0% found this document useful (0 votes)
39 views55 pages

Session 2 - Networking

The document provides an overview of computer networking, including definitions, components, types, and advantages. It also covers network architectures, switching techniques, network topologies, and the significance of cybersecurity and malware. Additionally, it includes questions and multiple-choice questions for assessment purposes.

Uploaded by

sanddep0000123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
39 views55 pages

Session 2 - Networking

The document provides an overview of computer networking, including definitions, components, types, and advantages. It also covers network architectures, switching techniques, network topologies, and the significance of cybersecurity and malware. Additionally, it includes questions and multiple-choice questions for assessment purposes.

Uploaded by

sanddep0000123
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 55

Session 2: Networking

Fundamental
For Class 10th,11th & 12th
Lecture By: Mr. Prashant Kumar
Introduction

The idea of networking has been around for a long time and has take on
many meanings. If you were to lookup “Network” in your dictionary.

➢ A system of interlacing lines, track or channels.


➢ A system in which a number of independent devices are linked
together to share data and peripherals.
Computer Network

A computer network is a set of computers and devices which


are connected via cables or wireless connection to share
resources and data.
Need for a computer network

➢ Information Exchange: To exchange data and information b/w


different computer users, it is necessary to interconnect their
computers.
➢ Resource sharing: Printer, hard drive, media, software and
computer file.
Advantages of Computer Networks
● Communication
● Sharing
● Security
● Software Cost Management
● Broadcasting
● Instant and Flexible Access:
Major Computer Networks Components

1. Network Operating System (NOS): It’s a software that


allows multiple computers to communicate, share files
and hardware devices.
2. Network Interface Card (NIC): A dedicated full time
connect the computer to a network.

Wireless NIC
Wired NIC
Communication Medium
Two Types : 1. Wired 2.
Wireless
1. Wires/Cables

Coaxial Cables: Generally Used in the able network systems to


send the television signals to the TV Sets.
1. Wires/Cables Cont…..

Ethernet or Twisted Pair Cables: Commonly used to connect


systems and devices in a local area network for data
communication application.
1. Wires/Cables Cont…..
Optical Fibre Cables: These are highly reliable cables to carry the
information quickly over the long distance.

● Made up of ultra thin fibers of glass.


● It carries light from source to another end.
● Working on total internal reflection.
Computer Network Architecture
Two type of computer network architecture.
1. Peer to Peer Architecture.
2. Client Server Architecture.
Switching Technique
● This is the mechanism of exchanging information between different
computer networks and network segments.
● It used in large networks.
● Multiple paths that link sender and receiver.
● Information may be switched as it travels through various
communication channels.

● Switching is basically of three types.


1. Circuit
2. Messages
3. Packet
Switching technique
1. Circuit Switching: a dedicated channel is set up for
established between sender and recipient during the
communication. I.e. end-to-end path
a. Data is transferred using physical connection b/w
sender & receiver.
b. Telephone communication system, the normal voice
call is the example of circuit switching.
2. Message Switching: there is no need to establish a
dedicated path b/w any two communication device.
a. Each massage is treated as an independent block
b. It required an intermediator to transmit the data.
c. It ensure that the message reaches it destination.
Switching technique
3. Packet Switching:

● Message is broken into packets of fixed size.


● Each Packet has header
● Header Contains source and destination address information,
acknowledgment and error bits.
● Mostly network use the switching.
Network Components
All the physical devices which are required to form network segments for
communication and sharing files and resources over the computer network.
1. HUB

A Hub is a network device which receives data from one


node and broadcasts it among all the nodes connected to it.
2. Switch

A switch is similar to a hub but it is more intelligent. While hub just


broadcast the data, a switch does “filtering and forwarding”.
Modem

Modulation and demodulation. It


convert the analog signal to
digital signal and digital signal to
analog signal.
3. Router

It’s a network device which routes the information around the


network. It is used to connect one network to another networks.
4. Bridge

It connects and filters data


between two LANs. It inspects
incoming traffic(data) and decides
whether to forward or discard it.
5. Repeater

It’s a device that increases the range of transmitted signal by re


transmission. It is implemented to expand boundaries of a wired or
wireless Local Area Network and to propagate a weak or broken
signal
6. Gateway

It’s a network device that acts as a gate between two networks. It


connects two different types of networks to share information. It
may be a router, firewall, server, or other device that enables traffic
to flow in and out of the network.
Types of Computer Network
Personal Area Network (PAN)

It enables communication between


computers or mobiles and other
devices with the range of 10 meters.

