network 2014 cbse class 12

Upload: tarun2697suri

Post on 02-Jun-2018

222 views

Category:

Documents


0 download

TRANSCRIPT

  • 8/10/2019 Network 2014 CBSE CLASS 12

    1/19

    Networking Concepts

    What is Network?

    A network is any collection of independent computers that communicates with one another over a sha

    network medium.When computers are joined in a network, people can share files and peripherals such as mode

    printers, backup drives or CD-ROM drives. Each computer on the network is called a node.Advantages for Networking

    . Resource sharin! "files and peripherals

    #. $mprovin! Communication

    %. &ccess to Remote Database

    Disadvantages of Networking. Threat to data' & computer network ma( be used b( unauthori)ed users to steal or corrupt the data and e

    to deplo( computer virus or worms on the network.

    #. Difficult to set up' *ettin! up a lar!e network ma( turn out to be a difficult task.

    Evaluation of Networking

    In 1!, the "epartment of "efense +DOD of nited *tates of &merica started a network called A#$AN

    &Advanced #esearch $ro'ects Administration Network. $t was started with one computer in California and t

    computers in tah. ater, the militar( allowed universities to join the network for sharin! the hardware and softwresources. /hen it !rew bi!!er and !ave birth to the present da( ver( popular $nternet.

    Internet

    $t is an interconnection between several computers of different t(pe belon!in! to various networks all over the wo

    Intranet

    $ntranet is an interconnected network within an or!ani)ation that uses web technolo!ies for the sharin! of informainternall(.

    Interspace

    $t is a client/server software programthat allows multiple users to communicate online with real time audio, v

    and te0t chat in d(namic %D environment. $t provides the most advanced form of communication available in

    $nternet toda(.

    #e(uirements of a Network

    1ver( network includes' &t least two computers " *erver or Client workstation

    2etwork $nterface Card +2$C

    & communication medium " wired or wireless

    2etwork operatin! s(stem software such as Microsoft Windows 2/ or #333, 2ovell 2etWare, ni0

    inu0.

    Network %erminologies

    . Nodes &Workstation)*& computer becomes a node +also called a workstation as soon as it is attached

    network.

    #. +erver' & computer that facilitates sharin! of data, software and hardware resources on the network is knoas the server. & network can have more than one server. 1ach server has a uni4ue name b( which

    identified b( all the nodes on the network. *erver can be of two t(pes'

    a "edicated' /hese are !enerall( used on bi! network installations where one computer is reserved

    server5s job. $t helps all nodes access data, software and hardware resources.

  • 8/10/2019 Network 2014 CBSE CLASS 12

    2/19

    b Non,dedicated' /he small networks usin! such a server are known as 6eer to 6eer networks. &lso

    a network there ma( be several servers that allow workstations to share specific resources -e0ample a file server which takes care of files related re4uests, a printer server takin! care of prin

    re4uirements and a modem server that helps !roup of users to use a modem.

    %. Network Interface -nit &NI-)*$t is a device attached to each of the workstations and the server which hto establish communication between the server and workstations. $t is also known as %erminal Access $

    &%A$)or Network Interface card &NIC)./he 2$C manufacturer assi!ns a uni4ue ph(sical address to e

    2$C card and this ph(sical address is known as the M&C +Media &ccess Control address.

    Network +witching %echni(ues

    *witchin! techni4ues are used to efficientl( transmit data across the network. /he two t(pes of switchin! techni4

    that provide communication between two computers on a network are' Circuit SwitchingandPacket Switching

    Circuit switching'

    $t is the simplest method of data communication in which a dedicated physical pathis established between

    source computer and destination computer e.!., /elephone network where the communication path is dedicated tocaller and the called part( for the duration of the telephone call.

    $acket switching'$nformation on the $nternet is transmitted in packets. sin! the /C6 protocol, a sin!le lar!e messa!e is divided in

    se4uence of packets of si)e limits from #7 to 839: b(tes. 1ach packet has the address of sender and destinat

    sin! the $6 protocol, the packets are passed from one network to another till the( reach their destination. &tdestination, the /C6 software reassembles the packets into the complete messa!e. $f an( packets are lost or dama

    a re4uest is sent to retransmit the same messa!e. $t is not necessar( for all the packets in a messa!e to take ident

    route.

    %ypes of Network

    & network can be a small !roup of same t(pe of 6Cs that have been linked to!ether in a small room or a few hund

    computers of different t(pes spread around the world which have been linked to!ether to e0chan!e informat/hus, network can var( widel( in their si)e and !eo!raphical area. /hese are'

    6ersonal &rea 2etwork +6&2

    ocal &rea 2etwork +&2 Metropolitan &rea 2etwork +M&2

    Wide &rea 2etwork +W&2

    $AN &$ersonal

    Area Network)*

    AN &ocal Area

    Network)*

    /AN &/etropolitan

    Area Network)*

    WAN &Wide Area

    Network)*

    & 6&2 is a network

    of Communicatin!devices +Computer,

    6hone, M6%;M68

    6la(er, Camera etc.

    in the pro0imit( of

    & &2 is a network of

    computin!;Communicatin!devices in a room, buildin!,

    or campus. $t can cover an

    area of a few meters to a

    few kilometres radius. &

    & M&2 is a network of

    computin!;communicatin!devices within a cit(. $t

    can cover an area of a few

    kilometres to a few

    hundred kilometres radius.

