Networking 6
Networking 6
By Amit Dutta
DAV Public School , Gandhi Nagar, Ranchi
Session 2020-21
Syllabus of UNIT II
Computer Network
• Unit II: Computer Networks
• ● Evolution of Networking: ARPANET, Internet, Interspace Different ways of sending data across the network
with reference to switching techniques (Circuit and Packet switching).
• ● Data Communication terminologies: Concept of Channel, Bandwidth (Hz, KHz, MHz) and Data transfer rate
(bps, Kbps, Mbps, Gbps, Tbps).
• ● Transmission media: Twisted pair cable, coaxial cable, optical fiber, infrared, radio link, microwave link and
satellite link.
• ● Network devices: Modem, RJ45 connector, Ethernet Card, Router, Switch, Gateway, WiFi card.
• ● Network Topologies and types: Bus, Star, Tree, PAN, LAN, WAN, MAN.
• ● Network Protocol: TCP/IP, File Transfer Protocol (FTP), PPP, HTTP, SMTP, POP3, Remote Login (Telnet)
and Internet, Wireless / Mobile Communication protocol such as GSM, GPRS and WLL.
• ● Mobile Telecommunication Technologies: 1G, 2G, 3G, 4G and 5G; Mobile processors; Electronic mail
protocols such as SMTP, POP3, Protocols for Chat and Video Conferencing: VoIP, Wireless technologies such
as Wi-Fi and WiMax 7
• ● Network Security Concepts: Threats and prevention from Viruses, Worms, Trojan horse, Spams Use of
Cookies, Protection using Firewall, https; India IT Act, Cyber Law, Cyber Crimes, IPR issues, hacking.
• ● Introduction To Web services: WWW, Hyper Text Markup Language (HTML), Extensible Markup Language
(XML); Hyper Text Transfer Protocol (HTTP); Domain Names; URL; Website, Web browser, Web Servers;
Web Hosting, Web Scripting – Client side (VB Script, Java Script, PHP) and Server side (ASP, JSP, PHP), Web
2.0 (for social networking)
• ● E-commerce payment transactions using online banking, mobile banking, payment apps and services.
Network Security Concepts
Network security is the process of physical
and software preventative measures to
protect the networking infrastructure
from unauthorized
access ,malfunction ,destruction ,misuse
,modification ,or improper
disclosure ,there by creating a secure
platform for computers ,users ,and
programs to perform their permitted
critical functions with in a secure
Network security threats types: