0% found this document useful (0 votes)
47 views14 pages

II Puc Chapter 15 Networking

Chapter 15 covers essential networking concepts, including definitions of networking, servers, clients, and various network topologies. It also discusses protocols like HTTP, FTP, and SMTP, as well as types of networks such as LAN, MAN, and WAN. Additionally, the chapter addresses network security, types of viruses, and the advantages of different transmission media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
47 views14 pages

II Puc Chapter 15 Networking

Chapter 15 covers essential networking concepts, including definitions of networking, servers, clients, and various network topologies. It also discusses protocols like HTTP, FTP, and SMTP, as well as types of networks such as LAN, MAN, and WAN. Additionally, the chapter addresses network security, types of viruses, and the advantages of different transmission media.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Chapter - 15

Networking concepts
(1+1+2+0+5)
One Mark Questions
1. What is networking?
Networking is an inter-connection of several autonomous computers.

2. What is server?
Computer or computer program which manages access to a centralized resource or service in a
network.

3. What is client?
A client is a piece of computer hardware or software that accesses a service made available by a
server.

4. What is topology?
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer
network.

5. Expand 2G
2G (or 2-G) is short for second-generation wireless telephone technology

6. What is virus?
A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. (Vital Information under siege)

7. What is chatting?
Chatting is referring to any kind of communication over the Internet that offers a real-time
transmission of text messages from sender to receiver.

8. What is cyber law?


Cyber law is the area of law that deals with the legal and regulatory aspects of Internet and
electronic elements, including computers, software, hardware and information systems (IS).

9. What are cookies?


Cookies are small, often encrypted text files, located in browser directories to keep track of the
user activity

10. What are hackers?


Hacker is someone who seeks and exploits weaknesses in a computer system or computer
network.

11. What is URL?


URL stands for Uniform Resource Locator, and is used to specify addresses on the
World Wide Web. An example of a URL is https://www.computerhope.com

12. Expand ARPANET.


Advanced Research Project Agency network

13. Expand FTP, SMTP


FTP-File Transfer protocol

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
SMTP-Simple mail transfer protocol
OSI -Open Systems Interconnection.
TCP/IP-Transmission Control Protocol/Internet Protocol
WWW-world wide web
14. What is a datagram?
A datagram is a basic transfer unit associated with a packet-switched network.

15. What is the use of FTP?


FTP (File Transfer Protocol)
FTP is a standard internet protocol provided by TCP/IP used for transmitting the files from
one
host to another.

16. Define Transmission medium


Transmission media is a communication channel that carries the information from the sender
to the receiver.

17. Mention some of the antivirus software


Some of the antivirus are Kaspersky , Quick heal, K7, Norton 360, Micro trend titanium,
AVG,
Panda, ESET Nod32, Avast. McAFee etc.,

18. What is Wi-Fi


Wi-Fi refers to Wireless Fidelity, which lets you connect to the internet without a direct line
from your PC to the ISP

19. What is GPRS?


General Packet Radio Service is a packet-switching technology that enables data
transfers through cellular networks.

20. Define WWW


The World Wide Web is the universe of network-accessible information, an
embodiment of human knowledge.

21. What is a node?


Nodes refer to the computer that are attached to a network.

22.What is Internet?
The Internet is a vast network that connects computers all over the world. Through the
Internet, people can share information and communicate from anywhere with an Internet
connection.

23. What is radio wave?


Transmission making use of radio frequencies

24. What are the types of transmission media?


Bounded media and unbounded media
Two Mark Questions
25. List the goals for networking
1.Resource and load sharing
It Is to make all programs, data and equipment available to anyone on the network without
the regard to the physical location of the resource and the user.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
2.Reduced cost
Several machines can share printers, tape drives, etc.
3.High reliability
If a machine goes down, another can take over
4.Mail and communication
It is possible to exchange messages end to end immediately
5.Security
It prevents the use of network and data access by un authorized persons.
6.Performance:
Maximum performance at minimum cost
7.Flexible access
Files can be accessed from any computer in the network.