    & W&2 is a network of

    computin!;communicatin!devices crossin! the limits o

    a cit(, countr(, or continent.

    can cover an area of over

    hundreds of kilometre radiu

    #

  • 8/10/2019 Network 2014 CBSE CLASS 12

    3/19

    an individual. $t cancover an area of a

    few meters radius.

    When (ou have totransfer son!s from

    one cell phone to

    another, (ou set up a6&2 of two phones.

    When files aretransferred from a

    6C to an M6%pla(er, a 6&2 is set

    up between the two.

    /here can also bemultiple devices in

    6&2. & 6&2 can be

    set up usin! !uidedmedia +*< cable

    or un!uided media

    +

  • 8/10/2019 Network 2014 CBSE CLASS 12

    4/19

    Attenuation' When an analo! si!nal travels a lon! distance it loses its stren!th. &mplifiers are used to increase

    stren!th.

    "istortion' 2oise si!nals interfere with the actual si!nal and distort it. Repeaters are used to re!enerate a disto

    si!nal.

    /odem' $t is a device which converts di!ital si!nals to analo! for transmission over analo! transmission facilsuch as telephone lines and vice versa.

    %ransmission /edia or Communication channels

    & communication channel is the path for transmission between two or more points. $ts purpose is to carr( messafrom one location to another location. /he( are classified as'

    /wisted pair cable

    Coa0ial cables

    Optical fiber

    Microwave transmission

    Radio wave transmission

    *atellite transmission

    $nfrared transmission

    Wired /edia

    %wisted $air Cale Co,a2ial cale &or coa2) 3ptical 4ier cale

    8

  • 8/10/2019 Network 2014 CBSE CLASS 12

    5/19

    /his is probabl( the most widel(used cable for creatin! small

    computer networks. $t contains

    four twisted pairs covered in anouter shield. /hese pairs are

    colour coded. &n RA-8B

    connecter is used to connect thiscable to a computer.

    $t is of two t(pes'. *hielded /wisted 6air +*/6

    Cable.#. nshielded /wisted 6air

    +/6 Cable.

    /he */6 cable comes withshieldin! of the individual pairs

    of wires which protects it from

    e0ternal interference andcrosstalk.

    & coa0ial cable consists of twoconductors that share a common

    a0is. /he inner conductor is a

    strai!ht wire and the outerconductor is a shield that mi!ht be

    braided or a foil.

    $t can be of two t(pes'. /hicknet

    #. /hinnet

    /hicknet is thicker and its cablese!ment can be upto B33 metres

    lon! and thinnet is thinner and its

    cable se!ment can be upto 7Bmetres.

    Advantages*

    . $t is capable of carr(in! asi!nal over lon! distances

    without amplification.

    #. $t is simple, low wei!ht,eas( to install and eas( to

    maintain.

    %. $t is an ade4uate and leaste0pensive medium for low

    speed +up to 3 mbps

    applications where the distance

    between the nodes is relativel(small.

    "isadvantages*

    . $t can easil( pick up noisesi!nals.

    #.

  • 8/10/2019 Network 2014 CBSE CLASS 12

    6/19

    #adio Wave

    %ransmission

    /icro Wave

    %ransmission

    Infrared Wave

    %ransmission

    0luetooth

    %ransmission

    +atellite ink

    ?re4uenc( ran!e of

    % >@) to %=@)

    ?re4uenc( ran!e of

    %33M@) +3.% =@) to%33 =@). /his ran!e

    has some overlappin!

    portion +3.%=@) -%=@) with radio

    waves

    ?re4uenc( ran!e

    of %33 =@) to833 /@)

    ?re4uenc(

    ran!e of #.83#=@) to #.873

    =@)

    Micro wave fre4uenc(

    bands used for uplinkvar( from .: =@) to %3.

    =@) and that for

    downlink varies from.B=@) to #3.3=@).

    Radio waves cantravel lon! distances

    and can penetrate

    buildin!s easil(./hese waves are

    Omni-directional, so

    the transmittin! andreceivin! antennas

    need not be ali!ned.

    $t offers ease ofcommunication over

    difficult terrain

    Microwaves travel instrai!ht lines and

    cannot penetrate an(

    solid object. /hetransmission is in

    strai!ht lines so the

    transmittin! andreceivin! antennas

    need to be properl(

    ali!ned + line of si!httransmission

    $t is a line ofsi!ht

    transmission.

    /he waves donot cross an(

    solid object in

    between &t atime onl( two

    devices can

    communicatetherefore

    information

    passed to one

    device is notleaked to

    another device.

    ine of si!htbetween

    communicatin

    ! devices isnot re4uired

  • 8/10/2019 Network 2014 CBSE CLASS 12

    7/19

    etc. $t is used b(policemen and

    securit( personals

    etc.

