0% found this document useful (0 votes)
9 views25 pages

+1 Class Notes Pages 2

Chapter 11 discusses computer networks, highlighting their advantages such as resource sharing, communication, and reliability. It covers data communication systems, types of communication media (guided and unguided), and various data communication devices like NICs and routers. Additionally, it explains network topologies and classifies networks based on their coverage area, including PAN, LAN, MAN, and WAN.

Uploaded by

aswinpramod082
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
9 views25 pages

+1 Class Notes Pages 2

Chapter 11 discusses computer networks, highlighting their advantages such as resource sharing, communication, and reliability. It covers data communication systems, types of communication media (guided and unguided), and various data communication devices like NICs and routers. Additionally, it explains network topologies and classifies networks based on their coverage area, including PAN, LAN, MAN, and WAN.

Uploaded by

aswinpramod082
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

Chapter 11

Computer networks
Computer network is a group of computers and other computing hardware devices connected to each other electronically
through a communication medium

Need for Network/Characteristics of Network/Advantages of Network

The advantages of computer Network are:

1. Resource Sharing : The sharing of available hardware and software resources in a computer network is called
resource sharing. Eg: Sharing of DVD Player, Printer, Scanner ,Softwares etc.
2. Price- Performance ratio:The cost of resources can be reduced by purchasing the network versions , which can
guarantee the same performance.
3. Communication :Computer network helps to communicate with each other instantly through its services like e-
mail,chat ,video conference etc.
4. Reliability :Computer Network can store the same data in multiple computers within the network. The data lost
from one computer can be retrieved from other computers within the network.
5. Scalability : The computing capacity and storage capacity can be increased or decreased by adding or removing
devices to the system.
Terms in Network

• Bandwidth :Bandwidth is the maximum data-transfer rate in a given amount of time between computers in a
network. Bandwidth is measured in bits per second (bps).
• Noise :The unwanted electrical or electromagnetic energy that lowers the quality of data signals are called Noise.
• Node :Any device connected to a network are called Node.

Data Communication system

The exchange of digital data between any two devices through a medium is known as Data Communication .

The 5 basic elements of a Communication system are :

• Message : It is the information to be communicated such as text, image, audio, video etc.
• Sender : The device that is used for sending message is called Sender or Source or Transmitter.
• Receiver : The computer or device that receives the messages is called the receiver.
• Medium : It is the physical path through which a message travels from the sender to the receiver.
• Protocol : it is the rules under which message transmission takes place between the sender and the receiver.

Communication medium

The medium for data transmission over a computer network is called communication channel or communication medium.
The communication medium are of two types:

KALLADI HSS NOTES BY MUSTHAFA 9544885401


• Guided medium (Wired)
• Unguided medium (Wireless)

Guided medium (Wired)

Guided medium or wired medium uses physical wires or cables for data tramnsmission.The different types of cables used
for networking are:

• Twisted Pair Cables (Ethernet cables).


• Coaxial Cables.
• Optical fibre cables(OFC).

❖ Twisted pair cable or Ethernet cable


• Most widely used media in small networks.
• It consist of 4 pair colour coded cables , which are covered by an outer shield.
• They are of two types:
 Unshielde Twisted pair cables (UTP).
 Shielded Twisted Pair cables (STP).
 Unshielded Twisted pair cables
In UTP the individual pair cables are not shielded
Characteristics of UTP cable
• Low cost cable available for setting up small networks.
• Thin and flexible cable.
• Ease of installation.
• Carries data upto a length of 100 m at a stretch.
 Shilded Twisted Pair cables (STP)
In STP, each pair cables are shielded individually. An outer shield then covers all the pair of cables.
Characteristics of STP cable:
• Immunity against noise.
• It is more expensive than UTP.
• STP cable is difficult to install.
✓ An RJ-45 connecter is used to connect UTP/STP twisted pair cable to a computer.
❖ Coaxial cable
A coaxial cable consists of an inner conductor surrounded by a tubular insulating layer which is further covered by a
tubular conducting shield. It has an outer insulation to protect the cable too.

Characteristics of coaxial cable


• Carries data to longer distances.
• High bandwidth.
• Less electromagnetic interference.
• Thicker than twisted pair.
• Less flexible than twisted pair.
• Difficult to install than twisted pair cable.
KALLADI HSS NOTES BY MUSTHAFA 9544885401
❖ Optical fibre cable
Optical fibres cable uses long thin glass fibres to transmitt data as light signals.Data travels as fast as light and can
be transmitted tolong distances.

Optical fibre has the following parts:


• Core - the thin glass rod at the centre through which the light travels.
• Cladding - the outer optical material surrounding the core that reflects the light back into the core.
• Coating - the plastic coating that protects the cable from damage and moisture.

Characteristics of optical fibre cable


• High bandwidth.
• Carries data over a very long distance.
• High immunity against noise.
• The most expensive and the most efficient communication media.
• Installation and maintenance are difficult and complex.

