+1 Class Notes Pages 2
+1 Class Notes Pages 2
Computer networks
Computer network is a group of computers and other computing hardware devices connected to each other electronically
through a communication medium
1. Resource Sharing : The sharing of available hardware and software resources in a computer network is called
resource sharing. Eg: Sharing of DVD Player, Printer, Scanner ,Softwares etc.
2. Price- Performance ratio:The cost of resources can be reduced by purchasing the network versions , which can
guarantee the same performance.
3. Communication :Computer network helps to communicate with each other instantly through its services like e-
mail,chat ,video conference etc.
4. Reliability :Computer Network can store the same data in multiple computers within the network. The data lost
from one computer can be retrieved from other computers within the network.
5. Scalability : The computing capacity and storage capacity can be increased or decreased by adding or removing
devices to the system.
Terms in Network
• Bandwidth :Bandwidth is the maximum data-transfer rate in a given amount of time between computers in a
network. Bandwidth is measured in bits per second (bps).
• Noise :The unwanted electrical or electromagnetic energy that lowers the quality of data signals are called Noise.
• Node :Any device connected to a network are called Node.
The exchange of digital data between any two devices through a medium is known as Data Communication .
• Message : It is the information to be communicated such as text, image, audio, video etc.
• Sender : The device that is used for sending message is called Sender or Source or Transmitter.
• Receiver : The computer or device that receives the messages is called the receiver.
• Medium : It is the physical path through which a message travels from the sender to the receiver.
• Protocol : it is the rules under which message transmission takes place between the sender and the receiver.
Communication medium
The medium for data transmission over a computer network is called communication channel or communication medium.
The communication medium are of two types:
Guided medium or wired medium uses physical wires or cables for data tramnsmission.The different types of cables used
for networking are:
Electromagnetic waves are used for wireless communication on computer networks. Based on their frequencies ,
electromagnetic waves are categorized into:
• Radio waves.
• Micro waves.
• Infrared Waves.
1. Radio waves.
• Radio waves have a frequency range of 3 KHz to 3 GHz.
• Radio waves can be used for short and long distance communication.
• These waves can penetrate solid objects.
• They are used in Cordless phones, AM and FM radio broadcast and mobile phones…
• Radio Waves can be transmitted in all directions.
• Relatively inexpensive than wired media.
• Transmission can be affected by motors or other electrical equipment(Not Secure).
• Legal permission is needed.
2. Micro waves
• Microwave have a frequency range of 300 MHz to 300 GHz.
• Microwaves travel in straight lines and cannot penetrate solid objects.
• Transmitting and receiving antennas need to be in a straight line.’
• Relatively inexpensive than wired media.
• Offers ease of communication over difficult terrain.
3. Infrared waves
• Infrared waves have a frequency range of 300 GHz to 400 THz.
• These waves are used for short range communication (approx. 5 m).
• Used in monitoring and control applications.
• A line of sight transmission is needed(Secure).
KALLADI HSS NOTES BY MUSTHAFA 9544885401
• Only two devices can communicate at a time.
• The waves cannot cross solid objects.
1. Bluetooth.
• Bluetooth technology uses radio waves in the frequency range of 2.402 GHz to 2.480 GHz.
• This technology is used for short range communication (approx. 10 m) .
• Used in Cell phones, laptops, mouse, keyboard, tablets, headsets, cameras, etc..
• Line of sight between communicating devices is not required.
• Bluetooth can connect upto eight devices simultaneously.
• Slow data transfer rate (upto 1 Mbps).
2. WiFi
• Wi-Fi network makes use of radio wave in the frequency range of 2.4 GHz to 5 GHz.
• The wireless adapter in a computer translates data into radio signal and transmits it using an antenna. A
wireless router receives the signal ,decodes it and send it.
• Wifi technology is widely used to share Internet connection.
• Line of sight between communicating devices is not required.
• Data transmission speed is upto 54 Mbps.
• Wi-Fi can connect more number of devices simultaneously.
• Used for communication upto 375 ft (114 m).
