0% found this document useful (0 votes)
2 views

Introduction Comp Networks XII IP 20 21

The document provides an overview of computer networks, including their advantages, types of transmission media (wired and wireless), and various networking devices. It discusses different network topologies, protocols, and classifications of networks based on area coverage. Key components such as NICs, hubs, switches, routers, and types of networks like PAN, LAN, MAN, and WAN are also explained.

Uploaded by

viirpratap15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
2 views

Introduction Comp Networks XII IP 20 21

The document provides an overview of computer networks, including their advantages, types of transmission media (wired and wireless), and various networking devices. It discusses different network topologies, protocols, and classifications of networks based on area coverage. Key components such as NICs, hubs, switches, routers, and types of networks like PAN, LAN, MAN, and WAN are also explained.

Uploaded by

viirpratap15
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 23

Lucknow Public School(A C.

P Singh Foundation)

INTRODUCTION TO COMPUTER NETWORKS

A computer network is a collection of interconnected computers and other


devices which are able to communicate with each other and share hardware and
software resources.

Advantages of network:

 Resource Sharing: hardware and software resources can be shared.


 Cost saving: sharing of resources reduces cost.
 Collaborative user interaction: services like video conferencing can be used
collaborative interaction.
 Time saving: as distance barrier is removed sending of data is quick and
fast, it saves time.
 Increased storage: interconnected computers provide larger storage
capacity.
Networking Hardware And Communication Media

Transmission Media: A transmission medium is a medium of data transfer over


a network. It can be wired or wireless.

Wired Media:

A number of various types of cables are used to transfer data over computer
networks.

These are Twisted Pair Cable, Co-axial Cable, and Optical Fiber Cable.

Twisted Pair Cable –It contains four twisted pairs covered in an outer shield.
These pairs are colour coded. An RJ-45 connecter is used to connect this cable to
a computer. It is of two types:

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 1


Lucknow Public School(A C.P Singh Foundation)

UTP (Unshielded Twisted Pair): As the name suggests in UTP cables individual
pairs are not shielded.

Characteristics of UTP cable:

 It is a low-cost cable available for setting up small networks.


 It is a thin (External diameter app. 0.43cm) and flexible cable and therefore
it offers ease of installation.
 It can carry data upto a length of 100m at a stretch.
STP (Shielded Twisted pair): It is the same cable as the UTP, but with each
pair shielded individually. An outer shield then covers all the pairs like in UTP.

Characteristics of STP cable:

 As compared to UTP, STP offers better immunity against internal and


external electromagnetic interferences.
 It is expensive than UTP cable.
 As compared to UTP cable, STP cable is difficult to install.
Co-axial cable (or coax) –A coaxial cable consists of two conductors that share
a common axis. The inner conductor is a straight wire and the outer conductor is a
shield that might be braided or a foil.

Characteristics of Co-axial cable:

 It can carry data for a larger distance (185m -


500m) at a stretch.
 Less susceptible to electromagnetic fields
 Bulkier and less flexible than twisted pair.
 Due to its thickness (1cm diameter) and less
flexibility, it is difficult to install as compared to
twisted pair cable.

Optical Fiber cable -

Optical Fibers are long, thin strands of glass about the thickness of a human hair.
They are arranged in bundles called optical fiber cables and used to transmit data
through light signals over long distances.

An optical fiber has following parts:

Core - It is the thin glass rod at the center through


which the light travels

Cladding - It is the outer optical material surrounding the core that reflects the
light back into the core

Buffer coating - It is the plastic coating that protects the cable from damage and
moisture

Characteristics of Optical Fiber Cable:

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 2


Lucknow Public School(A C.P Singh Foundation)
 It can carry data for a very large distance at a stretch.
 Not susceptible to electromagnetic fields
 Specially skilled people are required to install optical fiber cables.
 Till date it is the most expensive and at the same time the most efficient
cable available for computer networks.

Wireless Media

Electromagnetic waves are used for wireless communication over computer


networks.Frequencies of waves are measured in Hertz (Hz).

Based on their frequencies, electromagnetic waves are categorized into various


categories. These categories are (in increasing order of frequencies): radio waves,
microwaves, infrared radiation, visible light, ultraviolet radiation, X-rays, and
Gamma rays.

Out of these only radio waves, microwaves, and infrared rays are used for wireless
communication.

Radio Waves -

Radio waves have a frequency range of 3 KHz to 3GHz. Radio waves are used for
communication over distances ranging from a few meters (in walkie-talkies) upto
covering an entire city. These waves are easy to generate, can travel long
distances and can penetrate buildings easily. That's why they are widely used for
communication, both indoors and outdoors.

Cordless phones, AM and FM radio broadcast, Garage door openers etc. are
examples of radio wave transmission.