Unguided medium (Wireless)

Electromagnetic waves are used for wireless communication on computer networks. Based on their frequencies ,
electromagnetic waves are categorized into:
• Radio waves.
• Micro waves.
• Infrared Waves.
1. Radio waves.
• Radio waves have a frequency range of 3 KHz to 3 GHz.
• Radio waves can be used for short and long distance communication.
• These waves can penetrate solid objects.
• They are used in Cordless phones, AM and FM radio broadcast and mobile phones…
• Radio Waves can be transmitted in all directions.
• Relatively inexpensive than wired media.
• Transmission can be affected by motors or other electrical equipment(Not Secure).
• Legal permission is needed.

2. Micro waves
• Microwave have a frequency range of 300 MHz to 300 GHz.
• Microwaves travel in straight lines and cannot penetrate solid objects.
• Transmitting and receiving antennas need to be in a straight line.’
• Relatively inexpensive than wired media.
• Offers ease of communication over difficult terrain.

3. Infrared waves
• Infrared waves have a frequency range of 300 GHz to 400 THz.
• These waves are used for short range communication (approx. 5 m).
• Used in monitoring and control applications.
• A line of sight transmission is needed(Secure).
KALLADI HSS NOTES BY MUSTHAFA 9544885401
• Only two devices can communicate at a time.
• The waves cannot cross solid objects.

Wireless communication technologies using radio waves


The wireless technologies using radio waves are
• Bluetooth.
• WiFi
• WiMAX
• Satellite link.

1. Bluetooth.

• Bluetooth technology uses radio waves in the frequency range of 2.402 GHz to 2.480 GHz.
• This technology is used for short range communication (approx. 10 m) .
• Used in Cell phones, laptops, mouse, keyboard, tablets, headsets, cameras, etc..
• Line of sight between communicating devices is not required.
• Bluetooth can connect upto eight devices simultaneously.
• Slow data transfer rate (upto 1 Mbps).

2. WiFi
• Wi-Fi network makes use of radio wave in the frequency range of 2.4 GHz to 5 GHz.
• The wireless adapter in a computer translates data into radio signal and transmits it using an antenna. A
wireless router receives the signal ,decodes it and send it.
• Wifi technology is widely used to share Internet connection.
• Line of sight between communicating devices is not required.
• Data transmission speed is upto 54 Mbps.
• Wi-Fi can connect more number of devices simultaneously.
• Used for communication upto 375 ft (114 m).

3. WiMAX
• Worldwide Interoperability for Microwave Access (Wi-MAX) has a frequency range of 2 GHz to 11 GHz.
• Wi-MAX can provide high-speed wireless Internet access over very long distances(45 km).
• Wi-MAX equipment exists in two basic forms - base stations, installed by service providers , and receivers,
installed by clients.
• Hundreds of users can connect to a single station.
• Provides higher speed connection upto 70 Mbps.
• Line of sight between communicating devices is not required.
• Weather conditions like rain, storm, etc. could interrupt the signal.
• Very high power consumption and high costs of installation.

4. Satellite Link
• Used for long distance wireless communication.
• Signal travels in a straight line and is not able to bend around the globe.
• Signals is sent to satellites and then redirected to another satellite or directly to a far away destination.
• Transmission of signals from the earth to a satellite is called uplink.
• Transmission of signals from satellite to the earth is called downlink.
• This system is expensive.
• Requires legal permission and authorization.

KALLADI HSS NOTES BY MUSTHAFA 9544885401


Data communication devices

A data communication device provides an interface between computer and the communication channel. Data
Communication devices are NIC , Hub , Switch , Bridge , Router , Gateway ….

1. Network Interface Card (NIC)


• Network Interface Card (NIC) provides hardware interface between a computer and a network.
• NIC can prepare, send, receive and control data on the network.
• It breaks up data into manageable units, translates protocols etc.
• NIC are of two types - NIC card and wireless NIC card.

2. Hub
• A hub is a device used to connect several computers of the same network .
• It is a small, simple, passive and inexpensive device
• When NIC of one computer sends data packets to hub, the hub transmits the packet to all other computers
connected to it.
• The intended computer accept it and others will discard.
• It increases the network traffic and reduces the effective bandwidth.

3. Switch
• A switch is an intelligent device that can connects several computers.
• It looks exactly like a hub.
• Switches are capable of determining the destination and redirect the data only to the intended node.
• Switch performs this by storing the addresses of all the devices connected to it using a table.

4. Repeater
• Repeater is a device that receives incoming data signals, amplifies the signals to their original
strength and retransmits them to the destination.

5. Bridge
• A bridge is a device used to segmentize a network.
• An existing network can be split into different segments and can be interconnected using a bridge.
• This reduces the amount of traffic on a network.
• When a data packet reaches the bridge, Only those packets addressed to other side, will be allowed to pass
the bridge. Others will be discarded. The packet that passes the bridge will be broadcast to all nodes on the
other side.

6. Router
• A router is a device that can interconnect two networks of the same type using the same protocol
• It can find the optimal path for data packets to travel and reduce the amount of traffic on network.
• The router check the device address and the network address ,and use algorithms to find the best path for
packets to reach the destination.

7. Gateway
• A gateway is a device that can interconnect two different networks having different protocols.
• It can translate one protocol to another protocol.
• It is a network point that acts as an entrance to another network

KALLADI HSS NOTES BY MUSTHAFA 9544885401


Data terminal equipments

A data terminal equipment (DTE) is a device that controls data flowing to and from a computer. Most commonly used DTEs
are Modem and Multiplexer.