    Cordless mouse,and $ntrusion

    detectors.

    Advantages

    1. $t is eas( to

    communicate

    throu!h radio

    waves indifficult terrains

    since there is no

    need of di!!in!and la(in!

    cables.

    2. Radio waves can

    travel throu!h

    lon! distances inall directions.

    &lso the( can

    easil( passthrou!h

    obstacles like a

    buildin! so the(can be used for

    both indoor and

    outdoor

    communication.

    Advantages

    . Microwavetransmission does not

    re4uire the e0pense of

    la(in! cables#. $t can carr( #B333voice channels at the

    same time.

    %. *ince no cables areto be laid down so it

    offers ease of

    communication overdifficult terrains like

    hill( areas.

    Advantages

    . *ince it ishavin! short

    ran!e of

    communicationhence it isconsidered to be

    a secure mode

    of/ransmission.

    #. $t is 4uite

    ine0pensivetransmission

    medium.

    Can be

    passwordprotected

    Advantages

    . *atellitecommunication is ver(

    economical keepin! in

    mind the fact that the areacovered throu!h satellitetransmission is 4uite

    lar!e. ?or e.!., satellites

    used for nationaltransmission are visible

    from all parts of the

    countr(.#. /ransmission and

    reception costs are

    independent of thedistance between the two

    points.

    "isadvantages

    . $t is susceptible toweather effects like

    rain, thunderstorm

    etc.#. Data transmitted

    throu!h radio waves

    is not secure.

    "isadvantages

    . *i!nals becomeweak after travellin! a

    certain distance and so

    re4uire amplification./o overcome this

    problem, repeaters are

    used at re!ular

    intervals +#B-%3 kms./he data si!nals are

    received, amplified

    and then etransmitted./his makes it a ver(

    e0pensive mode of

    communication#. $nstallation and

    maintenance of

    microwave links turnsout be a ver(

    e0pensive affair.

    %. /he transmission is

    affected b( weatherconditions like rain,

    thunderstorms etc.

    "isadvantages

    . $t can onl( beused for short

    ran!e

    communication.#. $nfrared wave

    transmission

    cannot pass

    throu!hobstructions like

    walls, buildin!s

    etc.

    *low data

    transfer rate+up to Mbps.

    "isadvantages

    . 6lacin! the satellite intits orbit involves ver(

    hi!h cost.

    #. *ince si!nals sent to asatellite are broadcasted t

    all receivers, so necessar(

    securit( measures have to

    be taken to preventunauthori)ed tamperin! o

    data.

    %. /ransmission isaffected b( weather

    conditions like rain,

    thunderstorm etc.

  • 8/10/2019 Network 2014 CBSE CLASS 12

    8/19

    Network %opology

    $t refers to the !eometrical arran!ement of nodes in a local area network +&2.

    /he network topolo!ies are'

    0us %opology +tar %opology %ree %opology

    $n bus topolo!( all the nodes are

    connected to a main cable called

    backbone. $f an( node has to send someinformation to an( other node, it sends

    the si!nal to the backbone. /he si!nal

    travels throu!h the entire len!th of thebackbone and is received b( the node

    for which it is intended. & small device

    called terminator is attached at each endof the backbone. When the si!nal

    reaches the end of backbone, it is

    absorbed b( the terminator and the

    backbone !ets free to carr( anothersi!nal. /his prevents the reflection of

    si!nal back on the cable and hence

    eliminates the chances of si!nal

    interference.

    $n star topolo!( each node is

    directl( connected to a

    hub;switch. $f an( node has tosend some information to an(

    other node, it sends the si!nal to

    the hub;switch. /his si!nal isthen broadcast +in case of a

    hub to all the nodes but is

    accepted b( the intendednode+s. $n the case of a switch

    the si!nal is sent onl( to the

    intended node+s. *tar topolo!(

    !enerall( re4uires more cablethan bus topolo!(.

    /ree topolo!( is a combination

    bus and star topolo!ies. $t is us

    to combine multiple star topolo!networks. &ll the stars a

    connected to!ether like a bus. /h

    bus-star h(brid approach supporfuture e0pandabilit( of the networ

    Advantages

    i *ince there is a sin!le common data

    path connectin! all the nodes, the bus

    topolo!( uses a ver( short cable len!th

    which considerabl( reduces theinstallation cost.

    ii /he linear architecture is ver( simple

    and reliable.iii &dditional nodes can be easil(

    connected to the e0istin! bus network at

    an( point alon! the len!th of thetransmission medium.