Characteristics of Radio Wave Transmission:

 These waves are omni-directional, so the transmitting and receiving


antennas need not be aligned.
 Relatively inexpensive than wired media.
 It offers ease of communication over difficult terrain
 The transmission can be interfered by motors or other electrical equipment
 Permission from concerned authorities is required for use of radio wave
transmission
 Less secure mode of transmission

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 3


Lucknow Public School(A C.P Singh Foundation)

Micro Waves –

Micro waves have a frequency range of 300MHz (0.3 GHz) to 300 GHz.
Microwaves travel in straight lines and cannot penetrate any solid object.
Therefore for long distance microwave communication, high towers are built and
microwave antennas are put on their tops.

Characteristics of Micro Wave Transmission:

 Free from land acquisition rights


 Relatively inexpensive than wired media
 Offers ease of communication over difficult terrain
 The transmission is in straight lines so the transmitting and receiving
antennas need to be properly aligned ( line of sight transmission)
Infrared Waves;

Infrared waves have a frequency range of 300 GHz to 400 THz. Infrared waves are
so called because they have a frequency range of just less than that of red light.
These waves are used for short range communication (approx. 5m) in a variety of
wireless communications, monitoring, and control applications.

Home-entertainment remote-control devices, Cordless mouse, and Intrusion


detectors are some of the devices that utilize infrared communication.

Characteristics of Infrared Wave Transmission:

 It is a line of sight transmission; therefore information passed to one device


is not leaked to another device.
 No government license is required for their use
 It is a line of sight transmission, therefore at a time only two devices can
communicate.
 The waves do not cross any solid object in between Performance drops with
longer distances

Bluetooth -Bluetooth technology uses radio waves in the frequency range of


2.402 GHz to 2.480 GHz. This technology is used for short range communication
(approx. 10m) in a variety of devices for wireless communication. Baby monitors,
door openers, and cell phones are some of the devices that utilize Bluetooth
communication.

Characteristics of Bluetooth Transmission:

 Line of sight between communicating devices is not required.


 Bluetooth can connect upto eight devices simultaneously.
 Slow data transfer rate (upto 1Mbps).

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 4


Lucknow Public School(A C.P Singh Foundation)

Satellite Link –

Satellite links are used for very long distance wireless communication which may
range from intercity to intercontinental. Transmission from the earth to a satellite
is known as uplink. Transmission from a satellite to the earth is known as
downlink.

Characteristics of Transmission using satellite link:


Satellites cover large area of earth

Since communication over very long distances is possible, this becomes a
commercially attractive option.
 This system is expensive
 Requires legal permissions.
NETWORK DEVICES:

Other than the transmission media many other devices are required to form
computer networks. Some of these devices are:

NIC(Network Interface Card / Unit) :An NIC (Network Interface Card) is a device
that enables a computer to connect to a network and communicate.

Any computer which has to be a part of a computer network must have an NIC.

Hub: A Hub is an electronic device that connects several nodes to form a network
and redirects the received information to all the connected nodes in broadcast
mode.

Hub is a device that allows us to connect multiple computers/devices together in a


network. A hub has ports into which the cables from individual computers' NICs
are inserted.

 Active Hub :- These are the hubs which have their own power supply and
can clean , boost and relay the signal along the network. It serves both as a
repeater as well as wiring center. These are used to extend maximum
distance between nodes.
 Passive Hub :- These are the hubs which collect wiring from nodes and
power supply from active hub. These hubs relay signals onto the network
without cleaning and boosting them and can’t be used to extend distance
between nodes.

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 5


Lucknow Public School(A C.P Singh Foundation)
Switch:

A Switch is an intelligent device that connects several nodes to form a network


and redirects the received information only to the intended node(s).

A switch is an intelligent hub.

Repeater:

A Repeater is a device that is used to regenerate a signal which is on its way


through a communication channel. A repeater regenerates the received signal and
re-transmits it to its destination.

Bridge:

A bridge is a repeater, with add on functionality of filtering content by reading the


MAC addresses of source and destination. It is also used for interconnecting two
LANs working on the same protocol.

Gateway: A Gateway is a device, which is used to connect different types of


networks and perform the necessary translation so that the connected networks
can communicate properly.

Router: it is a networking device that forwards data packets between computer


networks. Routers perform the traffic directing functions on the Internet

Modem (Modulator - Demodulator): A modem is a peripheral device that enables


a computer to transmit data over, telephone or cable lines.

It modulates an analogue carrier signal to encode digital information, and also


demodulates such a carrier signal to decode the transmitted information. This is
why modem is an acronym of MOdulator/DEModulator.

