĂŶŽƚŚĞƌĂŶĚĐĂŶ͕ƚŚĞƌĞĨŽƌĞ͕ĐŽŶŶĞĐƚƚǁŽĚŝƐƐŝŵŝůĂƌŶĞƚǁŽƌŬƐ͘
48. tŚĂƚŝƐ,dD>͍tŚĞƌĞŝƐŝƚƵƐĞĚ͍
Ans. ,dD>;,LJƉĞƌdĞdžƚDĂƌŬƵƉ>ĂŶŐƵĂŐĞͿŝƐƵƐĞĚƚŽĐƌĞĂƚĞ,LJƉĞƌƚĞdžƚĚŽĐƵŵĞŶƚƐ;ǁĞďƉĂŐĞƐͿĨŽƌǁĞďƐŝƚĞƐ͘
  ,dD>ŝƐƚŚĞƐƚĂƚŝĐŵĂƌŬͲƵƉůĂŶŐƵĂŐĞǁŚŝĐŚŝƐƵƐĞĚĨŽƌƚŚĞĨŽůůŽǁŝŶŐƉƵƌƉŽƐĞƐ͗
  ͻ /ƚŝƐƵƐĞĚƚŽĐƌĞĂƚĞǁĞďƉĂŐĞƐ͘
  ͻ /ƚƚĞůůƐƚŚĞďƌŽǁƐĞƌŚŽǁƚŽĚŝƐƉůĂLJƚĞdžƚ͕ƉŝĐƚƵƌĞƐĂŶĚŽƚŚĞƌƐƵƉƉŽƌƚŵĞĚŝĂ͘
  ͻ /ƚƐƵƉƉŽƌƚƐŵƵůƚŝŵĞĚŝĂĂŶĚŶĞǁƉĂŐĞůĂLJŽƵƚĨĞĂƚƵƌĞƐ͘
  ͻ /ƚƉƌŽǀŝĚĞƐŵĂŶLJƚĂŐƐĨŽƌĐŽŶƚƌŽůůŝŶŐƚŚĞƉƌĞƐĞŶƚĂƚŝŽŶŽĨŝŶĨŽƌŵĂƚŝŽŶŽŶƚŚĞǁĞďƉĂŐĞƐ͕ƐƵĐŚĂƐ͗
   фKzх͕ф>/х͕ф,Zх͕ĞƚĐ͘
49. ĞĨŝŶĞ'^D͕DĂŶĚt>>͘
Computer Networks

Ans. GSM:'ůŽďĂůƐLJƐƚĞŵĨŽƌŵŽďŝůĞĐŽŵŵƵŶŝĐĂƚŝŽŶ;'^DͿŝƐĂǁŝĚĞĂƌĞĂǁŝƌĞůĞƐƐĐŽŵŵƵŶŝĐĂƚŝŽŶƐƐLJƐƚĞŵƚŚĂƚ
ƵƐĞƐ ĚŝŐŝƚĂů ƌĂĚŝŽ ƚƌĂŶƐŵŝƐƐŝŽŶ ƚŽ ƉƌŽǀŝĚĞ ǀŽŝĐĞ ĚĂƚĂ ĂŶĚ ŵƵůƚŝŵĞĚŝĂ ĐŽŵŵƵŶŝĐĂƚŝŽŶ ƐĞƌǀŝĐĞƐ͘  '^D
ƐLJƐƚĞŵĐŽŽƌĚŝŶĂƚĞƐƚŚĞĐŽŵŵƵŶŝĐĂƚŝŽŶďĞƚǁĞĞŶŵŽďŝůĞƚĞůĞƉŚŽŶĞƐ͕ďĂƐĞƐƚĂƚŝŽŶƐĂŶĚƐǁŝƚĐŚŝŶŐƐLJƐƚĞŵƐ͘
CDMA:ŽĚĞŝǀŝƐŝŽŶDƵůƚŝƉůĞĐĐĞƐƐ;DͿŝƐĂĚŝŐŝƚĂůǁŝƌĞůĞƐƐƚĞůĞƉŚŽŶLJƚƌĂŶƐŵŝƐƐŝŽŶƚĞĐŚŶŝƋƵĞǁŚŝĐŚ
ĂůůŽǁƐŵƵůƚŝƉůĞĨƌĞƋƵĞŶĐŝĞƐƚŽďĞƵƐĞĚƐŝŵƵůƚĂŶĞŽƵƐůLJͶ^ƉƌĞĂĚ^ƉĞĐƚƌƵŵ͘
WLL:tŝƌĞůĞƐƐŝŶ>ŽĐĂů>ŽŽƉ;t>>ͿŝƐĂƐLJƐƚĞŵƚŚĂƚĐŽŶŶĞĐƚƐƚŚĞƐƵďƐĐƌŝďĞƌƚŽƚŚĞƉƵďůŝĐƐǁŝƚĐŚĞĚƚĞůĞƉŚŽŶĞ
ŶĞƚǁŽƌŬ;W^dEͿƵƐŝŶŐƌĂĚŝŽƐŝŐŶĂůƐĂƐĂůƚĞƌŶĂƚŝǀĞƚŽŽƚŚĞƌĐŽŶŶĞĐƚŝŶŐŵĞĚŝĂ͘