1. Modem
• A modem is an electronic device used for communication between computers through telephone lines.
• It converts digital signals received from a computer to analog signals (modulation) for telephone lines.
• It also converts the analog signals received back from telephone lines to digital signals (demodulation).
• The speed of modem is measured in bits per second (bps).

2. Multiplexer/Demultiplexer
• Multiplexing is sending multiple signals on a physical medium at the same time in the form of a single signal and
then recovering the separate signals at the receiving end.
• Multiplexer is a device that combines (multiplexes) the inputs from different sources and sends them through
different channels of a medium.
• At the destination, a demultiplexer separates (demultiplexes) the signals.

Network Topologies

The way in which the nodes are physically interconnected to form a network is called a Topology. Major topologies are bus,
star, ring and mesh.

1. Bus topology
• In bus topology all the nodes are connected to a main cable called bus.
• If a node has to send data to another node, it sends data to the bus. The signal travels through the bus. All nodes
check the bus, and only the node for which data is addressed accepts it.
• A small device called terminator is attached at each end of the bus. When the signal reaches the end of the bus, the
terminator removes the signal.
• Easy to install.
• Requires less cable length
• It is cost effective.
• Failure of a node does not affect the network
• Failure of cable (bus) or terminator leads to a break down of the entire network.
• Fault diagnosis is difficult.
• Only one node can transmit data at a time.

2. Star Topology
• In star topology each node is directly connected to a hub/switch.
• If any node has to send some information to any other node, it sends the signal to the hub/switch. This signal is
then broadcasted (in case of a hub) to all the nodes but is accepted only by the intended node. In the case of a
switch, the signal is sent only to the intended node.
• More efficient compared to bus topology.
• Easy to install.
• Easy to diagnose faults.
• Easy to expand depend.
• Failure of hub/switch leads to failure of entire network.
KALLADI HSS NOTES BY MUSTHAFA 9544885401
• Requires more cable length compared to bus topology.

3. Ring topology
• In ring topology, all nodes are connected using a cable in the form of ring or circle. A ring topology has no start and
no end.
• Data travels only in one direction in ring.
• While they are passed from one node to the next, each node regenerates the signal.
• The node for which the signal is intended reads the signal. After travelling through each node, the signal reaches
back to the sending node from where it is removed.
• Requires less cable length and hence is cost effective.
• If one node fails, entire network will fail.
• Addition of nodes to the network is difficult.

4. Mesh topology
• In mesh topology, every node is connected to other nodes. So there will be more than one path between two
nodes .
• If one path fails, the data will take another path and reach the destination.
• Network will not fail even if one path between the nodes fails.
• Expensive because of the extra cables needed.
• Very complex and difficult to manage.

Types of networks
On the basis of the area covered, computer networks are classified as:
• PAN - Personal Area Network
• LAN - Local Area Network
• MAN - Metropolitan Area Network
• WAN -Wide Area Network

Personal Area Network (PAN)


• PAN is a network of communicating devices in the proximity of an individual. It can cover an area of a radius with
few meters.
Local Area Network (LAN)
• LAN is a network of computing and communicating devices in a room, building, or campus. It can cover an area of
radius with a few meters to a few Kilometers. A networked office building, school lab etc are example for LAN.
• LAN can be set up using wired media or wireless media . If a LAN is setup using unguided media, it is known as
WLAN (Wireless LAN).
KALLADI HSS NOTES BY MUSTHAFA 9544885401
Metropolitan Area Network (MAN)
• MAN is a network of computing and communicating devices within a city. It can cover an area of a few Kilometers
to a few hundred Kilometers radius. All types of communication media (guided and unguided) are used to set up a
MAN
Wide Area Network (WAN)
• WAN is a network of computing and communicating devices crossing the limits of a city, country or continent. It can
cover an area of over hundreds of Kilometers in radius.
• WAN usually contain a number of interconnected individual computers, LANs, MANs and maybe other WANs.
• Largest WAN is the Internet.
• A network of ATMs is another example.

Logical classification of networks


This classification is based on the role of computers in the network network are classified into :
• peer-to-peer
• client-server.
Peer-to-Peer
• A peer-to-peer network has no dedicated servers.Any computer can act as a client or as a server at any time.
This network is ideal for small networks.

Client-Server
• The client-server architecture consists of high configured computer (called server) serving lower configuration
machines called clients. A server provides clients with specific services when client requests.
• Client-server architecture is an example for centralized software management. When software is loaded on
the server and shared among the clients, changes made to the software in the server will reflect in the clients
also.

Classifications for servers are


a) File server - A computer that stores and manages files on a network.
b) Web server - A computer dedicated to responding to requests for web pages.
c) Print server - Redirects print jobs from clients to specific printers.
d) Database server - Allows clients to view, modify and delete data in a database.

Identification of computers over a network


MAC Address and IP address are used to identify computers on a network.