Types of computing devices on a network:

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 6


Lucknow Public School(A C.P Singh Foundation)
Node:

A Node is a device, which is directly connected to a computer network. It can be a


computer or any other device like printer, scanner etc.

Workstation: A workstation is a special computer designed for technical or


scientific applications. Intended primarily to be used by one person at a time, they
are commonly connected to a local area network and run multi-user operating
systems.

Server:A computer that facilitates sharing of data, software and hardware


resources on the network is known as the server. A network can have more
than one server also. Each server has a unique name by which it is identified
by all the nodes on the network. Servers can be of two types:

a) Dedicated and

b) Non dedicated servers

Dedicated Servers: These are generally used on big network installations where
one computer is reserved for server's job. It helps all nodes access data, software
and hardware resources. Since it does not double up as a workstation but only
manages the network, so it is known as a dedicated server and such type of
networks are called master- slave networks.

Non dedicated servers: In small networks, a workstation can double up as a


server. These servers are known as non dedicated servers. The small networks
using such a server are known as Peer to Peer networks.

NETWORK TOPOLOGIES:

A Topology is an arrangement of physical connections among nodes in a network.

Bus Topology:

Characteristics of Bus topology:

 It is easy to install.
 It requires less cable length and hence it is cost effective.
 Failure of a node does not affect the network.
 In case of cable (backbone) or terminator fault, the entire network breaks
down. (disadvantage)
 Fault diagnosis is difficult. (disadvantage)
 At a time only one node can transmit data.

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 7


Lucknow Public School(A C.P Singh Foundation)

Star Topology: In star topology each node is directly connected to a hub/switch.


If any node has to send some information to any other node, it sends the signal to
the hub/switch.

Characteristics of Star topology:

 It is more efficient topology as compared to bus topology.


 It is easy to install.
 It is easy to diagnose the fault in Star topology.
 It is easy to expand depending on the specifications of central hub/switch
 Failure of hub/switch leads to failure of entire network.(disadvantage)
 It requires more cable length as compared to bus topology.(disadvantage)
Ring topology:

 Nodes are connected in a circular ring.


 Data transfer is done in one direction.
 If any node is damaged entire network is affected. (disadvantage)
Tree Topology: Tree topology is a combination of bus and star topologies. It is
used to combine multiple star topology networks. All the stars are connected
together like a bus.

Characteristics of Tree topology:

 It offers easy way of network expansion


 Even if one network (star) fails, the other networks remain connected and
working.

Mesh Topology:

 In mesh topology there are more than one paths of communications


between nodes.

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 8


Lucknow Public School(A C.P Singh Foundation)

 In full mesh topology there are n-1 paths of connectivity(where n is number


of nodes in the network)
 It is highly reliable topology.
 Cost is high.
 More cable is required.

NETWORK PROTOCOLS

 A network protocol is a set of rules for communication among networked


devices.
 Protocols generally includes rules of how and when a device can send or
receive the data, how is the sent data packaged, and how it reaches its
destination.
 There are a number of protocols defined for computer networks

HTTP, TCP/IP, PPP,FTP

HTTP (Hyper Text Transfer Protocol):

 HTTP is used to transfer all files and other data (collectively called
resources) from one computer to another on the world wide web.
 When an HTTP client (a browser) sends a request to an HTTP server (web
server) , the server sends responses back to the client. This transfer of
requests and responses is done following HTTP protocol.

TCP/IP (Transmission Control Protocol / Internet Protocol):


Communication between two computers on internet is done using TCP/IP protocol.
TCP/IP can also be used as a communications protocol in a private network.

 Job of dividing the original message into packets and re-assembling the
received packets into the original message is done by TCP protocol.
 Internet protocol(IP) is used to address and routing of packets to right
destination.
Different packets from the same message may be routed differently, but they
reach the same destination and are reassembled there.

PPP (Point to Point Protocol):

 It is a protocol for direct communication between two computers, typically a


personal computer connected by phone line to a server.
 Most Internet service providers (ISPs) use PPP for customer dial-up access
to the Internet. PPP is used over many types of physical networks including
cellular telephone, serial cable, phone line, trunk line, specialized radio links,
and fiber optic links.
UDP: User datagram protocol is used to send data like IP.

Some more application protocols:

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 9


Lucknow Public School(A C.P Singh Foundation)
SMTP: Simple mail transfer protocol) is used to send e-mail.

POP (post office protocol) is used to access or receive e-mail from servers.