● Very short Distance, best for


home, office.
● Transmission amongst devices
such as computer, smartphone,
tablets and personal digital
assistants.
● It can be wired or wireless.
Local Area Network (LAN)

● It’s a network at single site, typically


an individual office building.
● It may have 2 computer to 1000
computers.
● It mostly have wired connections for
increased speed and security.
● We can also make wireless LAN.
● High transmission rates and low
cost.
Metropolitan Area Network (MAN)

● LAN that usually spans a city.


● It is larger than LAN and smaller
than WAN
● It Covers few miles to 50 miles.
● Used to connect several branches.
● Uses microwave or fiber cables to
link up the network.
Wide Area Network (WAN)

● WAN spans large geographical


area. (Entire Country and entire
world).
● It contains smaller networks such
as LAN and MAN.
● Internet is the best suitable example
of this.
● Speed depends on cost of
connections.
● Transmit by Phone line or wireless
such as satellites.
Network Topologies
● It represents the physical and logical
structures of a computer network.
● Physical Structure: Physical layout of the
nodes, workstations, cables.
● Logical Structure: it refers information
flows b/w different components.
● Categorized:
○ Bus topology
○ Star topology
○ Ring topology
○ Mesh topology
○ Hybrid topology
Bus Topology

● All the nodes(computer and


server)are connected to a
single cable.
● Central cable is known as
backbone of network. .
● Terminator is adds at ends of
the bus to prevent bouncing of
signals.
● One computer acts as a server
and leads the network,
Bus Topology→
Advantages / Disadvantages.

● Cost effective ● Cable Fails, Network


● Easy to install and fails.
maintain. ● Heavy traffic reduces the
● Easy to expand the performance
network by joining more ● Slower communication
cables. ● Security is very low.
● Good for LAN
Star Topology

● All the nodes(computer)are


connected to a central device
called HUB
● Central device can be a hub,
router or switch.
● All data passes through central
device.
● Center acts as a junction.
Star Topology→
Advantages / Disadvantages.
● Fast Performance with few ● Use of hub increases the
nodes and low traffic overall cost.
● Each node has a dedicated ● Performance of the network
link to the Hub. depends upon capacity of hub.
● Easy to setup and maintain. ● Too much dependence on
● Centralized management central device.
● Failure of one node does ● If Hub fails. Whole network will
not affect the rest of go down.
network.
● Failure is easy to detect.
● Addition and removal of
nodes is easy.
Ring Topology
● Nodes makes a closed loop.
● Each node communicates with
these two adjacent neighbour.
● Data travel in one direction
● Sending and receiving by the
help of tokens.
● Tokens: It contain a piece of
information (destination host)
along with data sent by the
source of computer.
● Token is passed to next node,
which checks if the signal is
intended to it.
Ring Topology→
Advantages / Disadvantages.
● Each node has equal ● If one nodes fails, complete
access to resources. network goes down.
● Token passing makes it ● Network is highly dependent
very organized hence on cables.
reduces chance of collision. ● Each data packet need to pass
● Traffic flows in only one through all the nodes which
direction at very high makes it slow
speed.
Mesh Topology

● Each network node is


connected to every other node.
● Receiving data from both
sides.
● Common example is wireless
networks.
Mesh Topology→
Advantages / Disadvantages.

● Each connection carries it ● Costing of cables is high.


own data load. ● Installation and configuration is
● It is robust. difficult.
● Faults can be diagnosed ● Bulk wiring is required.
easily.
● Provides full security and
privacy.
Hybrid Topology

● Hybrid: Mixture of two different


things
● Combination of two or more
topologies.
● Star and Bus are two most
common example.
Hybrid Topology→
Advantages / Disadvantages.

● Effective and flexible ● Costly


● Scalable as size can be ● Complex in design.
increased.
● Fault detection is easy.
MAC Address: Media Access Control Address
A 6 byte address:

10 : B5 : 03 : 63 : 2E : FC

Manufacturer-id (By IEEE)

10 : B5 : 03 : 63 : 2E : FC

Card No (By Manufacturer)


The Cloud
It is internet based computing, whereby shared resources, software, and
information are provided to computers and other devices on demand, like the
electricity grid.
MCQ

1. Which of these is a chip which is installed in every computer to


connect the computer to a network cable?
A. NOS B. NIC C. Gateway D.
Repeater
2. Which of these is useful in small organization or small area
networks where security is not an issue?
A. Peer-to-Peer B. Client-Server C. Ring D. None of
these
3. Which of these receives data from one node and broadcasts it
among all the nodes?
A. Firewall B. Hub C. Bridge D.
Gateway
Question/Answer time
1. Why a computer network is required?
2. Write any five advantages of a computer network.
3. Describe the NOS.
4. What is switching? List the different switching techniques.
5. Distinguish between LAN,MAN and WAN?
6. List the advantages and disadvantages of Bus topology?
Netiquette for chatting
● Don't type all text in uppercase.
● Uppercase is like Shouting on Internet and
very aggressive
● Message should be short and point to point

● Give enough time to recipients to reply.