3. WiMAX
• Worldwide Interoperability for Microwave Access (Wi-MAX) has a frequency range of 2 GHz to 11 GHz.
• Wi-MAX can provide high-speed wireless Internet access over very long distances(45 km).
• Wi-MAX equipment exists in two basic forms - base stations, installed by service providers , and receivers,
installed by clients.
• Hundreds of users can connect to a single station.
• Provides higher speed connection upto 70 Mbps.
• Line of sight between communicating devices is not required.
• Weather conditions like rain, storm, etc. could interrupt the signal.
• Very high power consumption and high costs of installation.
4. Satellite Link
• Used for long distance wireless communication.
• Signal travels in a straight line and is not able to bend around the globe.
• Signals is sent to satellites and then redirected to another satellite or directly to a far away destination.
• Transmission of signals from the earth to a satellite is called uplink.
• Transmission of signals from satellite to the earth is called downlink.
• This system is expensive.
• Requires legal permission and authorization.
A data communication device provides an interface between computer and the communication channel. Data
Communication devices are NIC , Hub , Switch , Bridge , Router , Gateway ….
2. Hub
• A hub is a device used to connect several computers of the same network .
• It is a small, simple, passive and inexpensive device
• When NIC of one computer sends data packets to hub, the hub transmits the packet to all other computers
connected to it.
• The intended computer accept it and others will discard.
• It increases the network traffic and reduces the effective bandwidth.
3. Switch
• A switch is an intelligent device that can connects several computers.
• It looks exactly like a hub.
• Switches are capable of determining the destination and redirect the data only to the intended node.
• Switch performs this by storing the addresses of all the devices connected to it using a table.
4. Repeater
• Repeater is a device that receives incoming data signals, amplifies the signals to their original
strength and retransmits them to the destination.
5. Bridge
• A bridge is a device used to segmentize a network.
• An existing network can be split into different segments and can be interconnected using a bridge.
• This reduces the amount of traffic on a network.
• When a data packet reaches the bridge, Only those packets addressed to other side, will be allowed to pass
the bridge. Others will be discarded. The packet that passes the bridge will be broadcast to all nodes on the
other side.
6. Router
• A router is a device that can interconnect two networks of the same type using the same protocol
• It can find the optimal path for data packets to travel and reduce the amount of traffic on network.
• The router check the device address and the network address ,and use algorithms to find the best path for
packets to reach the destination.
7. Gateway
• A gateway is a device that can interconnect two different networks having different protocols.
• It can translate one protocol to another protocol.
• It is a network point that acts as an entrance to another network
A data terminal equipment (DTE) is a device that controls data flowing to and from a computer. Most commonly used DTEs
are Modem and Multiplexer.
1. Modem
• A modem is an electronic device used for communication between computers through telephone lines.
• It converts digital signals received from a computer to analog signals (modulation) for telephone lines.
• It also converts the analog signals received back from telephone lines to digital signals (demodulation).
• The speed of modem is measured in bits per second (bps).
2. Multiplexer/Demultiplexer
• Multiplexing is sending multiple signals on a physical medium at the same time in the form of a single signal and
then recovering the separate signals at the receiving end.
• Multiplexer is a device that combines (multiplexes) the inputs from different sources and sends them through
different channels of a medium.
• At the destination, a demultiplexer separates (demultiplexes) the signals.
Network Topologies
The way in which the nodes are physically interconnected to form a network is called a Topology. Major topologies are bus,
star, ring and mesh.
1. Bus topology
• In bus topology all the nodes are connected to a main cable called bus.
• If a node has to send data to another node, it sends data to the bus. The signal travels through the bus. All nodes
check the bus, and only the node for which data is addressed accepts it.
• A small device called terminator is attached at each end of the bus. When the signal reaches the end of the bus, the
terminator removes the signal.
• Easy to install.
• Requires less cable length
• It is cost effective.
• Failure of a node does not affect the network
• Failure of cable (bus) or terminator leads to a break down of the entire network.
• Fault diagnosis is difficult.
• Only one node can transmit data at a time.
2. Star Topology
• In star topology each node is directly connected to a hub/switch.