FTP: File transfer protocol is used to upload and download files

TYPES OF NETWORKS:

On the basis of area covered computer networks are classified as:

 PAN - Personal Area Network


 LAN - Local Area Network
 MAN - Metropolitan Area Network
 WAN -Wide Area Network
PAN (Personal Area Network):

 A PAN is a network of Communicating devices (Computer, Phone, MP3/MP4


Player, Camera etc.) in the proximity of an individual.
 It can cover an area of a few meters radius.
 When files are transferred from a PC to an MP3 player, a PAN is set up
between the two. There can also be multiple devices in PAN. A PAN can be
set up using guided media (USB cable) or unguided media (Bluetooth,
Infrared).
LAN (Local Area Network):

 A LAN is a network of computing/Communicating devices in a room,


building, or campus. It can cover an area of a few meters to a few
kilometers radius.
 In addition to operating in a limited space, a LAN is owned, controlled, and
managed by a single person or organization.
 A LAN can be set up using wired media (UTP cables, Co-axial cables etc.) or
wireless media (Infrared, radio waves).
 If a LAN is setup using unguided media, it is known as WLAN (wireless LAN).
MAN (Metropolitan Area Network):

A MAN is a network of computing/communicating devices within a city. It


can cover an area of a few kilometers to a few hundred kilometers radius.
 A network of schools, or banks, or Government offices etc., within a city, are
examples of MANs. A MAN is usually formed by interconnecting a number of
LANs and individual computers. All types of communication media (guided
and unguided) are used to set up a MAN.
 A MAN is typically owned and operated by a single entity such as a
government body or a large corporation. A good example of a MAN is the
interconnected offices of a state government.
WAN (Wide Area Network):

 A WAN is a network of computing/communicating devices crossing the limits


of a city, country, or continent. It can cover an area of over hundreds of
kilometer radius.
 A network of ATMs, BANKs, National Government Offices, International
Organizations' Offices etc., spread over a country, continent, or covering
many continents are examples of WANs.
 The best known example of a WAN is the internet.

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 10


Lucknow Public School(A C.P Singh Foundation)

IDENTIFICATION OF COMPUTERS AND USERS OVER A NETWORK:

MAC (Media Access Control) address:

 A MAC (Media Access Control) address is a unique 12 digit (6 digits for


manufacturer code and 6 digits for serial number) hexadecimal number
assigned to each NIC.
 MAC address of an NIC never changes.
 MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By
convention, MAC addresses are usually written in one of the following two
formats:
MM:MM:MM:SS:SS:SS or MM-MM-MM-SS-SS-SS

For example, in the following MAC address: 00:A0:C9 : 14:C8:35

IP Address:

 An IP (Internet Protocol) address is a unique 4 digit hexadecimal number


assigned to each node on a network. IP address settings of a node can be
changed by the user.
 Every machine in a network has another unique identifying number, called
its IP Address.
 An IP (IPv4)address is a group of four bytes (or 32 bits) each of which can
be a number from 0 to 255. A typical IP address looks like this:
59.177.134.72
 There are two versions of IP addresses: version 4 (IPv4) and version 6
(IPv6). IPv6 32 uses 128 bits (IPv4 uses 32 bits) for an IP address.
IP Address Vs MAC Address:

 The IP address is assigned by the network administrator or the internet


service provider while the MAC address is assigned by the manufacturer.
 If a computer is transferred from one network to another, its IP address gets
changed whereas the MAC address remains the same.
From the IP address it is usually possible to track the tentative location of the
computer but this is not the case with a MAC address.

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 11


Lucknow Public School(A C.P Singh Foundation)

INTRODUCTION TO INTERNET

The Internet is a global wide area network that connects computer systems across
the world. It includes several high-bandwidth data lines that comprise the Internet
"backbone." These lines are connected to major Internet hubs that distribute data
to other locations, such as web servers and ISPs.

ISP:Internet Service provider is the company that provides access to internet and
its services.

The Internet provides different online services. Some examples include:


 WWW or Web – It is Interactive environment that is collection of billions of
webpages that you can view with a web browser. The Web gives users
access to a vast array of documents that are connected to each other by
means of hypertext or hypermedia links—i.e., hyperlinks using HTTP
protocol.
World Wide Web was created by Timothy Berners Lee in 1989
at CERN in Geneva. World Wide Web came into existence as a proposal by
him, to allow researchers to work together effectively and efficiently
at CERN. Eventually it became World Wide Web.
 Email – The most common method of sending and receiving messages
Electronically online.
SMTP(SMTP AND POP protocols are used for sending and receiving e-mails.
 Chat: Online textual talk in real time, is called Chatting.
 Video Conferencing: a two way videophone conversation among multiple
participants is called video conferencing.

 VOIP: Voice over Internet Protocol (Voice over IP, VoIP and IP telephony) is
a group of technologies for the delivery of voice communications and
multimedia sessions over Internet. VoIP services convert your voice into a
digital signal that travels over the Internet.This method of making phone calls
is much cheaper than convectional way because the service of
Telecommunication Company is not used.
 Social media – websites and apps that allow people to share comments,
photos, and videos.
 Telnet: Remote login service to access a system virtually on Internet.