    "isadvantages

    i ?ault detection and isolation is

    difficult. /his is because control of the

    network is not centrali)ed in an(

    particular node. $f a node is fault( on thebus, detection of fault ma( have to be

    performed at man( points on the

    Advantages

    i ?ailure of a sin!le connection

    does not affect the entire

    network. $t just involves

    disconnectin! one node from anotherwise full( functional

    network. /his also helps in eas(

    reconfi!uration of the network.ii ?ault detection is easier.

    iii &ccess protocols bein! used

    in a *tar network are ver(simple since the central node

    has the control of the

    transmission medium for datatransmission

    "isadvantages i *ince ever(

    node is directl( connected tothe centre, so lar!e amount of

    cable is needed which increases

    Advantages

    . $t offers eas( wa( of netwo

    e0pansion

    #. 1ven if one network +star fai

    the other networks remaconnected and workin!.

    "isadvantages

    . $t can be used in an

    or!ani)ation of hierarchical

    structure.

    7

  • 8/10/2019 Network 2014 CBSE CLASS 12

    9/19

    network. /he fault( node has then to berectified at that connection point.

    ii $f the central bus len!th becomes too

    lon!, then repeaters mi!ht have to beused to amplif( the si!nal. /he use of

    repeaters makes reconfi!uration

    necessar(.iii *ince each node is directl(

    connected to the central bus, so there hasto be some wa( of decidin! who can use

    the network at an( !iven time.

    the installation cost of thenetwork.

    ii /he entire network is

    dependent on the central node.$f the central node fails the

    entire network !oes down.

    Network "evices

    /odem &/odulator 5 "emodulator)

    Modem is a device which converts di!ital si!nals intoanalo! for transmission over analo! transmission

    facilities such as telephone lines. &t the receivin! end, a

    modem performs the reverse function and convertsanalo! si!nal into di!ital form. /he process of convertin!

    di!ital si!nal to analo! si!nal is called modulation. /heprocess of convertin! analo! si!nal to di!ital si!nal is

    called demodulation. & modem can also amplif( a si!nalso that it can travel a lon! distance without attenuation.

    Modem is available in two verities " $nternal or 10ternal.

    #6 5 78

    RA-8B, short form of Re!istered Aack - 8B, is an ei!ht

    wired connector that is used to connect computers on a

    local area network +&2, especiall( 1thernet. RA-8Bconnectors look similar to the RA- connector used for

    connectin! telephone e4uipment, but the( are somewhat

    wider.

    Ethernet Card

    &n 1thernet card is a kind of network adapter and is also

    known as 2etwork $nterface Card +2$C. /hese adapters

    support the 1thernet standard for hi!h-speed networkconnections via cables. &n 1thernet Card contains

    connections for either coa0ial or twisted pair cables or

    fibre optic cable

    9u

    $t is an electronic device that connects several nodes to form a network and redirects the received information to

    the connected nodes in broadcast mode. & hub has ports into which the cables from individual computers 2$Cs

    inserted. $t usuall( support 7, #, #8 RA " 87 connectors.

    9

    http://en.wikipedia.org/wiki/Image:Network_card.jpg
  • 8/10/2019 Network 2014 CBSE CLASS 12

    10/19

    +witch

    & switch is an intelli!ent hub that connects several nodes to form a network and redirects the received informa

    onl( to the intended node+s.

    #epeater

    & repeater is an electronic device that receives a si!nal,

    amplifies it and then retransmits it on the network so that

    the si!nal can cover lon!er distances. &n electrical si!nal

    in a cable !ets weaker with the distance it travels, due toener!( dissipated in conductor resistance and dielectric

    losses.

    #outer

    & Router is a network device that works like a brid!e to establish connection between two networks but it can han

    networks with different protocols.

    :ateway

    & !atewa( is a network device that establishes an intelli!ent connection between a local network and e0te

    networks with completel( different structures i.e. it connects two dissimilar networks. $n simple terms, it is a noda network that serves as an entrance to another network &2s or W&2s and can handle different protocols.

    Wi4i Card

    Wi-?i cards are small and portable cards that allow (our desktop or laptop computer to connect to the intethrou!h a wireless network. Wi-?i transmission is throu!h the radio waves. /he antenna transmits the radio si!

    and these si!nals are picked up b( Wi-?i receivers such as computers and cell phones e4uipped with Wi-?i ca

    /hese devices have to be within the ran!e of a Wi-?i network to receive the si!nals. /he Wi-?i card then readssi!nals and produces a wireless internet connection. Once a connection is established between user and the netw

    the user will be prompted with a lo!in screen and password if the connection bein! established is a secure connect

    Wi-?i cards can be e0ternal or internal. $f a Wi-?i card is not installed in (our computer, (ou ma( purchase

    a *< antenna attachment and have it e0ternall( connected to (our device. Man( newer computers, mobile devetc. are e4uipped with wireless networkin! capabilit( and do not re4uire a Wi-?i card. @owever, it is importan

    understand that the Wi-?i connection onl( e0ists between the device and the router. Most routers are fur

    connected to a cable modem, which provides internet access to all connected devices.