• If any node has to send some information to any other node, it sends the signal to the hub/switch. This signal is
then broadcasted (in case of a hub) to all the nodes but is accepted only by the intended node. In the case of a
switch, the signal is sent only to the intended node.
• More efficient compared to bus topology.
• Easy to install.
• Easy to diagnose faults.
• Easy to expand depend.
• Failure of hub/switch leads to failure of entire network.
KALLADI HSS NOTES BY MUSTHAFA 9544885401
• Requires more cable length compared to bus topology.
3. Ring topology
• In ring topology, all nodes are connected using a cable in the form of ring or circle. A ring topology has no start and
no end.
• Data travels only in one direction in ring.
• While they are passed from one node to the next, each node regenerates the signal.
• The node for which the signal is intended reads the signal. After travelling through each node, the signal reaches
back to the sending node from where it is removed.
• Requires less cable length and hence is cost effective.
• If one node fails, entire network will fail.
• Addition of nodes to the network is difficult.
4. Mesh topology
• In mesh topology, every node is connected to other nodes. So there will be more than one path between two
nodes .
• If one path fails, the data will take another path and reach the destination.
• Network will not fail even if one path between the nodes fails.
• Expensive because of the extra cables needed.
• Very complex and difficult to manage.
Types of networks
On the basis of the area covered, computer networks are classified as:
• PAN - Personal Area Network
• LAN - Local Area Network
• MAN - Metropolitan Area Network
• WAN -Wide Area Network
Client-Server
• The client-server architecture consists of high configured computer (called server) serving lower configuration
machines called clients. A server provides clients with specific services when client requests.
• Client-server architecture is an example for centralized software management. When software is loaded on
the server and shared among the clients, changes made to the software in the server will reflect in the clients
also.
Network protocols
A network protocol is the set of rules to be followed in a network when devices in the network exchange data with
each other. Some commonly used protocols are TCP/IP, SPx/IPx, BGP etc.
TCP/IP
• TCP/IP, Transmission Control Protocol/Internet Protocol, is a container of communications protocols used to
interconnect network devices on the local networks and the Internet.
• TCP/IP defines rules for how electronic devices should be connected to the Internet and how data should be
transmitted between them.
Working of TCP/IP:
Step 1: TCP at the sender breaks the data into packets along with the address of the receipient and send the data.
Step 2: Routers Transport and route the data to their destination according to IP.
Step 3: TCP at the receiver’s side reassembles the packets to form original data
HTTP
• HTTP stands for Hypertext Transfer Protocol. It is a standard protocol for transferring requests from client-side and
to receive responses from the server side.
• The HTTP client (browser) sends a HTTP request to the HTTP server (web server) and server responds with a HTTP
response. This pair of request and response is called an HTTP session
FTP
FTP ( File Transfer Protocol ) is a protocol for exchanging of data and program files across a network. FTP is the easiest
way to transfer files between computers via the Internet. FTP client softwares are Filezilla, Cute FTP,etc.
DNS
DNS stands for Domain Name System. DNS returns the IP address of the requested domain Name. DNS implements a
database to store domain names and IP address of all web sites on the Internet.
a) Protocol
It specifies what protocol is used to access the information specified in the domain.
b) Domain name
Domain name is the name assigned to a server through the Domain Name System (DNS). Domain names are used
in URLs to identify the particular web server.
A domain name usually has more than one part: Top level domain name or primary domain name and sub-
domain name(s).
There are only a limited number of top level domains and these are divided into two categories: Generic Domain
Names and Country-Specific
c) File name
It specifies the file to be opened. In the above example 'index.html' is the file that is to be accessed from the web
server specified by the domain name.