 Cloud computing: It is a general term for anything that involves delivering


hosted services over the Internet. Cloud Computing is the use of hardware and
software to deliver a service over a network (typically the Internet).
An example of a Cloud Computing provider is Google's Drive,Gmaill. Gmail
users can access files and applications hosted by Google via the internet from
any device.

Website :-

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 12


Lucknow Public School(A C.P Singh Foundation)
 Website is collection of related webpages. Related webpages are connected
through hyperlinks.Website represents information of any organisation or
any individual on Internet.
 Every website is accessed by its domain name.
 Example yahoo.co.in, cbse.nic.in, rediff.com

Webpage:
 It is a hypertext document that may consists of text,graphics,audio,video and
hyperlinks.To access a webpage Http protocol is used.

 HTML (hypertext markup language) is used to create webpages.

HomePage:The Index or first webpage of a website is called home page.

Difference between Static and Dynamic webpage :-

Static webpage Dynamic webpage

The static web pages display the Dynamic web pages the page
same content each time when content changes according to the
someone visits it user.

It takes less time to load over Dynamic web pages take more

internet. time while loading.

URL:

 Uniform Resource Locator is the character based name of file or location on


internet.URL has three parts.
Format of URL: server type//domain name/file path

 Example: http://www.cbse.nic.in/welcome.htm
Domain Name: Domain names are character based names used in URLs to
identify particular Web servers.

A Domain Name is a name assigned to a server through Domain Name


System (DNS). For example, in the URL
http://www.cbse.nic.in/welcome.htm, the domain name is www.cbse.nic.in.
 A domain name usually has more than one parts: top level domain name or
primary domain name and sub-domain name(s). For example, in the domain
name , in is the primary domain name; nic is the sub-domain of in; cbse is
the sub-domain of nic.
 There are only a limited number of top level domains, and these are divided
into two categories: Generic Domain Names and Country-Specific Domain
Names. For example:
Generic or logical Domain Names:

·com - commercial business

·edu - Educational institutions

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 13


Lucknow Public School(A C.P Singh Foundation)
·gov - Government agencies

·mil - Military

·net - Network organizations

·org - Organizations (nonprofit)

Country Specific Domain Names:

.in - India

·au - Australia

·ca - Canada

.ch - China

.nz - New Zealand

.pk - Pakistan

Domain Name Resolution is the process of getting corresponding IP address


from a domain name.

Web Server :- A web server is server software, that can satisfy client requests
on the World Wide Web The basic objective of the web server is to store, process
and deliver web pages to the users. This intercommunication is done using
Hypertext Transfer Protocol (HTTP).

Example: Apache web server,Microsoft IIS(internet information services)

When client sends request for a web page, the web server search for the
requested page if requested page is found then it will send it to client with an
HTTP response. If the requested web page is not found, web server will the send
an HTTP response :Error 404 Not found.

Web Hosting :- Web hosting is an online service that enables you to publish
your website or web application on the internet. When you sign up for a hosting
service, you basically rent some space on a server on which you can store all
the files and data necessary for your website to work properly.

A server is a physical computer that runs without any interruption so that your
website is available all the time for anyone who wants to see it.

 Shared Hosting is perfect for entry-level website hosting. This is where


your website will be stored on the same server as multiple other websites.
With a shared hosting plan, all domains share the same server resources,
STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 14
Lucknow Public School(A C.P Singh Foundation)
such as RAM (Random Access Memory) and CPU (Central Processing Unit).
However, because all resources are shared, the cost of shared hosting
plans are relatively low,
 Dedicated hosting gives website owners the most control over the server
that their website is stored on. That’s because the server is exclusively
rented by you and your website is the only one stored on it. This means
that you have full root and admin access, so you can control everything
from security to operating system that you run.

However, all that control comes with a price.

 Cloud hosting is the current buzzword of the technology industry. In


regards to web hosting, it means many computers working together,
running applications using combined computing resources. It’s a hosting
solution that works via a network and enables companies to consume the
computing resource like a utility.

Web Browser :- A web browser web client application that navigates WWW
and access and display webpages. Common web browsers include Microsoft
Internet Explorer, Google Chrome, Mozilla Firefox, and Apple Safari.

Plug-ins:- a plug-in is a software component that adds a specific feature to


an existing computer program. When a program supports plug-ins, it enables
customization. Plug-ins are commonly used in Internet browsers but also can
be utilized in numerous other types of applications.

Browser plug-in (such as Macromedia Flash or Apple QuickTime) allows you to


play certain multimedia files within your Web browser.