    Network $rotocol

    & protocol is the special set of rules that two or more machines on a network follow to communicate with each ot/he( are the standards that allow computers to communicate. *ome of the important protocols used are as follows

    %C$ ; I$ &%ransmission Control $rotocol ; Internet $rotocol)

    3

    http://en.wikipedia.org/wiki/Image:4_port_netgear_ethernet_hub.jpg
  • 8/10/2019 Network 2014 CBSE CLASS 12

    11/19

    %ransmission Control $rotocol &%C$)

    /he /ransmission Control 6rotocol +/C6 breaks the data into packets that the network can handle efficientlmana!es the assemblin! of a messa!e or file into smaller packets that are transmitted over the $nternet. $t verifie

    the packets when the( arrive at the destination computer and then reassembles them in proper order. Data can be

    in the intermediate network. *o /C6 adds support to detect errors or lost data and to tri!!er retransmission untildata is correctl( and completel( received.

    Internet $rotocol &I$)

    /he $nternet 6rotocol +$6 handles the address part of each packet so that it reaches to the ri!ht destination. $t !distinct address +called $6 address to each data packet. 1ach !atewa( computer on the network checks this addres

    see where to forward the messa!e. 1ven thou!h some packets from the same messa!e are routed differentl( t

    others, the(5ll be reassembled at the destination They are together known as the TCP/P protocol!

    4%$ &4ile %ransfer $rotocol)

    ?ile /ransfer protocol is used for cop(in! files from one computer to another.

    9yper %e2t %ransfer $rotocol &9%%$)

    @//6 is the protocol that is used for transferrin! h(perte0t +i.e. te0t, !raphic, ima!e, sound, video etc. between tw

    computers and is particularl( used on the World Wide Web. $t is a /C6;$6 based communication protocol andprovides a standard for Web browsers and servers to communicate.

    @//6 is based on Client;*erver principle. Communication between the host and the client occurs throu!h are4uest;response pair. & connection is established between two computers - out of which one is client +!enerall( th

    browser that initiates the re4uest and the other is the server that responds to the re4uest. &lso @//6 identifies the

    resource that the client has re4uested for and informs the server about the action to be taken. When the user clicks

    the h(perte0t link, the client pro!ram on their computer uses @//6 to contact the server, identif( the resource andthe server to respond with an action. /he server accepts the re4uest and then uses @//6 to respond to perform the

    action.

    $$$ &$oint to $oint $rotocol)

    666 +6oint-to-6oint 6rotocol is used for communication between two computers usin! a serial interface, mostl( a

    personal computer connected b( phone line to a server. ?or e0ample, an $nternet *ervice 6rovider +$*6 ma( prov(ou with a 666 connection so that the $*65s server can respond to (our re4uests, pass them on to the $nternet, and

    forward (our re4uested $nternet responses back to (ou. $t was basicall( desi!ned to help communication between

    s(stems throu!h telephone lines as it supports transmission of network packets over a serial point to point link.

    666 is sometimes considered a member of the /C6;$6 suite of protocols. 1ssentiall(, it encapsulates and packa!es

    (our computer5s /C6;$6 packets into 666 frames and then forwards them to the server over serial transmission lin

    such as telephone lines, $*D2 etc. 666 defines the format of frame to be e0chan!ed between devices on one ormultiple links and also defines the authenticit( of the two devices. $t supports various authentication schemes such

    Password Authentication Protocol+6&6 and Challenge "andshake Authentication protocol+C@&6.

    E,mail $rotocols

    +imple /ail %ransfer protocol &+/%$)

    *M/6 stands for Simple #ail Transfer Protocolthat allows transmission of email over the $nternet. Most email

    software is desi!ned to use *M/6 for communication purposes when sendin! email. $t onl( works for out!oin!messa!es. *o when an email has to be sent, the address of their $nternet *ervice 6rovider5s *M/6 server has to be

    !iven. /he actual mail transfer is done throu!h Messa!e /ransfer &!ents +M/&. *o the client computer must hav

    client M/& and the server must have a server M/&. *M/6 actuall( defines the M/& client and the server on theinternet.

    *M/6 has a major disadvanta!e that it is relativel( eas( to send a messa!e with a fake sender address. /his result

    spread of man( email-based viruses

  • 8/10/2019 Network 2014 CBSE CLASS 12

    12/19

    Most servers these da(s actuall( us a sli!htl( updated version of the *M/6 protocol called$S#TP %$&tended Sim

    #ail Transfer Protocol'!/his was created to allow transmission of multimedia throu!h email. When someone senpicture or music file throu!h their email pro!ram, 1*M/6 communication codes are used to identif( the kind of d

    bein! transferred. Multipurpose $nternet Mail 10tension +M$M1 is a supplementar( protocol that allows non &*C

    data to be sent throu!h *M/6.

    $ost 3ffice $rotocol

  • 8/10/2019 Network 2014 CBSE CLASS 12

    13/19

    I$ phones , $6 phones appear much like an ordinar( telephone or cordless phone. /he( are directl( connected to t

    router or the &2. /he( have all the hardware and software necessar( ri!ht onboard to handle the $6 call. $6 6honare sometimes called Eo$6 telephones, *$6 phones or *oft phones.