Previous Questions
1. Identify the name given to the physical arrangement of computers in a network? Explain two types with block
diagrams. (March 2015) Score 3
2. Write any two advantages of Network. (March 2015) Score 2
3. What are the advantages of Wi-Fi network? (March 2015) Score 2
4. In communication system the term source refers to …….. … (SAY 2016 June) Score 1
5. Explain the following terms in computer networking a). Node b). Bandwidth c). Noise (SAY 2016 June) Score 3
6. Match the following
A B
Unguided Media org
Generic Domain Name Coaxial cable
Guided Media microwave
Protocol http (March 2016) Score 2
7. Compare ring topology and mesh topology (March 2016) Score 3
8. "Client-server architecture is an example of centralized software management." Justify. (March 2016) Score 2
9. If all devices are connected to a central switch/hub, the topology is known as……..(SAY 2016 June) Score 1
10. List any four advantages of forming computer networks. (SAY 2016 June) Score 2
11. A device that regenarate the incomimg signal and retransmit them to their destination is called …….. (Imp 2015 )
12. Which of the following communication technology is the slowest a) Bluetooth b) Wi-Fi c) Wi Max d)Satelite Link
(Imp 2015 ) Score 1
KALLADI HSS NOTES BY MUSTHAFA 9544885401
13. Consider your teacher planning to connect the computers in the computer lab of your school to form a network. a).
He has a switch and a hub to connect these computers. Which will you prefer? Why? (Imp 2015 ) Score 2
b). Name the topology you will suggest for this network. Give reason for your suggestion. (Imp 2015 ) Score 3
14. Internet is an example of _____. a) MAN b) PAN c) WAN d) LAN (1) (July 2017)
15. Explain the advantages of forming networked computers than keeping them standalone computers. (3)
16. a) Different networks with different protocols are connected by a device called …………
(i) Router (ii) Bridge (iii) Switch (iv) Gateway (1) (March 2017) b) Define protocol. (1) (March 2017)
17. Compare any three types of networkbased on span of geographical area. (3) (March 2017)
18. Write notes on the following: a) IP address b) MAC address c) Modem (3) (Sept. 2016) 7. Define network topology.
Explain any four network topologies in detail. (3) (Sept. 2016)
19. Identify the type of LAN topology in which there are more than one path between nodes. (a) Star (b) Ring (c) Mesh
(d) Bus (1) (March 2016)
20. Any device which is directly connected to a network is generally known as _____. (1) (March 2015)
▪ ARPANET-(Advanced Research Project Agency Network.) was a Project by American Defence Department,
which is considered as the first Wide Area Network that used TCP/IP protocol for communication.
▪ ARPANET combined many other network to form a WAN, which becomes the Internet.
▪ TIM BERNERS LEE is considered as Founder of WWW , Founder of HTTP, founder of Web server and Web
browser technology and Founder of HTML.
Internet
Intranet
▪ Intranet is a private network within an organization , that uses TCP/IP protocol for communication.
Extranet
▪ The Intranet that is accessible to some computers that IS not part of a company’s private network is called
Extranet.
▪ Dial-Up Connectivity.
▪ Wired Broadband.
*ISDN * Cable Internet
* DSL * Leased Line * FTTH
▪ Wireless Broadband Connectivity
*Mobile Broadband *WiMax
*Satellite broadband.
➢ Dial-Up Connectivity
▪ Uses Telephone line and Dialup modem to dial and connect to the server at the ISP.
▪ Connecting time is high.
▪ Uses 56kbps DialUp Modem
▪ Slow connection, speed upto 56 kbps.
▪ At a time Data or voice call is possible.
➢ Wired Broadband Connectivity
▪ Always-on Connection.
▪ Uses Broadband Modem- allows to use telephone and Internet(call and data at the same time)
▪ High speed conncetion (256 kb -100 Mb)
▪ Popular broadband technologies are:
*ISDN
*Cable Internet
*DSL
*FTTH
*Leased Line
Dial-Up Connection Wired broadband Connection
• Slow connection, speed upto • High speed connection,speed higher
56kbps than 256kbps.
• Always on connection.
• Requires dialing to connect to ISP • Simultaneous use of voice and
• Use telephone line exclusively. Internet.
• Use dial up modem. • Used broadband modem.
Leased Line
• It provide dedicated lines to provide Internet to ISPs,large organizations etc.
• It can provide data transfer rate upto 100 mbps.
• It is very expensive
FTTH-Fibre To The Home.
