II Puc Chapter 15 Networking
II Puc Chapter 15 Networking
Networking concepts
(1+1+2+0+5)
One Mark Questions
1. What is networking?
Networking is an inter-connection of several autonomous computers.
2. What is server?
Computer or computer program which manages access to a centralized resource or service in a
network.
3. What is client?
A client is a piece of computer hardware or software that accesses a service made available by a
server.
4. What is topology?
Network topology is the arrangement of the various elements (links, nodes, etc.) of a computer
network.
5. Expand 2G
2G (or 2-G) is short for second-generation wireless telephone technology
6. What is virus?
A computer virus is a program or piece of code that is loaded onto your computer without your
knowledge and runs against your wishes. (Vital Information under siege)
7. What is chatting?
Chatting is referring to any kind of communication over the Internet that offers a real-time
transmission of text messages from sender to receiver.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
SMTP-Simple mail transfer protocol
OSI -Open Systems Interconnection.
TCP/IP-Transmission Control Protocol/Internet Protocol
WWW-world wide web
14. What is a datagram?
A datagram is a basic transfer unit associated with a packet-switched network.
22.What is Internet?
The Internet is a vast network that connects computers all over the world. Through the
Internet, people can share information and communicate from anywhere with an Internet
connection.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
2.Reduced cost
Several machines can share printers, tape drives, etc.
3.High reliability
If a machine goes down, another can take over
4.Mail and communication
It is possible to exchange messages end to end immediately
5.Security
It prevents the use of network and data access by un authorized persons.
6.Performance:
Maximum performance at minimum cost
7.Flexible access
Files can be accessed from any computer in the network.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
31. What is GSM
• GSM (Global System for Mobile communication) is a digital mobile network that is widely
used by mobile phone users in Europe and other parts of the world.
• Used for mobile communication
• Digital cellular technology used for transmitting mobile voice and data services
Packet switching
The entire message is broken down into smaller chunks called packets.
It is easier for intermediate networking devices to store smaller size packets and to they
do
not take much to forward to next hop.
Packets contain user data plus control information, source address and destination
address
At each node packet is received, stored briefly and passed to next node.
Message switching
This technique was somewhere in middle of circuit switching and packet switching.
There is no need of dedicated connection
In this technique, the source computer sends the data or the message to the switching
office first, which stores the data in the buffer.
It then looks for a free link to another switching office and then sends the data to this
office.
This process is continued until the data is delivered to the destination computers.
Owing to its working principle, it is also known as store and forward.
That is, store first (in switching office), forward later, one jump at a time
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
It offers up to 48Kbps per channel
37.What is an IP address?
An IP address is a unique address that identifies a device on the internet or a local network
IP address is a 32-bit number.
IP address allows the computers to send and receive information.
An IP address is a string of numbers separated by periods
Example 192.158. 1.38
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
WAN - Wide Area Network
WAN, occupies a very large area, such as an entire country or the entire world
A WAN can contain multiple smaller networks, such as LANs or MANs. The Internet is the
best-known example of a public WAN.
40. Explain the cables and different types of cables used in transmission
Twisted Pair Cable
A twisted pair cable is made of two plastic insulated copper wires twisted together to form of
Helix.
It reduces electrical interference between adjacent pairs of wires
Thicknet (10Base5) :
Coaxial cable is thicker than thinnet .
Having a maximum segment length of 500m
4.Fiber Optics
Optical fiber typically includes a transparent glass core surrounded by a transparent
cladding material with a lower index of refraction.
It carries light from source at one end of the fiber to a detector at the other end
The light source may Light Emitting Diodes (LED) , Laser Diodes
The data to be transmitted is modulated using frequency modulation technique
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
Using LED, the bandwidth is 20 to 150 Mbps
Advantages
1) Immunity to Electromagnetic Interference
2) It is suited for harsh industrial environment
3) High Bandwidth over Long Distances
Disadvantages
1) Cables are expensive to install
2) Optical fibre requires repeating at distance intervals.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
The Physical Layer
It concerned with transmitting raw bits over a communication channel.
It is responsible for the actual physical connection between the devices.
Converting bits into electrical signal
Data Link Layer
It is responsible for moving frames from source address to destination address
It divides the data from N/W layer into frames
It provides the mechanism of error control, flow control
Network Layer
This layer is responsible how packets are routed from source to destination.
The main function is to determine how packets are routed from source to destination.
Responsible for data delivery, routing, control congestion
Transport Layer
This layer is responsible for end-to-end delivery between hosts by ensuring all packets are
arrived correctly.
The basic function of transport layer is to accept data from above layer and split it up into
smaller units called datagrams if needed, and pass these to the network layer and ensure
that the pieces all arrive correctly at the other end.
It is responsible for source process to destination process delivery of entire message
Session Layer
Establishment, maintaining and ending a session between two nodes.
It enters into Dialog Control
Presentation Layer
This layer is concerned with the syntax and semantics of the information exchanged
between two systems.