8.73
UNSOLVED QUESTIONS
1. tŚĂƚŝƐŝŶƚĞƌŶĞƚ͍
2. tŚĂƚŝƐŶĞƚǁŽƌŬ͍
3. tŚĂƚĂƌĞƚŚĞǀĂƌŝŽƵƐƚLJƉĞƐŽĨƚŽƉŽůŽŐŝĞƐ͍
4. ĞƐĐƌŝďĞďƵƐƚŽƉŽůŽŐLJĂŶĚƐƚĂƌƚŽƉŽůŽŐLJ͘
5. ĞĨŝŶĞƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
  ;ĂͿ ĂƵĚ ;ďͿ ŽŵŵƵŶŝĐĂƚŝŽŶĐŚĂŶŶĞů
  ;ĐͿ ,ƵďƐ ;ĚͿ ZĞƉĞĂƚĞƌƐ
6. ĞĨŝŶĞ'^DĂŶĚ'WZ^ǁŝƌĞůĞƐƐĐŽŵŵƵŶŝĐĂƚŝŽŶƐLJƐƚĞŵ͘
7. tŚĂƚŝƐŵŽĚĞŵ͍ĞĨŝŶĞƚŚĞĨƵŶĐƚŝŽŶŝŶŐŽĨŝŶƚĞƌŶĂůŵŽĚĞŵĂŶĚĞdžƚĞƌŶĂůŵŽĚĞŵ͘
8. džƉĂŶĚĂŶĚĞdžƉůĂŝŶƚŚĞĨŽůůŽǁŝŶŐƚĞƌŵƐ͗
  ;ĂͿ WWW ;ďͿ WKWϯ
  ;ĐͿ sŽ/W ;ĚͿ /Z
9. tŚĂƚŝƐƚŚĞƐŝŐŶŝĨŝĐĂŶĐĞŽĨĐLJďĞƌůĂǁ͍
10. ĞƐĐƌŝďĞƚŚĞĨŽůůŽǁŝŶŐŶĞƚǁŽƌŬŝŶŐĚĞǀŝĐĞƐ͗
  ;ĂͿ ,ƵďƐ ;ďͿ ZĞƉĞĂƚĞƌƐ ;ĐͿ ZŽƵƚĞƌƐ
  ;ĚͿ ƌŝĚŐĞƐ ;ĞͿ 'ĂƚĞǁĂLJƐ
11. tŚĂƚĂƌĞtŝͲ&ŝĐĂƌĚƐ͍džƉůĂŝŶ͘
12. tŚĂƚŝƐƚŚĞƐŝŐŶŝĨŝĐĂŶĐĞŽĨƵƐŝŶŐĨŝƌĞǁĂůůƐĂŶĚĂƵƚŚĞŶƚŝĐĂƚŝŽŶ͍
13. tŚĂƚŝƐĂĐŽŵŵƵŶŝĐĂƚŝŽŶƉƌŽƚŽĐŽů͍tŚĂƚŝƐŝƚƐƌŽůĞŝŶŶĞƚǁŽƌŬŝŶŐ͍
14. tŚĂƚŝƐŚƚƚƉƐ͍,ŽǁĚŽĞƐŝƚǁŽƌŬ͍
15. tŚĂƚŝƐƚŚĞƌŶĞƚ͍tŚĂƚŝƐƚŚĞƌŶĞƚĂƌĚ͍
16. tŚĂƚĂƌĞŚƵďƐ͍,ŽǁĂƌĞĂĐƚŝǀĞŚƵďƐĚŝĨĨĞƌĞŶƚĨƌŽŵƉĂƐƐŝǀĞŚƵďƐ͍
17. tŚĂƚĂƌĞƚŚĞĨĂĐŝůŝƚŝĞƐƉƌŽǀŝĚĞĚďLJƚŚĞ^ĞƌǀĞƌŝŶĂŶĞƚǁŽƌŬĞŶǀŝƌŽŶŵĞŶƚ͍
18. tŚŝĐŚĐŽŵŵƵŶŝĐĂƚŝŽŶŵĞĚŝƵŵŝƐƚŽďĞƐƵŐŐĞƐƚĞĚĨŽƌǀĞƌLJĞĨĨĞĐƚŝǀĞĂŶĚĨĂƐƚĐŽŵŵƵŶŝĐĂƚŝŽŶŝŶŐƵŝĚĞĚ
ŵĞĚŝƵŵ͍
19. /ŶĂŚĂƌƐŚŝŶĚƵƐƚƌŝĂůĞŶǀŝƌŽŶŵĞŶƚ͕ǁŚŝĐŚĐĂďůĞǁŽƵůĚLJŽƵůŝŬĞƚŽƵƐĞ͍