    Computer,to,computer , $t is the most eas( and simplest wa( to use Eo$6. /he basic hardware re4uirements are

    follows' Computer

    $nternet

    *peakers

    Microphone/he onl( cost involved with computer - to- computer Eo$6 is the monthl( $*6 fee.

    /oile %elecommunication %echnologies

    Mobile is a device which is portable. Mobile communication is based on cellular networks. & cellular network is

    nothin! but a radio network. $n this network, land is divided into areas called cells. 1ver( cell in the network has a

    transmitter and a receiver known as cell site or base station. 1ach cell in the network uses different fre4uenc( for transmission of si!nals. When joined to!ether these cells provide radio covera!e over a lar!e !eo!raphical area. /

    network of cells enables the mobile devices to communicate even if the( are movin! from one cell to another via

    stations.

    1: /oile +ystems/he = Mobile *(stem was introduced in late 93s and earl( 973s./he = mobile s(stem was based on the anacellular technolo!(. /he( onl( had voice facilit( available and were based on circuit-switched technolo!(. $n =

    mobile s(stems voice was modulated to a fre4uenc( of about B3M@) and hi!her. /he( used radio towers for

    transmission. /he major drawbacks of the = s(stem were its low capacit(, poor voice links and no securit(.

  • 8/10/2019 Network 2014 CBSE CLASS 12

    14/19

    /he mobile technolo!( usin! packet switched domain instead of circuit switched domain were termed as #.B= mo

    s(stems. /he( used =6R* %,eneral Packet -adio Service'in addition to =*M. With #.B= services like MM*,sendin! pictures throu!h e-mail became possible. =6R* technolo!( was also a major step towards %= mobile s(s

    =: /oile +ystem

    /he %= technolo!( adds multimedia facilities to #= phones b( allowin! video, audio, and !raphics applications. W

    the advent of %= technolo!( watchin! streamin! video or video telephon( became a realit(. /he idea behind %= i

    have a sin!le network standard instead of the different t(pes adopted in the *, 1urope, and &sia. %= mobile s(stare also known as niversal Mobile /elecommunications *(stem +M/* or $M/-#333. /he( can sustain hi!her

    rates and open the door to man( $nternet st(le applications. /he main characteristics of $M/-#333 %= s(stems are & sin!le famil( of compatible standards that can be used worldwide for all mobile applications.

    *upport for both packet-switched and circuit-switched data transmission.

    Data rates up to # Mbps +dependin! on mobilit(.

    @i!h bandwidth efficienc(

    7: /oile +ystem

    8= networks will be based on packet switchin! onl(. $t will be able to support faster transmission. /he( are projec

    to provide speeds up to 33 Mbps while movin! and =bps while stationar(. $t is a wireless access technolo!(. 8=can provide better-than-/E 4ualit( ima!es and video-links.

    Network +ecurity Concepts

    2etwork securit( deals with policies adopted b( network administrator to protect the network from unauthori)ed

    access and misuse of network resources. $t also ensures that the authori)ed users have ade4uate access to all the

    network resources.

  • 8/10/2019 Network 2014 CBSE CLASS 12

    15/19

    %ro'an 9orse

    & /rojan horse is a pro!ram that contains hidden malicious functions. /rojan @orses trick users into installin! themb( appearin! to be le!itimate pro!rams. Once installed on a s(stem, the( reveal their true nature and cause dama!

    *ome /rojan horses will contact a central server and report back information such as passwords, user $Ds, and

    captured ke(strokes. /rojans lack a replication routine and thus are not viruses b( definition.

    +pam

    /he term spam means endless repetition of worthless te0t. $n other words, unwanted messa!es or mails are known*pam. &t times internet is flooded with multiple copies of the same messa!e, it is nothin! but spam. Most spam is

    commercial advertisin!. $n addition to wastin! people5s time, spam also eats up a lot of network bandwidth.

    Cookies

    When the user browses a website, the web server sends a te0t file to the web browser. /his small te0t file is a

    cookie. =enerall( a cookie contains the name of the website from which it has come from and a uni4ue $D ta!.

    *ome cookies last onl( until the browser is closed. /he( are not stored on (our hard drive. /he( are usuall( used ttrack the pa!es that (ou visit so that information can be customi)ed for (ou for that visit. On the other hand, some

    cookies are stored on (our hard drive until (ou delete them or the( reach their e0pir( date. /hese ma(, for e0ampl

    be used to remember (our preferences when (ou use the website.

    4irewall

    & firewall is hardware or software based network securit( s(stem. $t prevents unauthori)ed access +hackers, viruseworms etc. to or from a network. ?irewalls are used to prevent unauthori)ed internet users to access private netwo

    connected to the $nternet. &ll data enterin! or leavin! the $ntranet pass throu!h the firewall, which e0amines each

    packet and blocks those that do not meet the specified securit( criteria.