Converts abstract representation to network standard representation
Application Layer
Contains a variety of protocols that are commonly needed by the user. For example, HTTP
(Hyper Text Transfer Protocol) which is the bases for the World Wide Web (WWW) to access
web pages.
Provides User interfaces and support for Services, like e-mail, file transfer, message
handling.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
TCP/IP
TCP/IP model
Application Layer –
It is responsible for node-to-node communication and controls user-interface specifications.
This layer contains many protocols. Some of the protocols present in this layer are: HTTP,
HTTPS, FTP, Telnet, SSH, SMTP, SNMP, NTP, DNS, DHCP, NFS
Transport layer
This layer is analogous to the transport layer of the OSI model.
It is responsible for end-to-end communication and error-free delivery of data.
Source and destination enter into conversation
The two main protocols present in this layer are :
1. Transmission Control Protocol (TCP) –
It is known to provide reliable connection-oriented protocol that allows byte on one
machine
to be delivered without error on any other machine in the internet.
It fragments the information into messages and passes to internet layer.
It also handles flow control.
2. User Datagram Protocol (UDP) –
It is the go-to protocol if your application does not require reliable transport.
Unreliable connectionless protocol.
Suited for prompt delivery compared to accurate delivery.
Internet Layer –
This layer parallels the functions of OSI’s Network layer.
It defines the protocols which are responsible for logical transmission of data over the entire
network. Holds whole architecture together.
The main protocols residing at this layer are:
IP – stands for Internet Protocol and it is responsible or job is to delivering packets from
the source host to the destination host by looking at the IP addresses in the packet headers.
IP has 2 versions: IPv4 and IPv6.
ICMP – stands for Internet Control Message Protocol. Send notification of datagram problem
back to sender.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
44. Explain various networking devices used?
1. Modem:
It allows you to connect to global with telephone system
• Modulator-Demodulator.
• It converts digital data from a computer or other device into an analog signal that can be
sent over standard telephone lines
Types
a. Internal modems: The modems that are fixed within the computer.
b. External modems: The modems that are connected externally to a computer as other
peripherals are connected.
2. Ethernet Card: Network interface (NIC) card that is installed in a computer so that it can be
connected to a network.
3. Hub: Used to connect several devices together in network
4. Switch: a device that filters and forwards packets between LAN segments.
5. Repeater: is a device which amplifies signal being transmitted. It is used in long network
lines, which exceed the maximum rated distance for a single run.
6. Bridge: it links two networks together
7. Router: A device that determine the optimal path along which network
8. Gateway: A node on a network that serves as an entrance to another network.
Or
A gateway is a device which connects two dissimilar networks.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
4. Efficiency of Bus network reduces, as the number of devices connected to it increases.
5. It is not suitable for networks with heavy traffic.
Ring Topology
All the nodes are connected to each-other in such a way that they make a closed loop.
Each workstation is connected to two other components on either side, and it
communicates with these two adjacent neighbours.
Data travels around the network, in one direction. Sending and receiving of data takes place
by the help of TOKEN.
Advantages
1) Short cable length
2) Each computer has equal access to resources.
3) Its performance is better than that of Bus topology.
Disadvantages
1) Each packet of data must pass through all the computers between source and
destination.
2) If one workstation or port goes down, the entire network gets affected.
Tree Topology
Tree Topology integrates the characteristics of Star and Bus Topology.
Transmission takes place in the same way as in the bus topology
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
Advantages
1) It is an extension of Star and bus Topologies
2) Expansion of Network is possible and easy.
3) Error detection and correction is easy.
4) If one segment is damaged, other segments are not affected
Disadvantages
1) relies heavily on the main bus cable
2) As more and more nodes added, the maintenance becomes difficult.
Mesh Topology
Computer and other devices, are interconnected with one another
Every node not only sends its own signals but also relays data from other nodes.
It provides an alternative root in case the host is either down or too busy
Node not only sends its own signals but also relays data from other nodes.
Advantages
1. It is excellent for long distance networking
2. Even if one of the nodes fails there is always an alternative path present.
3. It provides extensive backup, rerouting and pass-through capability
Disadvantages
1. Redundancy in many of the network connections.
2. Cost of this network is high
3. Administration of the network is tough.
Star Topology:
It consists of a central node such as a router, hub or switch to which all other nodes are
connected by single path
When the central node receives a packet from a connecting node, it can pass the packet on
to
other nodes in the network.
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
Advantages:
1. Ease of service
2. Failure of one node will not affect the entire network
Disadvantages:
1. Expensive
2. Requires additional equipment
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222
2. Use Licensed software
3. Protect your system with password
4. Use Antivirus software
5. Keep antivirus Up to date
6. Always scan files downloaded from the internet
_________________________________________________________________________________________________________________________________________________________________
No 197, Sairam krupa, Above SBI, opp to R.R. Nagar police station, Rajarajeshwarinagara, Bangaluru-560098.
www.vagdeviinstitute.com / [email protected] / +91 9845352222