Media Access Control (MAC) address


• A Media Access Control (MAC) address is a universally unique 12 digit hexadecimal address assigned to each NIC
(Network Interface Card) by its manufacturer.
• MAC address of an NIC is permanent and never changes. MAC addresses are 12-digit hexadecimal (or 48 bit
binary) numbers.
• MAC addresses are usually written in one of the following two formats:
MM : MM : MM : SS : SS : SS or MM – MM – MM – SS – SS – SS
• The first half (MM:MM:MM) of a MAC address contains the ID number of manufacturer. The second half
(SS:SS:SS) represents the serial number assigned to the NIC.

Internet Protocol (IP) address


• An IP address is a unique 4 part numeric address assigned to each node on a network.
• IP address is assigned to each machine by the network administrator or the Internet Service Provider.
• An IP address is a group of four bytes (or 32 bits) each of which can be a number from 0 to 255. IP addresses are
normally expressed in decimal format .

KALLADI HSS NOTES BY MUSTHAFA 9544885401


• There are two versions of IP addresses: version 4 (IPv4) and version 6 (IPv6). IPv4 uses 32 bits and IPv6 uses 128
bits for an IP address.

Network protocols
A network protocol is the set of rules to be followed in a network when devices in the network exchange data with
each other. Some commonly used protocols are TCP/IP, SPx/IPx, BGP etc.

TCP/IP
• TCP/IP, Transmission Control Protocol/Internet Protocol, is a container of communications protocols used to
interconnect network devices on the local networks and the Internet.
• TCP/IP defines rules for how electronic devices should be connected to the Internet and how data should be
transmitted between them.

Working of TCP/IP:
Step 1: TCP at the sender breaks the data into packets along with the address of the receipient and send the data.
Step 2: Routers Transport and route the data to their destination according to IP.
Step 3: TCP at the receiver’s side reassembles the packets to form original data

HTTP
• HTTP stands for Hypertext Transfer Protocol. It is a standard protocol for transferring requests from client-side and
to receive responses from the server side.
• The HTTP client (browser) sends a HTTP request to the HTTP server (web server) and server responds with a HTTP
response. This pair of request and response is called an HTTP session

The two important characteristics of HTTP are


1. HTTP is transmission medium independent.
2. HTTP is stateless (The server and client are aware of each other only during a request or response. Afterwards, each
forgets the other).

FTP
FTP ( File Transfer Protocol ) is a protocol for exchanging of data and program files across a network. FTP is the easiest
way to transfer files between computers via the Internet. FTP client softwares are Filezilla, Cute FTP,etc.

DNS
DNS stands for Domain Name System. DNS returns the IP address of the requested domain Name. DNS implements a
database to store domain names and IP address of all web sites on the Internet.

Uniform Resource Locator (URL)


URL stands for Uniform Resource Locator. URL is a formatted text string to identify network resources on the Internet.
Every resource on the Internet has a unique URL. URL string can be divided into three parts.
a) Network protocol
KALLADI HSS NOTES BY MUSTHAFA 9544885401
b) Domain name
c) File name
For example the URL http://www.dhsekerala.gov.in/index.html .

a) Protocol
It specifies what protocol is used to access the information specified in the domain.
b) Domain name
Domain name is the name assigned to a server through the Domain Name System (DNS). Domain names are used
in URLs to identify the particular web server.
A domain name usually has more than one part: Top level domain name or primary domain name and sub-
domain name(s).
There are only a limited number of top level domains and these are divided into two categories: Generic Domain
Names and Country-Specific

Generic Domain Names Country Specific Domain Names


.com Commercial business .in India
.edu Educational institutions .au Australia
.gov Government agencies .ca Canada
.mil Military .ch China
.net Network organizations .jp Japan
.org Organizations (nonprofit) .us United States of America

c) File name
It specifies the file to be opened. In the above example 'index.html' is the file that is to be accessed from the web
server specified by the domain name.

Previous Questions

1. Identify the name given to the physical arrangement of computers in a network? Explain two types with block
diagrams. (March 2015) Score 3
2. Write any two advantages of Network. (March 2015) Score 2
3. What are the advantages of Wi-Fi network? (March 2015) Score 2
4. In communication system the term source refers to …….. … (SAY 2016 June) Score 1
5. Explain the following terms in computer networking a). Node b). Bandwidth c). Noise (SAY 2016 June) Score 3
6. Match the following
A B
Unguided Media org
Generic Domain Name Coaxial cable
Guided Media microwave
Protocol http (March 2016) Score 2
7. Compare ring topology and mesh topology (March 2016) Score 3
8. "Client-server architecture is an example of centralized software management." Justify. (March 2016) Score 2
9. If all devices are connected to a central switch/hub, the topology is known as……..(SAY 2016 June) Score 1
10. List any four advantages of forming computer networks. (SAY 2016 June) Score 2
11. A device that regenarate the incomimg signal and retransmit them to their destination is called …….. (Imp 2015 )
12. Which of the following communication technology is the slowest a) Bluetooth b) Wi-Fi c) Wi Max d)Satelite Link
(Imp 2015 ) Score 1
KALLADI HSS NOTES BY MUSTHAFA 9544885401
13. Consider your teacher planning to connect the computers in the computer lab of your school to form a network. a).
He has a switch and a hub to connect these computers. Which will you prefer? Why? (Imp 2015 ) Score 2
b). Name the topology you will suggest for this network. Give reason for your suggestion. (Imp 2015 ) Score 3
14. Internet is an example of _____. a) MAN b) PAN c) WAN d) LAN (1) (July 2017)
15. Explain the advantages of forming networked computers than keeping them standalone computers. (3)