26. What is the need of networking


 File sharing provides sharing of data files over the network
 Print sharing of computer resources such as hard disk and printers etc
 Email for communication with the email address.
 Remote access able to access data and information, around the globe
 Sharing database to multiple users at the same time by ensuring the integrity

27.What do you mean by transmission/Communication modes?


Transmission Mode defines the direction of the flow of information between two
communication
devices
1. Simplex: In Communication Networks, Communication can take place in one
direction TV broadcasting is an example.
2. Half Duplex: A half duplex system can transmit data in both directions, but only in one
direction at a time. for example. a walkie-talkie.
3. Full Duplex: A full duplex system can transmit data simultaneously in both directions
on transmission path. Ex: telephone
28. What is SIM card?
Subscriber Identity Module
is a chip card, the size of a postage stamp
 A SIM is a tiny computer chip that gives a cellular device its unique phone number.
 It has memory, a processor and the ability to interact with the user.
 SIM typically 16 to 64kb of memory

29. What is network security?


 Network security is to ensure that only legal or authorized user and programs gain access to
information in database
 Network security is the security provided to a network from unauthorized access
and risks.

30. Explain the types of viruses?


1. File Infectors – These types of viruses either infect executable files
2. Boot Sector Viruses – Install themselves on the beginning tracks of a hard drive or
the Master Boot Record or simply they change the pointer to an active boot sector.
3. Macro Viruses – Infect data files like electronic spreadsheets or databases of several
software packages.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
31. What is GSM
• GSM (Global System for Mobile communication) is a digital mobile network that is widely
used by mobile phone users in Europe and other parts of the world.
• Used for mobile communication
• Digital cellular technology used for transmitting mobile voice and data services

32. What is an EDGE?


EDGE - Enhanced Data for Global Evolution
The new EDGE air interface has been developed specifically to meet the bandwidth needs of
3G.

33. Explain the switching technology


Circuit switching
 Communications in which a physical connection is established before transmission.
 e.g. Circuit-switching network is the telephone system, which links together wire
segments to create a single unbroken line for each telephone call.
Three phases
 Circuit establishment
 Data transfer
 Circuit disconnect

Packet switching
 The entire message is broken down into smaller chunks called packets.
 It is easier for intermediate networking devices to store smaller size packets and to they
do
 not take much to forward to next hop.
 Packets contain user data plus control information, source address and destination
address
 At each node packet is received, stored briefly and passed to next node.

Message switching
 This technique was somewhere in middle of circuit switching and packet switching.
 There is no need of dedicated connection
 In this technique, the source computer sends the data or the message to the switching
office first, which stores the data in the buffer.
 It then looks for a free link to another switching office and then sends the data to this
office.
 This process is continued until the data is delivered to the destination computers.
 Owing to its working principle, it is also known as store and forward.
 That is, store first (in switching office), forward later, one jump at a time

34.What is network security?


 Network security is to ensure that only legal or authorized user and programs gain access to
information in database
 Using control mechanisms to authenticate user to get access to those resources that they are
allowed to do.

35. What are advantages of EDGE?


Enhanced Data GSM Environment
Enhanced Data rates for GSM Evolution
GSM-> Global system for mobile communication
 Time division multiple accesses (TDMA) networks to transmit data at up to 384 kilobits per
second (Kbps).

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
 It offers up to 48Kbps per channel

Three Mark question


36.Explain the HTTP?
 HTTP - Hypertext Transfer Protocol
 It's a stateless request-response based communication protocol.
 It's used to send and receive data on the Web i.e., over the Internet.

37.What is an IP address?
 An IP address is a unique address that identifies a device on the internet or a local network
 IP address is a 32-bit number.
 IP address allows the computers to send and receive information.
 An IP address is a string of numbers separated by periods
 Example 192.158. 1.38

38.Classify and explain servers


Computer or computer program which manages access to a centralized resource or service in
a
network.
Types of sever
1. Dedicated Server
A dedicated server is a single computer in a network reserved for serving the needs of the
network such as access data , software’s and hardware resources.
2. Non Dedicated Server
A non-dedicated server acts as a server as well as a workstation.