    & firewall e0amines all traffic routed between the two networks to see if it meets certain criteria. $f it does, it is robetween the networks, otherwise it is stopped. & firewall filters both inbound and outbound traffic. & firewall ma(

    allow all traffic throu!h unless it meets certain criteria, or it ma( den( all traffic unless it meets certain criteria.

    Cyer Crime

    C(bercrime is defined as a crime in which a computer and internet is used in an ille!itimate wa( to harm the user.

    C(ber criminals ma( use computer technolo!( to access personal information, business trade secrets, or use theinternet for e0ploitive or malicious purposes. C(bercrimes can be a!ainst persons or a!ainst propert( or a!ainst th

    !overnment.

    %he list of Cyer Crimes includes

    harassment b( computer +C(ber *talkin!, defamation

    porno!raph(

    ille!al downloads, pla!iarism

    software pirac(;counterfeitin!, cop(ri!ht violation of software, counterfeit hardware, black market

    sales of hardware and software, theft of e4uipment and new technolo!ies

    fraud +credit card fraud, fraudulent use of &/M accounts, stock market transfers, telecommunications

    fraud, theft of +electronic mone(

    Cyer aw

    C(ber law is an attempt to inte!rate the challen!es presented b( human activit( on the internet with le!al s(stem olaws applicable to the ph(sical world.

    /here was no act in $ndia for !overnin! C(ber aws involvin! privac( issues, jurisdiction issues, intellectual prop

    ri!hts issues and a number of other le!al 4uestions. With the tendenc( of misusin! of technolo!(, there has arisen

    need of strict le!al laws to re!ulate the criminal activities in the c(ber world and to protect the true sense oftechnolo!(. G$2?ORM&/$O2 /1C@2OO=H &C/, #333G I$/&- #333J was enacted b( 6arliament of $ndia to

    protect the field of e-commerce, e-!overnance, e-bankin! as well as penalties and punishments in the field of C(b

    Crimes. /he above &ct was further amended in the form of $/ &mendment &ct, #337 I$/&&-#337J.

    B

  • 8/10/2019 Network 2014 CBSE CLASS 12

    16/19

    $n the $/ &ct the word 5computer5 and 5computer s(stem5 have been so widel( defined and interpreted to mean an(electronic device with data processin! capabilit(, performin! computer functions like lo!ical, arithmetic and mem

    functions with input, stora!e and output capabilities.

    +ome of the C0E# 344ENCE+ -N"E# %9E I% AC%

    /amperin! with computer source documents - *ection :B

    @ackin! -*ection ::

    6ublishin! of information which is obscene in electronic form -*ection :

    Intellectual property rights &I$#) Issues

    $ntellectual propert( ri!hts are the ri!hts !iven to an individual over the invention of their own. /he( usuall( !ivecreator an e0clusive ri!ht over the use of his;her creation for a certain period of time.

    %here are only three ways to protect intellectual property

    1. $atents

    & 6atent is a term used for a specific product desi!ned b( an individual. /he desi!ner is !iven e0clusive ri!hts ov

    the patent for a limited period of time. With help of the patent ri!ht, the owner can stop others from makin!, usin!

    sellin! the product desi!n. /he owner can take a le!al action if someone uses the patent without his; her permissio$n order to obtain a patent, the followin! conditions should be met'

    /he product should be new

    $t should be capable of bein! made or used in some kind of industr(

    $t should not be a scientific or mathematical discover(

    $t should not be a dramatic, musical dramatic or artistic work

    >. %rademarks

    /rademark can be defined as a name or a different si!n or a device identif(in! a product or a service. /he product

    the service is produced or provided b( a specific person or a compan(. & /rademark is also known as brand name

    should be officiall( re!istered and le!all( restricted to use of the specific person or the compan(.

    =. Copyrights

    Cop(ri!ht is the term used for a written document. & le!al action can be taken, if cop(ri!hts are violated. /hefollowin! cate!or( of work can be considered for cop(ri!hts.

    literar( works

    musical works includin! an( accompan(in! words

    dramatic works, includin! an( accompan(in! music

    pantomimes and choreo!raphic works

    pictorial, !raphic and sculptural works

    motion pictures and other audio visual works

    sound recordin!s

    architectural works

    computer pro!rams and websites

    9acking

    & computer enthusiast, who uses his computer pro!rammin! skills to intentionall( access a computer without

    authori)ation is known as hackin!. /he computer enthusiast involved in this activit( is known as a hacker.

    & hacker accesses the computer without the intention of destro(in! data or maliciousl( harmin! the computer.& cracker !ains unauthori)ed access to a computer with the intention of causin! dama!e.

    Introduction to We +ervices

    9%/ &9yperte2t /arkup anguage)

    :

  • 8/10/2019 Network 2014 CBSE CLASS 12

    17/19

    @/M is lan!ua!e the helps in creatin! and desi!nin! web content. $t is a markup lan!ua!e. $t has a variet( of ta!

    and attributes for definin! the la(out and structure of the web document. $t is desi!ned to displa( the data informatted manner. & @/M document has the e0tension .htm or .html."yperte&tis a te0t which is linked to anoth

    document.