16. a) Different networks with different protocols are connected by a device called …………
(i) Router (ii) Bridge (iii) Switch (iv) Gateway (1) (March 2017) b) Define protocol. (1) (March 2017)
17. Compare any three types of networkbased on span of geographical area. (3) (March 2017)
18. Write notes on the following: a) IP address b) MAC address c) Modem (3) (Sept. 2016) 7. Define network topology.
Explain any four network topologies in detail. (3) (Sept. 2016)
19. Identify the type of LAN topology in which there are more than one path between nodes. (a) Star (b) Ring (c) Mesh
(d) Bus (1) (March 2016)
20. Any device which is directly connected to a network is generally known as _____. (1) (March 2015)

KALLADI HSS NOTES BY MUSTHAFA 9544885401


Chapter 12

INTERNET AND MOBILE COMPUTING


History of INTERNET

▪ ARPANET-(Advanced Research Project Agency Network.) was a Project by American Defence Department,
which is considered as the first Wide Area Network that used TCP/IP protocol for communication.

▪ MILNET-Network separated from ARPANET exclusively for military defence department.

▪ ARPANET combined many other network to form a WAN, which becomes the Internet.

▪ Vint Cerf is considered as the father of Internet.

▪ TIM BERNERS LEE is considered as Founder of WWW , Founder of HTTP, founder of Web server and Web
browser technology and Founder of HTML.

Internet

▪ Internet is the largest public network in the world.


▪ Internet is an Interconnected system of computer networks that serves the users of all over the world.

Intranet

▪ Intranet is a private network within an organization , that uses TCP/IP protocol for communication.

Extranet

▪ The Intranet that is accessible to some computers that IS not part of a company’s private network is called
Extranet.

Connecting Computer to Internet


To connect a Computer to Internet we need the following hardware and software.
* Computer with NIC Card.

* Operating system that supports TCP/IP.


* Modem.
* Telephone Connection.
* An Internet account given by ISP.
* Software like Browsers,Client Applications etc.

Data Transfer Rate


It is the Average number of bits transferred between devices in Unit time.It is Calculated in “bps”.

1 kbps = 1000 bits per second.

KALLADI HSS NOTES BY MUSTHAFA 9544885401


1 Mbps =1000 kbps
1 Gbps =1000 Mbps.

Types of Internet Connectivity


Internet connectivity is classified based on the speed of the connection and the technology used. They can be
broadly classified as dialup connectivity, wired broadband connectivity and wireless broadband connectivity.

▪ Dial-Up Connectivity.
▪ Wired Broadband.
*ISDN * Cable Internet
* DSL * Leased Line * FTTH
▪ Wireless Broadband Connectivity
*Mobile Broadband *WiMax
*Satellite broadband.
➢ Dial-Up Connectivity
▪ Uses Telephone line and Dialup modem to dial and connect to the server at the ISP.
▪ Connecting time is high.
▪ Uses 56kbps DialUp Modem
▪ Slow connection, speed upto 56 kbps.
▪ At a time Data or voice call is possible.
➢ Wired Broadband Connectivity
▪ Always-on Connection.
▪ Uses Broadband Modem- allows to use telephone and Internet(call and data at the same time)
▪ High speed conncetion (256 kb -100 Mb)
▪ Popular broadband technologies are:
*ISDN
*Cable Internet
*DSL
*FTTH
*Leased Line
Dial-Up Connection Wired broadband Connection
• Slow connection, speed upto • High speed connection,speed higher
56kbps than 256kbps.
• Always on connection.
• Requires dialing to connect to ISP • Simultaneous use of voice and
• Use telephone line exclusively. Internet.
• Use dial up modem. • Used broadband modem.

Integrated Service Digital Network (ISDN)


• Capable of transporting Voice and Data simultaneously.
• It Uses two lines- one for Data and One for Voice or both for data.
• Data transfer rate upto 2 mbps.

KALLADI HSS NOTES BY MUSTHAFA 9544885401


Cable Internet
• It provide Internet access through the coaxial cable laid for cable TV connection to our Homes.
• Requires Cable Modem.
• It provide data transfer rate between 1 mbps and 10 Mbps.

DSL- Digital Subscriber Line


• It provide Connection to Internet through Standard Telephone Lines .
• It Uses copper wire for data transmission.
• It is capable of transmitting Data and voice simultaneously.
• ADSL (Asymmetric DSL) is the most common from of DSL.
• It Require ADSL Modem.
• Provide data transfer rate between 256 kbps to 24 mbps

Leased Line
• It provide dedicated lines to provide Internet to ISPs,large organizations etc.
• It can provide data transfer rate upto 100 mbps.
• It is very expensive
FTTH-Fibre To The Home.
• It Uses optical fibre cable for data transmission.
• Provides high speed internet connection.
• It needs a NTU-Network Termination Unit which is to be connected to FTTH Modem that is
connected to the Computer.
• It can provide high speed internection to homes/institutions/organizations etc..