39. Explain 3 types of networks


LAN - Local Area Network
 A LAN connects computer network devices over a relatively short distance
e.g. a building .
 LAN is very useful for sharing resources, such as data storage and printers.
 LANs can be built with inexpensive hardware, such as hubs, network adapters and Ethernet
cables.
 Higher security, Less error rate, faster transmission

MAN - Metropolitan Area Network


 It consists of a computer network across an entire city, college campus or small region.
 This type of network can cover an area from several miles to tens of miles.
 A MAN is often used to connect several LANs together to form a bigger network.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
WAN - Wide Area Network
 WAN, occupies a very large area, such as an entire country or the entire world
 A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the
best-known example of a public WAN.

40. Explain the cables and different types of cables used in transmission
Twisted Pair Cable
 A twisted pair cable is made of two plastic insulated copper wires twisted together to form of
Helix.
 It reduces electrical interference between adjacent pairs of wires

Twisted Pair is of two types:


1. Unshielded Twisted Pair (UTP)
It consists of two conductors usually copper, each with its own color plastic insulator.
Advantages:
100 meter limit
Disadvantages:
Bandwidth is low when compared with Coaxial Cable

2. Shielded Twisted Pair (STP)


This cable has a metal foil or braided-mesh covering which encases each pair of insulated
conductors.
Advantage:
Higher capacity than unshielded twisted pair
Disadvantages:
Heavy
3. Coaxial Cable
Coaxial cable or coax (is a type of cable that has an inner copper conductor surrounded by a
tubular insulating layer, surrounded by a tubular conducting shield also have an insulating
outer sheath or jacket.
Thinnet (10Base2):
Coaxial cable is thinner.
Having a maximum segment length of 185m

Thicknet (10Base5) :
Coaxial cable is thicker than thinnet .
Having a maximum segment length of 500m
4.Fiber Optics
 Optical fiber typically includes a transparent glass core surrounded by a transparent
cladding material with a lower index of refraction.
 It carries light from source at one end of the fiber to a detector at the other end
 The light source may Light Emitting Diodes (LED) , Laser Diodes
 The data to be transmitted is modulated using frequency modulation technique

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
 Using LED, the bandwidth is 20 to 150 Mbps
Advantages
1) Immunity to Electromagnetic Interference
2) It is suited for harsh industrial environment
3) High Bandwidth over Long Distances
Disadvantages
1) Cables are expensive to install
2) Optical fibre requires repeating at distance intervals.

41.Explain the applications of networking


SMS (Short Message Service)
It transmission of message to and from mobile / fax / through IP address
Message should be fixed size of alphanumeric characters no images
CHATTING
Chat is a text-based communication that is live or in real-time.
Typed text is received by other participants immediately and reply to your text
VIDEO CONFERENCING
Allow two or more locations to communicate by simultaneous two-way video and audio
Transmissions.

42.Write the difference between LAN and WAN


LAN (Local Area Network) WAN (Wide Area Network)
Diameter not more than few kilometrs Span entire countries
Very low error rate High error rate
LAN ownership is private But WAN’s ownership can be private or
public.
The speed of LAN is high(more than WAN). Speed of WAN is slower than LAN.
There is less congestion in LAN While there is more congestion in WAN

Five Mark Questions

43. Explain the working of OSI and TCP/IP


OSI (Open System Interconnection)

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
The Physical Layer
It concerned with transmitting raw bits over a communication channel.
It is responsible for the actual physical connection between the devices.
Converting bits into electrical signal
Data Link Layer
It is responsible for moving frames from source address to destination address
It divides the data from N/W layer into frames
It provides the mechanism of error control, flow control
Network Layer
This layer is responsible how packets are routed from source to destination.
The main function is to determine how packets are routed from source to destination.
Responsible for data delivery, routing, control congestion
Transport Layer
This layer is responsible for end-to-end delivery between hosts by ensuring all packets are
arrived correctly.
The basic function of transport layer is to accept data from above layer and split it up into
smaller units called datagrams if needed, and pass these to the network layer and ensure
that the pieces all arrive correctly at the other end.
It is responsible for source process to destination process delivery of entire message
Session Layer
Establishment, maintaining and ending a session between two nodes.
It enters into Dialog Control
Presentation Layer
This layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Converts abstract representation to network standard representation
Application Layer
Contains a variety of protocols that are commonly needed by the user. For example, HTTP
(Hyper Text Transfer Protocol) which is the bases for the World Wide Web (WWW) to access
web pages.
Provides User interfaces and support for Services, like e-mail, file transfer, message
handling.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
TCP/IP