Add-ons : An add-on is a software extension that adds extra features to a


program. It may extend certain functions within the program, add new items to
the program's interface, or give the program additional capabilities. "Add-on"
can refer to anything that extends the functions of an application like a browser.
There are three types: extensions, themes, and plug-ins.

Example:Google docs add-on,Google form add-on.

Cookies :- Cookies are small files which are stored on a user’s computer and
contains information like which Webpages visited in the past, logging details
Password etc. They are designed to hold a modest amount of data specific to a
particular client and website and can be accessed by the web server or the
client computer.
STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 15
Lucknow Public School(A C.P Singh Foundation)

MCQ

1) A __________ is a set of computers that can be interconnected by one or more


transmission paths.
a) Network b) Topology c) ftp d) IP Address
2) A computer that facilities the sharing of data, software and hardware resources on
the network is called_________.
a) Client b) Dump Terminal c) Printer d) Server
3) _________ refers to the ways in which the nodes of a network are physically
connected together.
a) Network Device b) Network Topologies c) Wireless Network d) Bluetooth
4) Advantages of networks are:-
a) Sharing Resources b) Sharing Software c)Sharing Storage d) All of These
5) A 6 bytes of address with each byte separated by a colon, which refers to:
a) MAC Address b) IP Address c) Domain Name d) url
6) How we can trace a computer on worldwide network by?
a) Domain Name b)IP Address c) Mac Address d) NIC
7) What is the unique thing is assigned to a website?
a) IP address b) Domain Name c) URL d) Both B & C
8) _________ refers to the process of obtaining corresponding IP address from a
domain name:
a) Domain Name Resolution b) Domain Name

c) URL d) Media Access Control Address

9) A small network that are confined to a localised area i.e. building, office, school etc.
a) LAN b) WAN c) WWW d) Network Topology
10) In which topology a single cable is used, through which all data propagates and
which all nodes are connected are:-
a)Ring Topology b) Tree topology c) Bus topology d) Star topology
11) Which topology is designed with each node connected directly to the server via Hub
or Switch:
a) Ring Topology b) Tree topology c) Bus topology d) Star topology
12) Which is the device that sends the data directly to the computer rather than
everywhere within the network.
a) Repeaters b) Switch c) Hub d) Routers

13) Which device that amplifies a signal being transmitted on the network?

a) Repeaters b) Switch c) Hub d) Routers

14) The cable Television network is a example of:

a) LAN b) WAN c) MAN d) PAN

15) Sahil of Class X is sending some media files on Sajal’s mobile over Bluetooth ,
which type of networks he formed by them:

a) LAN b) WAN c) MAN d) PAN

16) Which of them is not an Internet Service?

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 16


Lucknow Public School(A C.P Singh Foundation)

a) E-mail b) TelNet c) Video Chatting d) Photo Morphing

17) A special type of cable i.e. CAT 5 or CAT 6, used in specific type of LAN is
_______

a) USB Cable b) Optical Fiber c) VGA Cable d) Ethernet Cable

18) Which transmission media guarantees a secured transmission?

a) Telephone cable b) Radio Waves c) Coaxial Cable d) Fiber Optics

19) Which transmission offers mobility?

a) Micro wave b) Radio Wave c) Coaxial Cable d) Telephone Cable

20) In which transmission, Line of sight occurs?

a) Micro wave b) Radio Wave c) Coaxial Cable d) Telephone Cable

21) Which are the examples of Unguided Media (Wireless)?

a) Infrared b) Laser c) Bluetooth d) All of these

22) The network devices that amplifies and restores the signal for long distance
transmission?

a) Repeaters b) Switch c) Hub d) Routers

23)The Network Device that is connected to connect two dissimilar networks?

a) Repeaters b) Switch c) Gateway d) Routers

24) A system that is designed to prevent unauthorized access to or from a private


network is:

a) Firewall b) Proxy Server c) Bridge d) Router

25) Which Network Device works on MAC addresses& follows the same protocol to
connect different LAN segments?

a) Bridge b) Router c) Gateway d) Switches

26) Which Network Device works on IP Addresses& handle different protocols to


connect multiple networks?

a) Bridge b) Router c) Gateway d) Switches

27)Which of the following are the types of computer Networks?

a) LAN, WAN, NAN b) WAN, ring,star, bus

c) Social Network d) PAN, Internet, LAN, WAN

28) Which of the following in not a list of computer topologies?

