0% found this document useful (0 votes)
3 views4 pages

Chapter 5

Chapter 5 covers the fundamentals of computer networks, including their benefits, types (PAN, LAN, MAN, WAN), devices (modem, router, switch), and topologies (bus, star, ring). It also discusses important protocols (TCP/IP, HTTP, FTP) and cybersecurity threats and measures. Additionally, it addresses wireless communication technologies such as Wi-Fi, Bluetooth, and mobile internet (4G/5G).

Uploaded by

ashim05birbhum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
3 views4 pages

Chapter 5

Chapter 5 covers the fundamentals of computer networks, including their benefits, types (PAN, LAN, MAN, WAN), devices (modem, router, switch), and topologies (bus, star, ring). It also discusses important protocols (TCP/IP, HTTP, FTP) and cybersecurity threats and measures. Additionally, it addresses wireless communication technologies such as Wi-Fi, Bluetooth, and mobile internet (4G/5G).

Uploaded by

ashim05birbhum
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 4

Chapter 5: Computer Networks - Class 12

Computer Science
5.1 Introduction to Computer Networks
A computer network is a system of interconnected computers and devices that share
resources and communicate with each other.

5.1.1 Benefits of Computer Networks

 Resource Sharing → Devices (printers, storage) can be shared.


 Communication → Email, messaging, video calls.
 Data Sharing → Easy access to files across devices.
 Centralized Management → Remote monitoring and maintenance.

5.2 Types of Networks


5.2.1 Based on Geographical Area

Type Full Form Coverage Area Example


PAN Personal Area Network 1-10 meters Bluetooth, Smartwatch
LAN Local Area Network Small area (Home, Office) School Computer Lab
MAN Metropolitan Area Network City-wide Cable TV Network
WAN Wide Area Network Large area (Country/World) Internet

5.2.2 Based on Architecture

Type Description Example


Centralized control, clients request services from a
Client-Server Banking System
server.
Peer-to-Peer File Sharing
Each computer acts as both client and server.
(P2P) (BitTorrent)

5.3 Network Devices


Device Function
Modem Converts digital data to analog (for Internet access).
Router Connects different networks (Used in homes for Wi-Fi).
Switch Connects multiple devices in a LAN.
Hub Broadcasts data to all connected devices.
Device Function
Repeater Amplifies weak signals in a network.
Gateway Connects two different networks with different protocols.

5.4 Network Topologies


Network topology refers to how devices are arranged in a network.

Topology Structure Advantages Disadvantages


Single failure crashes the
Bus Single central cable Cheap, Easy to install
network
Central hub connects Reliable, Easy to Hub failure stops
Star
devices troubleshoot network
One failure affects entire
Ring Circular connection Predictable performance
network
Every device is connected Redundant paths ensure
Mesh Expensive, Complex
to every other reliability
Scalable, Efficient for
Tree Combination of Star & Bus Complex, Expensive
large networks

5.5 Network Protocols


Protocols define rules for communication between devices.

Protocol Full Form Function


Transmission Control Protocol / Internet
TCP/IP Enables internet communication.
Protocol
HTTP/HTTPS HyperText Transfer Protocol (Secure) Transfers web pages.
Transfers files between
FTP File Transfer Protocol
computers.
SMTP Simple Mail Transfer Protocol Sends emails.
Post Office Protocol 3 / Internet Message
POP3/IMAP Retrieves emails.
Access Protocol
Converts domain names into IP
DNS Domain Name System
addresses.

5.6 Internet and Web Services


5.6.1 IP Address

A unique identifier for a device on a network.


 IPv4 → 32-bit address (e.g., 192.168.1.1)
 IPv6 → 128-bit address (e.g., 2001:db8::ff00:42:8329)

5.6.2 Domain Name System (DNS)

 Converts www.google.com → 142.250.190.78


 Eliminates the need to remember IP addresses.

5.6.3 Uniform Resource Locator (URL)

A URL is a web address (e.g., https://www.example.com).


Parts of a URL:

 https:// → Protocol
 www.example.com → Domain Name
 /index.html → Webpage Path

5.6.4 Internet Services

Service Description
WWW (World Wide Web) Collection of web pages linked via hyperlinks.
Email Digital messaging service.
VoIP (Voice over IP) Voice calls over the internet (e.g., Skype, Zoom).
Cloud Computing Storing & accessing data over the internet (e.g., Google Drive).

5.7 Cybersecurity and Threats


5.7.1 Types of Cyber Threats

Threat Description
Virus A program that infects files and spreads.
Worm A self-replicating malware that spreads over networks.
Trojan Horse Disguised as legitimate software but harmful.
Phishing Fake emails or websites that steal personal data.
Denial of Service (DoS) Attack Overloads a website, making it unusable.

5.7.2 Cybersecurity Measures

Measure Description
Antivirus Software Detects and removes malware.
Firewall Blocks unauthorized network access.
Encryption Converts data into unreadable format (e.g., HTTPS).
Two-Factor Authentication Adds an extra security layer (e.g., OTP).
Regular Updates Keeps software patched against vulnerabilities.
5.8 Wireless and Mobile Communication
Technology Description
Wi-Fi Wireless local network (e.g., home internet).
Bluetooth Short-range wireless communication.
NFC (Near Field Communication) Contactless payment technology (e.g., Google Pay).
4G/5G High-speed mobile internet.

Summary of Chapter 5
 Types of Networks → PAN, LAN, MAN, WAN.
 Network Devices → Router, Switch, Modem, Repeater.
 Topologies → Bus, Star, Ring, Mesh, Tree.
 Protocols → TCP/IP, HTTP, FTP, SMTP, DNS.
 Cybersecurity → Threats like viruses, phishing & security measures.
 Wireless Communication → Wi-Fi, Bluetooth, NFC, 4G/5G.

You might also like