➢ Wireless Broadband Connectivity


• Capable of provide same speed as Wired broadband.
• Popular wireless Broadband are
* Mobile Broadband
* WiMax
* Satellite Broadband
Mobile Broadband
• It is the wireless internet accessing using mobile phones, tablets , USB wireless modem etc.. that
have inbuilt wireless modem.
• It allow the user to access internet from anywhere.

Wi-Max
• WiMax can provide internet connectivity to a distance around 50 Kms with a speed upto
70Mbps.
• Connectivity is provided using the devices like WiMax handsets,USB dongles etc.. that have
WiMAX modem.

KALLADI HSS NOTES BY MUSTHAFA 9544885401


Satellite Broadband
• It provide internet connectivity through Satellite.
• A VSAT antenna and Tranceiver is required at the users location.
• High speed and highly expensive.

Internet Access Sharing Methods


The internet access sharing methods are 1.Using LAN 2.Using WiFi network 3.Using Lifi.

▪ Using LAN

Internet connected to a computer in Local Area Network(LAN) can be shared among other computers in
the network .This can be done using Proxy server or Router.

▪ Using Wi-Fi network

Provide Internet connectivity through a wifi router or a network access point called hotspot.Wifi is a short
distance data transmission technology .

▪ Using Li-fi Network

It uses visible light for data transmission.The main component is a LED that can transmit data and a photo
diode as the receiver. A data rate of 100mbps is possible Using LiFi technique.

Services on the Internet


Different services on the internet are:

1. WWW-World Wide Web 2. E-mail 3.Search Engines 4.Social Media

1. WWW-World Wide Web

▪ WWW is a system of interlinked hypertext documents that can be accessed via Internet.

▪ It is a Client-Server System where Server contains a collection of documents which can be accessed using
URL.

▪ The Documents may contain Text, image, Video,Audio etc.

▪ Documents are created using HTML.

▪ Client Access the Documents using Browsers.

→Web Browser

• It is a Software used to Retrieve/ Present Information to and from web pages in the www.
• It can display images ,videos,audios, hyperlinks etc.
KALLADI HSS NOTES BY MUSTHAFA 9544885401
• It allows user to navigate through web pages of www.
• Eg: Mozilla Firefox ,Google Chrome ,Opera ,Safari ,Internet Explorer….

→Web Browsing

Traversing through the web pages of World wide web is called Web Browsing.

▪ Step 1 : Browser send the Domain name to the DNS server .

▪ Step 2 :DNS server returns the IP corresponding to the requested Domain name.

▪ Step 4:Browser connects to the server and request a web page (HTTP Request)

▪ Step 6: Web server returns the requested web page in HTML format.

▪ Step 7:Browser Format and displays the web page to the user.

1. Search Engines

▪ A web search engine is a software system that is designed to search for information on the World Wide
Web.

▪ They search web pages for the given keyword and return a list of URL of web pages matching the keyword.

▪ Web Crawlers or Spiders are Programs search web pages and find possible keywords.

▪ Working

1. Web crawler contineosly searches through the web and collect possible keywords to build a search
index.
2. When user searches a keyword, Search engine searches in the Search index are returs the list of URLs
that contains the keyword.

3. Electronic Mail or “e-mail”

▪ E-mail is the exchange of digital message between computers over the Internet.

▪ We can also include images ,videos , audio, documents etc in our mail along with texts.

▪ Founder of e-mail—Ray Tomilson

▪ Structure of an e-mail address is : [email protected] eg: [email protected]


KALLADI HSS NOTES BY MUSTHAFA 9544885401
▪ Username can be any available name that didn’t used yet,

▪ Domain name can be gmail.com, yahoo.com, reddiff.com,hotmail.com etc

Protocols used in e-mail

▪ POP- Post Office Protocol -Protocol used to receive e-mails(POP3 is used).

▪ IMAP-Internet Message Access Protocol -Protocol used to receive e-mails.

▪ SMTP-Simple Mail Transfer Protocol -e-mail transmission protocol across internet.

Sections of an e-mail

To - To specify the email address of the primary receipient.

Cc (carbon copy)- specifies the secondary recipient.

Bcc (Blind Carbon Copy)-specifies the email address of tertiary recipient.

Subject- To provide a Meaningful subject for your Conversation.

Content – The matter to be sent id typed here.

Attachment- Allows you to send image, audio,video,documents along with text.

Send/Compose -Button used to send the message.

Forward- To send the received message.

Reply –To give reply back to the received message.

Working of e-Mail

1. Sender composes the message using email client and Uploads to the SMTP server.
2. Message travels through the internet.
3. Recipients email client checks for new messages and download new message.
4. Message is placed at the recipient’s inbox.
5. Recipient opens and reads the message using email client.

Advantages of email

1. Speed -Instant Delivery of Messages.

2. Easy to Use -Send,Receive,Save,Organize messages

3. Provision for Attachment.

4. Environment friendly- No need of paper.

5. Easy to Reply using Reply button.


KALLADI HSS NOTES BY MUSTHAFA 9544885401
6. Cost Effective.

7. Available Anywhere Anytime

DisAdvantages of e-mail

▪ E-mail may carry viruses

▪ Junk mails-Deleting junk mail is time consuming

4. Social Media
Social media refers to the use of mobiles and web based technologies through which individuals can
create,share ,discuss and modify contents.