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 17


Lucknow Public School(A C.P Singh Foundation)

a)star, bus, ring b) star, ring , graph

c) Common bus, double ring, hexagon d) ring, mesh, star, bus

29) Which network topologies has a central device, which brings all the signals
together?

a) Bus b) star c) ring d) hybrid

30) Which network topologies require terminators at the end of lines?

a) Ring b) bus c) star d) mesh

31) What topologies provides each device with a point to point connection to every
device in the network?

a) Hierarchical b) bus c) star d) mesh

32) On a network, this is your computer’s unique hardware number.

a) IP address b) Mac Address c) IMEI Number d) SIM

33) How we can protect a computer from common security threats:

a) Installation of antivirus b) Regular updating of Operating System

c) Firewall Setup d) all of these

34) Neha is confused about this address 00:A3:03:51:0E:AC , which type of


address is this?

a) IP address b) Mac Address c) URL d) Domain Address

35) Most commonly used Search Engine ?

a) Google b) You tube c) Opera Mini d) Mozilla

36) KV Agra is planning to connect all computers, each spread over distance
within 40 meters. Suggest an economical cable type having reasonable high
speed data transfer, which can be used to connect these computers:

a) Ethernet Cable b) Coaxial Cable c) Fiber Optics d) USB Cable

37) Which of the following unit measures the speed with which data can be
transmitted from one node to another node of a network?

a)Mbps b)kmph c)MGps d) mph

38) Mrs. RiyaSahay wants to prevent unauthorized access to/from his company’s
local area network. Write the name of the system, which he should install to do
the same.

a) Gateway b) Firewall c) Router d) Bridge

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 18


Lucknow Public School(A C.P Singh Foundation)

39) Which of the following is not a feature of a networking?

a) Resource sharing b) Uninterrupted Power supply

c) Reduced cost d) Reliability

40) Why would you prefer Switch over Hub?

a) High Speed b) Communication with full Bandwidth

c) Data packets d) all of these

41) Numbered address ( 4 parts separated by periods) of a server is called its


____________.

a. URL b. IP Address c. Web Address d. Domain name

42) _____________ is said to be the future of Internet.

a. Intranet b. Andriod c. Interspace d. Web drives

43) _____________ is most reliable topology.

a. Mesh b. Bus c. Ring d. star

44) _____________ is used to access and display webpages.

a. HTTP b. FTP c. PPP d. SMTP

45) _____________ is used for sending emails

a. SMTP b. IMAP c. POP d. HTTP

46) In URL http://www.yahoo.com/home.htm _______ is domain name.

a. home.htm b. http c. yahoo.com d. www

47) _____________ is to login a computer from different location.

a. Telnet b. TCP c. POP d. HTTP

48) _____________ is web client program.

a. web browser b. thunderbird c. POP d. HTTP

49) _____________ is example of web server.

a. Apache b. IIS c. Mysql d. a and b

50) An ____________ is a device/circuit that enables a computer to connect to


a network and communicate.

a. WIFI b. NIC c. Modem d. hub

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 19


Lucknow Public School(A C.P Singh Foundation)

Important Solved exercises


1.(a) Give two examples of PAN and LAN type of networks.
Ans: PAN: i)Connecting two cell phones to transfer data ii) Connecting
smartphone to a smart watch
LAN: i)Connecting computers in an office ii)Connecting computers in a school

(b) Which protocol helps us to browse through web pages using internet
browsers ? Name Ans any one internet browser.
Ans: Protocol: HTTP OR TCP/IP Browser:
Chrome OR Internet Explorer OR Firefox OR OPERA OR SAFARI
(c) Write two advantages of 4G over 3G Mobile Telecommunication Technologies
in terms of speed and services.
Ans: 4G: Speed approximately 100 mbps . LTE True mobile broadband
3G: Speed approximately 2 mbps . Data services with multimedia
(d) Write two characteristics of Web 2.0.
Ans: Makes web more interactive through online social media ● Supports easy
online information exchange ● Interoperability on the internet ● Video sharing
possible in the websites

(e) Identify the type of topology on the basis of the following:


a. Since every node is directly connected to the server, a large amount of
cable is needed which increases the installation cost of the network.
b. It has a single common data path connecting all the nodes.
Ans: a. Star Topology b. Bus Topology

(f)Daniel has to share the data among various computers of his two offices
branches situated in the same city. Name the network (out of LAN, WAN, PAN and
MAN) which is being formed in this process.
Ans MAN
(g)Write any 1 advantage and 1 disadvantage of Bus topology.
Ans: Advantage: Since there is a single common data path connecting all the
nodes, the bus topology uses a very short cable length which considerably reduces
the installation cost.
Disadvantage: Fault detection and isolation is difficult. This is because control of
the network isnot centralized in any particular node. If a node is faulty on the bus,
detection of fault may have to be performed at many points on the network. The
faulty node has then to be rectified at that connection point.
(h). What is HTTP?
Ans: HTTP is a protocol that is used for transferring hypertext(i.e.
text,graphic,image,sound,video,etc,) between 2 computers and is particularly used
on the World Wide Web (WWW).