TCP/IP model
Application Layer –
It is responsible for node-to-node communication and controls user-interface specifications.
This layer contains many protocols. Some of the protocols present in this layer are: HTTP,
HTTPS, FTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS

Transport layer
This layer is analogous to the transport layer of the OSI model.
It is responsible for end-to-end communication and error-free delivery of data.
Source and destination enter into conversation
The two main protocols present in this layer are :
1. Transmission Control Protocol (TCP) –
It is known to provide reliable connection-oriented protocol that allows byte on one
machine
to be delivered without error on any other machine in the internet.
It fragments the information into messages and passes to internet layer.
It also handles flow control.
2. User Datagram Protocol (UDP) –
It is the go-to protocol if your application does not require reliable transport.
Unreliable connectionless protocol.
Suited for prompt delivery compared to accurate delivery.

Internet Layer –
This layer parallels the functions of OSI’s Network layer.
It defines the protocols which are responsible for logical transmission of data over the entire
network. Holds whole architecture together.
The main protocols residing at this layer are:
IP – stands for Internet Protocol and it is responsible or job is to delivering packets from
the source host to the destination host by looking at the IP addresses in the packet headers.
IP has 2 versions: IPv4 and IPv6.
ICMP – stands for Internet Control Message Protocol. Send notification of datagram problem
back to sender.

Network Access Layer –


This layer corresponds to the combination of Data Link Layer and Physical Layer of the OSI
model. It defines how the data should be sent physically through the network.
This layer is mainly responsible for the transmission of the data between two devices on the
same network. This consists of SLIP, PPP

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
44. Explain various networking devices used?
1. Modem:
It allows you to connect to global with telephone system
• Modulator-Demodulator.
• It converts digital data from a computer or other device into an analog signal that can be
sent over standard telephone lines
Types
a. Internal modems: The modems that are fixed within the computer.
b. External modems: The modems that are connected externally to a computer as other
peripherals are connected.
2. Ethernet Card: Network interface (NIC) card that is installed in a computer so that it can be
connected to a network.
3. Hub: Used to connect several devices together in network
4. Switch: a device that filters and forwards packets between LAN segments.
5. Repeater: is a device which amplifies signal being transmitted. It is used in long network
lines, which exceed the maximum rated distance for a single run.
6. Bridge: it links two networks together
7. Router: A device that determine the optimal path along which network
8. Gateway: A node on a network that serves as an entrance to another network.
Or
A gateway is a device which connects two dissimilar networks.

45.What is topology explain in detail


Network topology is the arrangement of the various nodes of a computer network.
Bus Topology
 Computers as well as servers are connected to the single cable called bus, by the help of
interface connectors.
 This central cable is the backbone of the network and is known as Bus.
 Every workstation communicates with the other device through this Bus.
 The message is broadcasted but only the intended recipient, whose MAC address or IP
address matches, accepts it.
 If the MAC /IP address of machine doesn’t match with the intended address, machine
discards the signal.

Advantages (benefits) of Linear Bus Topology


1. It is easy to set-up and extend.
2. Cable length required for this topology is the least compared to other networks.
3. Bus topology costs very less.
4. Linear Bus network is mostly used in small networks.
5. Good for LAN.
Disadvantages (Drawbacks) of Linear Bus Topology
1. There is a limit on central cable length and number of nodes that can be connected.
2. If the main cable (i.e. bus) encounters some problem, whole network breaks down.
3. It is difficult to detect and troubleshoot fault at individual station.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
4. Efficiency of Bus network reduces, as the number of devices connected to it increases.
5. It is not suitable for networks with heavy traffic.
Ring Topology
 All the nodes are connected to each-other in such a way that they make a closed loop.
 Each workstation is connected to two other components on either side, and it
 communicates with these two adjacent neighbours.
 Data travels around the network, in one direction. Sending and receiving of data takes place
by the help of TOKEN.