● Don't ask multiple questions in a short


time.

● Give your Undivided attention.

● Use correct emoticons to express you text


or feelings.
MCQ
1) Which of these IM users can share or exchange?
a. Text b. Image c. Document d. All of
these
2) What you can do using IM?
a. Chat b. Video Call c. Audio Call d. All of these
3) Which of the following is correct URL to access Gmail?
a. www.gmail.com b. www.gmail.in
c. www.google.mail.in d. www.hangouts.com
4) Which option do you click to start a new conversation?
a. New Chat b. New Session c. New d. New Conversation
5) Which of these is a web browser?
Fungus and Cleaning of Internet
Malware

The term malware refers to malicious software (programs)


designed with the intension to affect the normal functionality by
causing harm to the system, or with the intension of
getting unauthorized access to the system, or denying access
to legitimate users of computing resources. A malware may be
virus, worm, Trojan horse, or spam.
Virus
A virus is a software code that may harm your system by overwriting or corrupting the
system files.
A computer virus is similar in action to viruses in our body which replicate themselves
and affect body cells.
The affected part is called infected area.
A computer virus may make several copies of it by inserting its code onto the system
programs, files or boot sector of hard drives and thereby may corrupt them.
This causes the system to slow down or even stop functioning. The viruses are mainly
categorized as boot sector virus, file infector virus, and macro virus.
Worm
A worm is often received via network, and it automatically keeps
on creating several copies of itself on the hard disk thereby
flooding the hard disk.
When worm is received as an email attachment, it is automatically
forwarded to the recipients leading to network congestion.
Thus a worm may crash the system and entire network.
No host application is required for worms to replicate themselves.
For example, Code Red Worm which makes more than 2,50,000
copies of itself in approximately 9 hours
Trojan Horse
● Trojan Horse is a code that appears to be desirable and useful but
ends up harming the system.
● Trojan horse can attach itself with a safe application. For example,
it may be attached to any game downloaded over Internet.
● Such an application when executed creates a backdoor in the
system through which a hacker can access the system.
● The hacker can monitor all the activity performed on the system.
He can also control the infected system by harming the data on
the system.
● For example, in late 1990s, Trojan Horse named Sub7 was
Spam
Spams are the unwanted electronic mails, generally
sent in bulk over the Internet to recipients.
Such undesirable mails are generally commercial
mails sent for advertisement purpose.
Phishing
● Phishing refers to the act of stealing user’s personal information
through fraud mails.
● These mails either entail personal information through embedded
forms, or contain links to the web page that may prompt you to
provide this information.
● Information attempted to be stolen may include bank account
number, debit/credit card number, passwords or any other
valuable data.
● Lack of awareness
● Misleading Mails
Intellectual Property Rights IRP Issue
The intellectual property is the work produced by a person or an
organization using the mind and creativity. The intellectual property
comprises of intangible assets such as literary work, artistic work, a
work of music, and an engineering design.
Hacking
● Hacking may be described as having unauthorized access to someone’s computer
or computer network for stealing resources such as password or confidential
files, or causing harm to network or system.
● A hacker identifies the vulnerabilities of the system in order to achieve this.
● A hacker may be driven by several reasons for doing so such as his/ her own
personal interest, as a means of fun, or protest.
● Hackers are also categorized as good hacker and bad hacker.
● Bad hacker hacks the system with bad intentions whereas
● Good hacker tries to hack system in order to identify its weaknesses so that they
can be isolated.
● These bad (unethical) hackers are termed crackers, as opposed to good (ethical)
hackers.
Cyber Security
Cyber crimes are the crimes related to the misuse of computer or Internet
such as theft, fraud, and forgery. The IT act defines cyber crime as an
unlawful act where in the computer is either a tool or a target or both.
1. Sending spam mails to uninterested recipients.
2. Hacking someone’s account or system.
3. Stealing someone’s personal information through phishing
4. Hosting a site carrying lots of malware or being a source for spreading them.
5. Harassing someone through mails, messages or social networking.
6. Posting offensive content on any site or sending it to anyone.
7. Defaming someone using Internet.
8. Forging someone’s digital signatures
9. Indulging in fraudulent financial transaction.
10. Providing misleading information to clients/ general public through use of Internet
resources.
Question_Answer time
● What is Google Hangouts?
● How do you access Google Hangouts on yous
computer?
● List any four features of IM?
● Distinguish between web based and application
based IMs?

You might also like