Classiification of Social media

1. Internet Forums
An Internet forum is an online discussion web site where people can engage in conversations in the form of
posted messages
Eg for internet forums : Ubuntu forum , Mi Forum etc.
2. Social blogs
A blog (web log) is a discussion or informational website consisting of entries or posts displayed in the
reverse chronological order.
Eg: Blogger.com ,Wordpress.com .

3. Microblogs
Microblogs allow users to exchange short sentences, images or video links. People use microblogs to share
what they observe in their surroundings.
Eg: Twitter.com
4. Wikis
Wikis allow people to add content or edit existing information in a web page, to form a community
document.
Eg : wikipedia.org
5. Social networks
Social networking sites allow people to build personal web pages and then connect with friends to
communicate and share content. We can share text, pictures, videos, etc. and comment to the posts.
Eg : Facebook.com , LinkedIn , Instagram
6. Content communities
Content communities are websites that organise and share contents like photos,videos, etc.
Eg : Youtube.com ,Flickr.com

Advantages of social media

KALLADI HSS NOTES BY MUSTHAFA 9544885401


1. Bring people together: Social networking allows people to find long-lost childhood friends and make new
ones.
2. Plan and organise events: These sites help users to organise and participate in events.
3. Business promotion
4. Social skills: These sites allow people to express their views over a particular issue.

Limitations in use of social media

1. Intrusion to privacy:
2. Addiction
3. Spread rumours

Social media interaction – Best practices


1. Avoid unnecessary uploading of personal data
2. Setting time schedule for using social medias
3. Set privacy level to private or friends.
4. Avoid posting content you may regret later.

Cyber Security
Cyber security refers to the security of computer systems and computer networks against cyber attacks.

Cyber Attacks

1. Computer virus
• A computer virus is a program that attaches itself to another program or file.
• Virus can spread from one computer to another without our knowledge and interferes the normal
operation of a computer.
• A virus might corrupt or delete data on our computer, replicate itself and spread to other computers.
2. Worm
• A computer worm is a stand alone malicious software that can replicate itself and spread to other
computers.
• Worms can spread from one computer to canother on its own.
• A worm can send a copy of itself to every address in an e-mail address book.
• Worms mainly do attack on Networks.
3. Trojan horse
• A Trojan horse is a program that appear to be a useful software and do damage once run on the
computer.
• Trojans cannot reproduce by itself.
• When a Trojan is activated on a computer, they can cause serious damage to our computer system.
4. Spam

KALLADI HSS NOTES BY MUSTHAFA 9544885401


• Spams or junk mails are unwanted e-mails sent contineously to persons to promote a product or
service.
• Spammers collect e-mail addresses from chat rooms, websites, customer lists,news groups, etc.
• Clicking on links in spams may send user details to websites that host certain viruses.
5. Hacking
• Hacking is a technical effort to manipulate the normal behavior of computer systems and computer
networks.
• Hacking is performed both by computer security experts and by computer criminals.
• Ethical hacking :Perform hacking to test the security and find the faults in computer networks and
computer system is refered to us Ethical hacking.
Types of Hackers
• The Computer experts who perform hacking to test the security of computer networks and
computer systems are Called White Hats.
• The Computer criminals who break the secure networks to destroy data or to make the network
unusable are called Black Hats.
• The Computer experts who access network illegally to identify its faults are refered to us Gray Hats.

6. Phishing
• Phishing is an attempt to acquire information such as usernames, passwords and credit card details
by posing as the original website.
• Phishing websites have URLs and home pages similar to their original ones.
• The act of creating such a misleading website is called spoofing
7. A Denial of Service(DoS)
• It is an attack on web server whose intension is to deny the service Provided by the Server to the
users.
• The attackers’ goal is to shut down the target server rather than stealing data.
• DoS and DDoS.
• The Hacked computers that are used for DoS attack are called Zoombies.
8. Man-in-the-Middle attacks
• It refers to the attack in which Attacker capture and modifies the transmitting messages between
the sender and receiver.
• To prevent this type of attack use encrypted connections such as HTTPS , SFTP etc..

Preventing network attacks

• Different Network attack defense and detection mechanisms are:


1. Firewall
2.Anti-Virus Software

Firewall

▪ A firewall is a system of computer hardware and software.

KALLADI HSS NOTES BY MUSTHAFA 9544885401


▪ A firewall controls the incoming and outgoing network traffic by analysing the data and determining
whether they should be allowed to enter or not.

Anti Virus Tools/Scanners

▪ Antivirus tools are the programs that are used to detect and remove malware programs.(Virus , Worm ,
Trojan).

▪ Anti-virus software scans files in the computer system for known viruses and removes them if found.

▪ Quarantine is a special area for storing files probably infected with viruses.(Sandboxing).

Cookies

▪ Cookies are small text files that are created within the browser when we visit a website.

▪ Cookies keep track of our movements within the website – remembers our user name, preferences, e-
mail address, etc.

▪ Browsers store cookies for an interval of time.

▪ Websites use cookies mainly because they save time and make browsing efficient.

Guidelines for using computers over Internet

▪ Open e-mails from trusted sender.

▪ Download files only from reputed sources.

▪ Avoid clicking on pop-up advertisements.

▪ Use USB drives with caution.

▪ Make sure the firewall is set and turned on.

▪ Use strong passwords.and Change it at regular intervals.

▪ Update AntiVirus programs periodically.

▪ Be careful about giving personal data online

▪ Make sure that bank web sites start with “https”

Internet of Things

▪ It refers to the Electronic Devises that reminds You.

▪ It includes automatic Call to Super Market when need some things , Call a Doctor when needs etc...

Mobile Computing
KALLADI HSS NOTES BY MUSTHAFA 9544885401
▪ Mobile computing is a technology that has computing capability and can transmit/receive data from
where ever they are.

▪ It Requires

1. Portable computing Devices like Laptops,Mobiles.

2. Wireless communication network.

3. Connectivity to Internet.

Mobile Communication

▪ Mobile communication devices does not require any physical connection for communication.

Generations in Mobile Communication

First Generation Networks-

▪ It was developed around 1980s.


▪ 1G mobile phones were based on analog system and provides voice facility only.

Second Generation Networks

▪ 2G Networks Follow Digital system for communication and improved audio quality in transmission.

▪ In 2G Networks ,Phone conversations are digitally encrypted.

▪ Supports both data and voice.

▪ Picture messages and MMS were introduced during this generation.

▪ Popular Standars in 2G are:

* GSM-Global system for Mobile

* Code division Multiple Access(CDMA).

GSM-Global system for Mobile

▪ Globally Accepted standard for digital commn.

▪ Uses Narrowband TDMA(Time Division Multiple Acces), provides simultaneous call on same radio
frequency.

▪ Network is identified using SIM(Subscriber Identity Module)

▪ Expanded with improved performance with data communication using GPRS(General Packet Radio Service)
and EDGE(Enhanced Data Rate for GSM Evolution ).

CDMA - Code Division Multiple Access

KALLADI HSS NOTES BY MUSTHAFA 9544885401


▪ Several transmitters can send information simultaneously over a single communication channel.

▪ It offers wider coverage and better quality even in low signal.

▪ CDMA Provide Better voice quality and security.

Third Generation Networks-3G

▪ 3G Networks Provides high data transfer rates.

▪ It oxcffers multimedia services combining voice and data.

▪ Access part in 3G network uses WCDMA(Wideband CDMA)

▪ It needs the mobile towers to be close to each other.

Fourth Generation Networks-4G

▪ 4G is also called L.T.E(Long Term Evolution ),Provides ultra broadband internet to mobiles.

▪ 4G Offers high speed internet and high quality video streaming applications

▪ The Access part uses OFDMA(Orthogonal Frequency Division Multiple Access).

Mobile Communication Services


Popular mobile communication technologies are:

▪ SMS – Short Message Service.

▪ MMS – Multimedia messaging Service.

▪ GPS- Global Positioning System.

▪ Smart Cards

1. Short Message Service(SMS)


• It is the Text messaging service in mobile communication.
• SMS can exchange only 160 characters per message.
• SMSC- Short Message Service Center Stores and Forward the message to the recipient..
• SMS messages are exchanged using SS7 protocol (Signalling System No.7)
2. MMS-Multimedia Messaging Service
• MMS is a standard way to exchange message that consist multimedia contents such as image
audio video etc...
• No limit on the multimedia message size.
• MMS Server is responsible for storing and handling incoming and outgoing messages

KALLADI HSS NOTES BY MUSTHAFA 9544885401


3. GPS –Global Positioning System
• Satellite based navigation system that is used to locate a geographical position anywhere on earth.
• The system behind GPS is a group of satellites that are continuously orbiting the earth.These
satellites transmit radio signals to GPS receivers.
4. Smart Card
• Smart card is a Plastic card embedded with a computer memory/chip that stores and transacts
information.The advantage of using smart cards are:
▪ Data is Secure
▪ Intelligent
▪ Easy to carry.
• Used in SIM,ATM cards,Health Cards, Identy cards etc.

Mobile Operating System

• A mobile operating System is the Operating system used in mobile devices such as smart phones , tablets
etc.
• A mobile Operating System manages the hardware , multimedia functions ,Internet connectivity etc in a
mobile device.
Eg:-
• Android From Google
• iOS From Apple
• BlackBerry OS from BlackBerry
• Windows Phone from Microsoft

Android Operating System.

▪ Android is a Linux based Operating system designed for touch screen mobile devices.
▪ Android was developed by Andy Rubin and later Google acquired Android.
▪ User interface of Android is based on touch inputs like swiping, tapping ,pinching etc.
▪ Android allows users to customize their home screen with shortcuts to applications and widgets.

Android Versions
KALLADI HSS NOTES BY MUSTHAFA 9544885401
Version Name Version Name
1.5 Cupcake 4.4 Kitkat
1.6 Donut 5.0 Lollipop
2.0 Éclair 6.0 Marshmallow
2.2 Froyo 7.0 Nougat
2.3 Gingerbread 8.0 Oreo
3.0 Honeycomb 9 Pie
4.0 Ice cream Sandwitch 10 Android 10
4.1 Jelly Bean 11,12,13,14…..

KALLADI HSS NOTES BY MUSTHAFA 9544885401

You might also like