Advantages
1) Short cable length
2) Each computer has equal access to resources.
3) Its performance is better than that of Bus topology.
Disadvantages
1) Each packet of data must pass through all the computers between source and
destination.
2) If one workstation or port goes down, the entire network gets affected.

Tree Topology
 Tree Topology integrates the characteristics of Star and Bus Topology.
 Transmission takes place in the same way as in the bus topology

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
Advantages
1) It is an extension of Star and bus Topologies
2) Expansion of Network is possible and easy.
3) Error detection and correction is easy.
4) If one segment is damaged, other segments are not affected

Disadvantages
1) relies heavily on the main bus cable
2) As more and more nodes added, the maintenance becomes difficult.

Mesh Topology
 Computer and other devices, are interconnected with one another
 Every node not only sends its own signals but also relays data from other nodes.
 It provides an alternative root in case the host is either down or too busy
 Node not only sends its own signals but also relays data from other nodes.

Advantages
1. It is excellent for long distance networking
2. Even if one of the nodes fails there is always an alternative path present.
3. It provides extensive backup, rerouting and pass-through capability

Disadvantages
1. Redundancy in many of the network connections.
2. Cost of this network is high
3. Administration of the network is tough.

Star Topology:
 It consists of a central node such as a router, hub or switch to which all other nodes are
connected by single path
 When the central node receives a packet from a connecting node, it can pass the packet on
to
other nodes in the network.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
Advantages:
1. Ease of service
2. Failure of one node will not affect the entire network
Disadvantages:
1. Expensive
2. Requires additional equipment

46. What is gateway? Explain


1. A gateway is a network point that acts as an entrance to another network.
2. It performs data transmission and protocol conversion
3. The gateway is actually a node on network that routes the traffic from a workstation to the
outside network that is serving the Webpages
4. The gateway is the ISP that connects the user to internet
5. The gateway also acts as proxy server and firewall

47. Explain the network security in details


To prevent and monitor unauthorized access, misuse, modification, or denial of a computer
network and network-accessible resources.
Authenticated users only can get access to those resources that they are allowed to do.
Protecting methods:
 Authorization
The function of specifying access rights to resources related to information
 Authentication
Network security starts with authenticating, commonly with a username and a password.
 Firewall
Firewall prevents unauthorized access to or from a private network
 Encrypted Smart Card
It can generate a token that a computer can recognize
Every time it generates different tokens
 Bio Metric
The aspects of Human characteristics such as Finger prints, retinal scan.

48. Give the measures for preventing virus?


1. Never use Disks without scanning it

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
2. Use Licensed software
3. Protect your system with password
4. Use Antivirus software
5. Keep antivirus Up to date
6. Always scan files downloaded from the internet

49.What is computer virus? Write the symptoms (characteristics) of computer virus?


A virus is a malicious software or program which enter into computer without the knowledge
of
user
Characteristics are:
1. Computer may respond slowly.
2. It may create duplicate files.
3. May get unusual error messages
4. Computer may reboot on its own
5. Applications may not work properly
6. Disk drives may inaccessible

50. Explain about 1G, 2G, 3G , 4G, 5G


 1G Network - are considered to be the first analog cellular systems, which started early
1980s.1G network were conceived and designed purely for voice calls with almost no
consideration of data services.
 2G Networks – Second Generation are the first digital cellular systems launched early
1990s, offering improved sound quality, better security and higher total capacity.
 3G Networks: third Generation is a specification for the third generation of mobile
communications technology. 3G is a broadband, packet– based transmission of text,
digitized voice, video, and multimedia.
 4G Networks: Fourth Generation is of mobile phone technology with high speed, and high
capacity, high bandwidth.
 5th Generation Mobile technology: 5G technology has changed the means to use cell
phones within very high bandwidth, high speed and increased capacity. 5G technology
offer high resolution for crazy cell phone user and bi-directional large bandwidth shaping.
5G technology also providing subscriber supervision tools for fast action.Uploading and
downloading speed of 5G technology is high.

_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222

You might also like