    @/ &e@tensile /arkup anguage)

    FM is a markup lan!ua!e like @/M. $t is desi!ned to carr( or store data. $n contrast to @/M, it is not desi!ne

    to displa( data. nlike @/M, it does not have predefined ta!s. $t is possible to define new ta!s in FM. $t allow

    the pro!rammer to use customi)ed ta!s. FM is case sensitive. FM is dei!ned to be self descriptive. FM is a Wrecommendation.

    XML documents form a tree structure.

    ?or 10ample

    KrootLKchildL

    KsubchildL.....K;subchildL

    K;childLK;rootL

    Computer *cience

    WWW &World Wide We)*

    WWW can be defined as a h(perte0t information retrieval s(stem on the $nternet. $t is invented b( /im

  • 8/10/2019 Network 2014 CBSE CLASS 12

    18/19

    We rowser

    Web browser is software pro!ram to navi!ate the web pa!es on the internet. & bowser interprets the codin! lan!ua

    of the web pa!e and displa(s it in !raphic form. & web browser allows an(one to access the web without even

    knowin! commands used in software lan!ua!es to desi!n a web pa!e. $nternet works on client -server model. & wbrowser is a client which re4uests the information from the web server. /he web server sends the information bac

    the client. /he web address of the webpa!e written on the address bar tells the web browser which pa!e to access.

    *ome of the web browsers are' 2etscape 2avi!ator, $nternet 10plorer, Mo)illa ?irefo0 etc.

    -# &-niform resource locator)

    Web address of the web pa!e written on the address bar of the browser is known as the uniform resource locator

    +R. & R is a formatted te0t strin! used to identif( a network resource on the $nternet. 2etwork resources arfiles that can be plain Web pa!es, te0t documents, !raphics, downloadable files, services or pro!rams. 1ver( netw

    resource on the web has a uni4ue R.

    %he -# te2t string consists of three parts*

    network protocol

    host name or address

    file or resource location

    /he te0t strin! of a R has the followin! format'protocol';;server;path;resource

    Network $rotocol

    /he network protocol substrin! identifies the protocol to be used to access the network resource. /hese strin!s are

    short names followed b( the three characters 5' ;;. *ome e0amples of protocols include http, !opher, ftp and mailt

    -# 9ost;+erver

    /he host name or address substrin! identifies the host;server that holds the resource. @osts names are sometimescalled domain names. ?or e0ample' www. *chool.com is a domain name.

    @ost names are mapped into numeric $6 addresses. /he domain name www.school.com ma( have $6 address

    9#.#.33..&n $6 address is a binar( number that uni4uel( identifies computers and other devices on a /C6;$6network.@ost names are mapped to $6 addresses b( a server known as a D2* server, or domain name server. D2* stands f

    Domain Name Service!

    -# #esource ocation

    /he file or resource location substrin! contains a path to one specific network resource on the host;server. Resour

    are normall( located in a host director( or folder. ?or e0ample'www.school.com;syllaus;preprimary;nursery.his the location of this web pa!e includin! two subdirectories and the file name. When the location element is omit

    such as in http*;; www.school.com;the R conventionall( points to the root director( of the host and often a ho

    pa!e.

    We +erver

    & Web server is a computer or a !roup of computers that stores web pa!es on the internet. $t works on client;serve

    model. $t delivers the re4uested web pa!e to web browser. Web servers use special pro!rams such as &pache or $$deliver web pa!es over the http protocol.

    1ach server has a uni4ue $6 address and domain name. $n order to access a webpa!e, the user writes the R of th

    site on the address bar of the browser. /he machine on which the browser is runnin! sends a re4uest to the $6 addrof the machine runnin! the web server for that pa!e. Once the web server receives that re4uest, it sends the pa!e

    content back to the $6 address of the computer askin! for it. /he web browser then translates that content into all o

    7

  • 8/10/2019 Network 2014 CBSE CLASS 12

    19/19

    the te0t, pictures, links, videos, etc. & sin!le web server ma( support multiple websites or a sin!le website ma( be

    hosted on several linked servers.

    We hosting

    Web hostin! is the process of uploadin!;savin! the web content on a web server to make it available on WWW. $ncase an individual or a compan( wants to make its website available on the internet, it should be hosted on a web

    server.

    We >.B

    /he term web #.3 was !iven b( O5Reill( Media in #338. Web #.3 refers to new !eneration of d(namic and interac

    websites. Web #.3 websites uses a new pro!rammin! lan!ua!e called &A&F +&s(nchronous Aava*cript and FM

    &A&F helps a d(namic website connect to the web server and download small amount of data based on theinteraction with the user. $n this technolo!( onl( the part of the website which is updated is reloaded. /he entire p

    does not !et reloaded each time. /his helps in makin! the website interactive.

    Applications supported y we >.B are as followings*

    blo!!in!

    social bookmarkin!

    R** +Reall( *imple *(ndication

    wikis and other collaborative applications

    interactive enc(clopedias and dictionaries &dvanced =amin!

    9