Class XII Computer Network-I
Class XII Computer Network-I
Computer Science
Grade XII
Computer Networks-I
Introduction
• Definition
• Components
• Types
• Network Topologies
• Network Device
• The Cloud
• Types:
workstations.
• Centralized control.
Modem server.
• Eg: Web browser is the client makes request to server sends the
website to the browser.
Difference between P2P and Client/Server
network
Types of Networks (Communication Channel)
• Wired Computer Networks: interconnected through wire or
cables.
• Most are LAN type.
• Commonly used cables:
transmissions.
Star Topology
• Commonly used architecture in Ethernet LANs.
• The star topology resembles spokes in a bicycle wheel.
• Consist of central node, all other nodes are connected by a
single path.
• Advantage: easy to install and wire.
No disruption to the network take place while connecting
Easy to detect faults and remove parts.
• Disadvantage: more cable length.
If hubs fails nodes attached are disabled.
More expensive.
Bus or Linear Topology
Commonly referred to as a linear bus, all the devices on a bus
topology are connected by one single cable.
• Advantages: easy to connect a computer to linear bus.
Less cable length.
• Disadvantages: entire network shut down
if there is a break in the main cable.
Terminators are required at both the
ends of the cable.
Difficult to identify the problem
Ring or Circular Topology
• Each node connect to two or only neighbouring nodes.
• Data token travels in one direction only.
• Advantages: not affected by high traffic.
Cheaper
• Disadvantages: troubleshooting is difficult.
Adding or deleting of computer disturbs the network
Failure of one computer disturbs the whole network.
Mesh Topology
• The mesh topology connects all devices (nodes) to each other for redundancy and
consuming.
• easier installation
• Maintenance
• Stable signals
• Ease of work.
Facts:
Wireless routers can function as access points, but not
all access points can work as routers.
The Cloud
Collection of servers. Cloud Internet
arise.
• Wearable.
• Vehicles.
• Factories.
• Agriculture.
• Food
Challenges and Risks
• Security of IoT
• Unauthorized access