• It Uses optical fibre cable for data transmission.
• Provides high speed internet connection.
• It needs a NTU-Network Termination Unit which is to be connected to FTTH Modem that is
connected to the Computer.
• It can provide high speed internection to homes/institutions/organizations etc..
Wi-Max
• WiMax can provide internet connectivity to a distance around 50 Kms with a speed upto
70Mbps.
• Connectivity is provided using the devices like WiMax handsets,USB dongles etc.. that have
WiMAX modem.
▪ Using LAN
Internet connected to a computer in Local Area Network(LAN) can be shared among other computers in
the network .This can be done using Proxy server or Router.
Provide Internet connectivity through a wifi router or a network access point called hotspot.Wifi is a short
distance data transmission technology .
It uses visible light for data transmission.The main component is a LED that can transmit data and a photo
diode as the receiver. A data rate of 100mbps is possible Using LiFi technique.
▪ WWW is a system of interlinked hypertext documents that can be accessed via Internet.
▪ It is a Client-Server System where Server contains a collection of documents which can be accessed using
URL.
→Web Browser
• It is a Software used to Retrieve/ Present Information to and from web pages in the www.
• It can display images ,videos,audios, hyperlinks etc.
KALLADI HSS NOTES BY MUSTHAFA 9544885401
• It allows user to navigate through web pages of www.
• Eg: Mozilla Firefox ,Google Chrome ,Opera ,Safari ,Internet Explorer….
→Web Browsing
Traversing through the web pages of World wide web is called Web Browsing.
▪ Step 2 :DNS server returns the IP corresponding to the requested Domain name.
▪ Step 4:Browser connects to the server and request a web page (HTTP Request)
▪ Step 6: Web server returns the requested web page in HTML format.
▪ Step 7:Browser Format and displays the web page to the user.
1. Search Engines
▪ A web search engine is a software system that is designed to search for information on the World Wide
Web.
▪ They search web pages for the given keyword and return a list of URL of web pages matching the keyword.
▪ Web Crawlers or Spiders are Programs search web pages and find possible keywords.
▪ Working
1. Web crawler contineosly searches through the web and collect possible keywords to build a search
index.
2. When user searches a keyword, Search engine searches in the Search index are returs the list of URLs
that contains the keyword.
▪ E-mail is the exchange of digital message between computers over the Internet.
▪ We can also include images ,videos , audio, documents etc in our mail along with texts.
Sections of an e-mail
Working of e-Mail
1. Sender composes the message using email client and Uploads to the SMTP server.
2. Message travels through the internet.
3. Recipients email client checks for new messages and download new message.
4. Message is placed at the recipient’s inbox.
5. Recipient opens and reads the message using email client.
Advantages of email
DisAdvantages of e-mail
4. Social Media
Social media refers to the use of mobiles and web based technologies through which individuals can
create,share ,discuss and modify contents.
1. Internet Forums
An Internet forum is an online discussion web site where people can engage in conversations in the form of
posted messages
Eg for internet forums : Ubuntu forum , Mi Forum etc.
2. Social blogs
A blog (web log) is a discussion or informational website consisting of entries or posts displayed in the
reverse chronological order.
Eg: Blogger.com ,Wordpress.com .
3. Microblogs
Microblogs allow users to exchange short sentences, images or video links. People use microblogs to share
what they observe in their surroundings.
Eg: Twitter.com
4. Wikis
Wikis allow people to add content or edit existing information in a web page, to form a community
document.
Eg : wikipedia.org
5. Social networks
Social networking sites allow people to build personal web pages and then connect with friends to
communicate and share content. We can share text, pictures, videos, etc. and comment to the posts.
Eg : Facebook.com , LinkedIn , Instagram
6. Content communities
Content communities are websites that organise and share contents like photos,videos, etc.
Eg : Youtube.com ,Flickr.com
1. Intrusion to privacy:
2. Addiction
3. Spread rumours
Cyber Security
Cyber security refers to the security of computer systems and computer networks against cyber attacks.
Cyber Attacks
1. Computer virus
• A computer virus is a program that attaches itself to another program or file.