20. tŚŝĐŚŵĞĚŝĂŚĂǀĞƚŚĞĂďŝůŝƚLJƚŽĐŽŵŵƵŶŝĐĂƚĞŽǀĞƌŽĐĞĂŶƐ͍
21. tŚĂƚŝƐƚŚĞĚŝĨĨĞƌĞŶĐĞďĞƚǁĞĞŶŵŝĐƌŽǁĂǀĞĂŶĚƌĂĚŝŽǁĂǀĞƚƌĂŶƐŵŝƐƐŝŽŶ͍
22. tŚŝĐŚƚƌĂŶƐŵŝƐƐŝŽŶŵĞĚŝƵŵŝƐƵƐĞĨƵůĨŽƌƐƉĂƌƐĞůLJƉŽƉƵůĂƚĞĚĂƌĞĂƐ͍
23. tŚŝĐŚŶĞƚǁŽƌŬŝƐĞĂƐLJƚŽĞdžƉĂŶĚ͍
24. tŚŝĐŚĚĞǀŝĐĞĨŝůƚĞƌƐƚŚĞĚĂƚĂĂŶĚǁŚŝĐŚĚĞǀŝĐĞĐĂŶŚĂŶĚůĞĚŝĨĨĞƌĞŶƚƉƌŽƚŽĐŽů͍
25. tŚĂƚŝƐĂŶĞƚǁŽƌŬ͍tŚĂƚĂƌĞŝƚƐŐŽĂůƐĂŶĚĂƉƉůŝĐĂƚŝŽŶƐ͍
Supplement – Computer Science with Python–XII

26. tƌŝƚĞƐŽŵĞĂĚǀĂŶƚĂŐĞƐĂŶĚĚŝƐĂĚǀĂŶƚĂŐĞƐŽĨƚŚĞĨŽůůŽǁŝŶŐ͗
  ;ĂͿ KƉƚŝĐĂůĨŝďƌĞƐ ;ďͿ ŽĂdžŝĂůĐĂďůĞƐ ;ĐͿ dǁŝƐƚĞĚƉĂŝƌĐĂďůĞƐ
  ;ĚͿ ZĂĚŝŽǁĂǀĞƐ ;ĞͿ DŝĐƌŽǁĂǀĞƐ ;ĨͿ ^ĂƚĞůůŝƚĞƐ
27. džƉůĂŝŶƚŚĞƌŽůĞŽĨ,ddWƉƌŽƚŽĐŽů͘
28. ĞĨŝŶĞĞŵĂŝů͘
29. tŚĂƚĚŽLJŽƵƵŶĚĞƌƐƚĂŶĚďLJĚĂƚĂƚƌĂŶƐĨĞƌƌĂƚĞƐ͍
30. tŚĂƚĂƌĞŚƵďƐ͍tŚĂƚĂƌĞŝƚƐƚLJƉĞƐ͍
31. tŚĂƚŝƐƚŚĞƌŽůĞŽĨĂƐǁŝƚĐŚŝŶĂŶĞƚǁŽƌŬ͍
32. ƌŝĞĨůLJĚŝƐĐƵƐƐƚŚĞƌŽůĞŽĨƚŚĞĨŽůůŽǁŝŶŐĚĞǀŝĐĞƐŝŶƚŚĞĐŽŶƚĞdžƚŽĨŶĞƚǁŽƌŬŝŶŐ͗
  ;ĂͿ ZĞƉĞĂƚĞƌ ;ďͿ ZŽƵƚĞƌ
  ;ĐͿ ƌŝĚŐĞ ;ĚͿ 'ĂƚĞǁĂLJ
33. džƉůĂŝŶďƌŝĞĨůLJ͗
  ;ĂͿ ,ddW ;ďͿ dWͬ/W ;ĐͿ &dW
34. tŚĂƚŝƐĐŽŵƉƵƚŝŶŐ͍,ŽǁŝƐŝƚĚŝĨĨĞƌĞŶƚĨƌŽŵŵŽďŝůĞĐŽŵƉƵƚŝŶŐ͍
35. tŚĞŶ ǁŽƵůĚ LJŽƵ ƉƌĞĨĞƌ ;ŝͿ ŚƵďƐ ŽǀĞƌ ƌĞƉĞĂƚĞƌƐ͕ ;ŝŝͿ ďƌŝĚŐĞƐ ŽǀĞƌ ŚƵďƐ͕ ĂŶĚ ;ŝŝŝͿ ƐǁŝƚĐŚĞƐ ŽǀĞƌ ŽƚŚĞƌ
ŶĞƚǁŽƌŬŝŶŐĚĞǀŝĐĞƐ͍
8.74

You might also like