(i). Explain the importance of Cookies.


Ans : When the user browses a website, the web server sends a text file to the
web browser. This small text file is a cookie. They are usually used to track the
pages that we visit so that information can be customised for us for that visit.

(j) Differentiate between FTP and HTTP.


Ans FTP is a protocol to transfer files over the Internet
HTTP is a protocol which allows the use of HTML to browse web pages in the World
Wide Web.
STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 20
Lucknow Public School(A C.P Singh Foundation)

(k) Out of the following, which is the fastest (i) wired and (ii) wireless medium of
communication?
Infrared, Co‐axial Cable, Ethernet Cable, Microwave, Optical Fiber
Ans (i) Wired – Optical Fiber (ii) Wireless ‐ Infrared OR Microwave

(l)Assume that 50 employees are working in an organization. Each employee has


been allotted a separate workstation to work. In this way, all computers are
connected through the server and all these workstations are distributed over two
floors. In each floor, all the computers are connected to a switch. Identify the type
of network?
ANS: LAN(Local Area Network)

(m) Ms. Ivana, a leading marketing professional working in a multinational


company, is most of the time on move to cater her profession demands. Although
she carries her laptop with her all the time but many a times she require to take
some data from her office PC. She has to make several requesting phone calls to
her colleague Ms. Barbara to send her required documents from her office PC.
Suggest her any one popular software name so that she can herself remotely
access her office PC anytime from anywhere.
Ans: Team Viewer or telnet

(n) Write the URL of any one e-Governance website.


Ans: India.gov.in

(o) International Tour and Travels company has set up its new branch office in
aipur where different buildings are spanned over in the radius of 900 meter in
Jaipur. Name the network formed in the following situations :
(i) The branch office is connected with the regional office in New Delhi.
(ii) All the buildings of branch office are connected to each other.
Ans: (i) WAN (ii)LAN

(p)ABC Company wants to link its computers in Head office in New Delhi to its office
inSydney. Name the type of Network that will be formed. Which communication
media should be used to form this Network?
ANS: Type of network that will be formed : Wide Area Network(WAN)
Transmission media to be used : Satellite

(q)Which of the following is/are not communication media ?


(i) Microwaves (ii) Optical Fiber cable (iii) Node (iv) Radio waves
Identify which of the above mentioned communication media are Wired media and
which ones are Wireless media.
Ans: Not communication media : Node
Wired media : Optical Fiber cable
Wireless media : Microwaves , Radio waves

(r)Write one examples each of software in the following categories:


(i) Open Source Operating System (ii) Open Source Web Browser
Ans: (i) Linux (ii)Mozilla firefox
(s)Name the devices:
(i) This device constantly looks at all the data entering and exiting your
connection.It can block or reject data in response to an established rule.
(ii) This device connects multiple nodes to form a network. It redirects the received
STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 21
Lucknow Public School(A C.P Singh Foundation)

information only to the intended node(s).


ANS: i) Firewall ii) Switch

(t) What do the following top level domains signify ?


(i) .com (ii) .org
Ans (i) .com – Commercial (ii) .org – Organization

(u) List 2 measures to secure a network.


ANS Measures to secure a network are: Use of
(i) Login-Password (ii) Firewall (iii) Anti Virus Software (iv) File
permissions

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 22


Lucknow Public School(A C.P Singh Foundation)
CASE STUDY BASED:

(j) Uplifting Skills Hub India is a knowledge and skill community which has an aim to
uplift the standard of knowledge and skills in the society. It is planning to setup its
training centers in multiple towns and villages pan India with its head offices in the
nearest cities. They have created a model of their network with a city, a town and 3
villages as follows.
As a network consultant, you have to suggest the best network related solutions for
their issues/problems raised in (i) to (iv) keeping in mind the distances between
various locations and other given parameters.
Shortest distances between various locations :

Note :
• In Villages, there are community centers, in which one room has been given as
trainingcenter to this organization to install computers.
• The organization has got financial support from the government and top IT
companies.
(i) Suggest the most appropriate location of the SERVER in the B_HUB (out of the
4 locations), to get the best and effective connectivity. Justify your answer.
(ii) Suggest the best wired medium and draw the cable layout (location to
location) to efficiently connect various locations within the B_HUB.
(iii) Which hardware device will you suggest to connect all the computers within
each location of B_HUB ?
(iv) Which service/protocol will be most helpful to conduct live interactions of
Experts from Head Office and people at all locations of B_HUB ?

STUDY-MATERIAL/XII-IP/2020-21 Prepared by : Gajendra S Dhami 23

You might also like