• Virus can spread from one computer to another without our knowledge and interferes the normal
operation of a computer.
• A virus might corrupt or delete data on our computer, replicate itself and spread to other computers.
2. Worm
• A computer worm is a stand alone malicious software that can replicate itself and spread to other
computers.
• Worms can spread from one computer to canother on its own.
• A worm can send a copy of itself to every address in an e-mail address book.
• Worms mainly do attack on Networks.
3. Trojan horse
• A Trojan horse is a program that appear to be a useful software and do damage once run on the
computer.
• Trojans cannot reproduce by itself.
• When a Trojan is activated on a computer, they can cause serious damage to our computer system.
4. Spam
6. Phishing
• Phishing is an attempt to acquire information such as usernames, passwords and credit card details
by posing as the original website.
• Phishing websites have URLs and home pages similar to their original ones.
• The act of creating such a misleading website is called spoofing
7. A Denial of Service(DoS)
• It is an attack on web server whose intension is to deny the service Provided by the Server to the
users.
• The attackers’ goal is to shut down the target server rather than stealing data.
• DoS and DDoS.
• The Hacked computers that are used for DoS attack are called Zoombies.
8. Man-in-the-Middle attacks
• It refers to the attack in which Attacker capture and modifies the transmitting messages between
the sender and receiver.
• To prevent this type of attack use encrypted connections such as HTTPS , SFTP etc..
Firewall
▪ Antivirus tools are the programs that are used to detect and remove malware programs.(Virus , Worm ,
Trojan).
▪ Anti-virus software scans files in the computer system for known viruses and removes them if found.
▪ Quarantine is a special area for storing files probably infected with viruses.(Sandboxing).
Cookies
▪ Cookies are small text files that are created within the browser when we visit a website.
▪ Cookies keep track of our movements within the website – remembers our user name, preferences, e-
mail address, etc.
▪ Websites use cookies mainly because they save time and make browsing efficient.
Internet of Things
▪ It includes automatic Call to Super Market when need some things , Call a Doctor when needs etc...
Mobile Computing
KALLADI HSS NOTES BY MUSTHAFA 9544885401
▪ Mobile computing is a technology that has computing capability and can transmit/receive data from
where ever they are.
▪ It Requires
3. Connectivity to Internet.
Mobile Communication
▪ Mobile communication devices does not require any physical connection for communication.
▪ 2G Networks Follow Digital system for communication and improved audio quality in transmission.
▪ Uses Narrowband TDMA(Time Division Multiple Acces), provides simultaneous call on same radio
frequency.
▪ Expanded with improved performance with data communication using GPRS(General Packet Radio Service)
and EDGE(Enhanced Data Rate for GSM Evolution ).
▪ 4G is also called L.T.E(Long Term Evolution ),Provides ultra broadband internet to mobiles.
▪ 4G Offers high speed internet and high quality video streaming applications
▪ Smart Cards
• A mobile operating System is the Operating system used in mobile devices such as smart phones , tablets
etc.
• A mobile Operating System manages the hardware , multimedia functions ,Internet connectivity etc in a
mobile device.
Eg:-
• Android From Google
• iOS From Apple
• BlackBerry OS from BlackBerry
• Windows Phone from Microsoft
▪ Android is a Linux based Operating system designed for touch screen mobile devices.
▪ Android was developed by Andy Rubin and later Google acquired Android.
▪ User interface of Android is based on touch inputs like swiping, tapping ,pinching etc.
▪ Android allows users to customize their home screen with shortcuts to applications and widgets.
Android Versions
KALLADI HSS NOTES BY MUSTHAFA 9544885401
Version Name Version Name
1.5 Cupcake 4.4 Kitkat
1.6 Donut 5.0 Lollipop
2.0 Éclair 6.0 Marshmallow
2.2 Froyo 7.0 Nougat
2.3 Gingerbread 8.0 Oreo
3.0 Honeycomb 9 Pie
4.0 Ice cream Sandwitch 10 Android 10
4.1 Jelly Bean 11,12,13,14…..