You are on page 1of 42

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |1

CHAPTER-10: COMMUNICATION & NETWORK CONCEPTS


(WEIGHTAGE: 10 MARKS IN BOARD EXAMS)
Computer Network:-
It is an interconnection of geographically distributed computers with each other in order
to share data and resources.

Need of Networking
1. Exchange of information
2. Sharing of resources such as printer, memory, CPU, etc.
3. Backup of information in case one computer fails.
4. Reduction in operating cost

THE INTERNET:-
 It is a world-wide network of large and small networks around the globe.

 It allows all the computers in a network to exchange information with each other using
a common set of rules called PROTOCOLS.

 The Internet works on TCP/IP protocol.

HOW DOES INTERNET WORK?

The Internet works as follows:

1. At source computer, the message to be sent is first divided into very small parts called
Packets using a TCP(Transmission Control Protocol).

2. Each packet is given a serial no. and destination address is marked on them using
IP(Internet Protocol).

3. The destination computer receives data packets in random order and then they are re-
assemble again in order of their serial no. to form the original message using TCP again.

WHAT IS INTERSPACE?
Interspace is a client/server software program that allows multiple users to communicate
online with real-time audio, video and text chat in dynamic 3D environments.It is the future
of internet.

TYPES OF NETWORKS:-
1. Local Area Network(LAN)
2. Metropolitan Area Network(MAN)
3. Wide Area Network(WAN)
4. Personal Area Network (PAN)

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |1
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |2

LAN

1. It is a group of computers located in same room, on the same floor or in the


same building or in the same campus.
2. It can cover an area of up to 2 km.
3. Uses twisted pair wire or coaxial cable.
4. Less error prone.
5. LAN operates at speeds between 1 to 10 Mbps.

MAN

1. It is limited to an area of up to 50-60kms. It is used to interconnect different


LAN's in a city.
2. Use coaxial cable or microwave links.
3. MAN operates at speeds lower than LAN.

WAN

1. It is spread across the cities or even country and may cover whole world when
distance is large (>60kms). It is collection of several LANs.
2. It uses satellite communication or telephone lines as transmission medium.
3. Because of large distances, WANs operate at less speed of less than 1 Mbps.
4. No limit of distance between the nodes.
5. More chances of loss of data.

PAN

1. It is a computer network for interconnecting PCs, laptops, smartphones & other


gadgets located within a room.
2. It is spread within a distance of 10 meters.
3. It uses wireless media such as Bluetooth and Wi-Fi for interconnection.

TYPES OF NETWORKS BY COMPONENT ROLES

PEER-TO-PEER (P2P) NETWORKS CLIENT-SERVER NETWORKS


1. Also called as Home Networks for use in Also called as Master-slave networks.
small offices.
2. There is no dedicated-server that is in There is one Server which controls
charge of network operations. Each node network operations such as sharing files
can act as a client or as a Server. and devices and other computers act as
clients.
3. They are inexpensive and easy to install. There are expensive and difficult to
install.
4. They are not very secure. They are highly secure.

Wired Computer Networks Wireless Computer Networks


1. Nodes are interconnected through Nodes are interconnected through
wires or cables. wireless media.
2. Wires used are- Media used are- Bluetooth, Wi-Fi,
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |2
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |3

Twisted pair, coaxial and fibre-optic infrared, satellite, etc.


3. Are mostly LAN type Can be of LAN or WAN type.

Transmission Media:
A transmission medium is a medium of data transfer over a network. It can be wired or
wireless.

Wired Media or Guided Media or Bounded Media


 A number of various types of cables are used to transfer data over computer
networks.

 These are Twisted Pair Cable, Co-axial Cable, and Optical Fibre Cable.

Twisted Pair Cable –

 It contains four twisted pairs covered in an outer shield. These pairs are colour
coded.

 Mostly used in home and office Telephone Wiring.

 An RJ-45 connector is used to connect this cable to a computer.

 It is of two types:
(i) UTP (Unshielded Twisted Pair):

As the name suggests in UTP cables individual pairs are not shielded.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |3
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |4

Characteristics of UTP cable:


 It is a low-cost cable available for setting up small networks.

 It is a thin (External diameter app. 0.43cm) and flexible cable and therefore it offers
ease of installation.
 It can carry data up to a length of 100m at a stretch.
(ii) STP (Shielded Twisted pair): It is the same cable as the UTP, but with
each pair shielded individually. An outer
shield then covers all the pairs like in
UTP.

Characteristics of STP cable:

 As compared to UTP, STP offers better


immunity against internal and
external electromagnetic interference.
 It is expensive than UTP cable.

 As compared to UTP cable, STP cable is difficult to install.

Advantages of Twisted Pair Disadvantages of Twisted Pair


1. can be used for both analog and digital 1. speed of data transmission is low upto 10
transmission. Mbps.
2. it is least expensive media for short distance 2. It is capable of carrying a signal over a short
transmission. distance upto 100m without the use of
repeaters(amplifiers).
3. . if portion of twisted pair cable is damaged, 3. Less durable and also susceptible to
the entire network is not shut down(while it interference
may be the case in coaxial cable).

Co-axial cable (or coax) –


 A coaxial cable consists of two conductors that share a common axis.
 The inner conductor is a straight wire and the outer conductor is a shield that might
be braided or a foil.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |4
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |5

Advantages Disadvantages
1. Expensive communication media as
1. It can carry data for a larger distance compared to Twisted pair(TP).
(185m - 500m) at a stretch.
2 it can carry a signal over long distance at 2. Bulkier and less flexible as compared to
higher speed.(upto 100 Mbps) Twisted pair(TP).
3. has a higher bandwidth in the range of 300 – 3. Difficult to install.
400 MHz.
4. More durable and resistant to interference

Optical Fiber cable -

 Optical Fibers are long, thin strands of glass about the thickness of a human hair.
 They are arranged in bundles called optical fiber cables and used to transmit data
through light signals over long distances.

An optical fiber has following parts:


Core - It is the thin glass rod at the center through which the light travels
Cladding - It is the outer optical material surrounding the core that
reflects the light back into the core
Buffer coating - It is the plastic coating that protects the cable from damage
and moisture
Advantages Disadvantages
1. Higher bandwidth upto 1 Million 1. Expensive communication media as
bits per second compared to Twisted pair(TP) and coaxial
cable

2 it can carry a signal over long 2. Difficult to install and quite fragile
distance without loss of data.
3.Highly secure 3. Need special tools and methods for
Installation.
4. More durable and resistant to
interference

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |5
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |6

Wireless Media
 Only radio waves, microwaves, and infrared rays are used for wireless
communication.
 Frequencies of waves are measured in Hertz (Hz).
Radio Waves -
 Radio waves have a frequency range of 3 KHz to 3GHz.
 Radio waves are used for communication over distances ranging from a few
meters (in walkie-talkie) up to covering an entire city.
 These waves are easy to generate and can travel long distances.
 They are best suitable for hilly areas as it can penetrate obstacles such as
mountains, trees, buildings easily.
 That's why they are widely used for communication, both indoors and
outdoors.
 Cordless phones, AM and FM radio broadcast, Garage door openers etc.
are examples of radio wave transmission.

Advantages Disadvantages
These waves are omnidirectional i.e. can 1. not highly secure.
be transmitted in any direction.
Can penetrate obstacles such as 2. need of special signalling equipment.
buildings, mountains, etc. easily.
The transmitting and receiving antennas The transmission can be interfered by
need not be aligned. motors or other electrical equipment
Easy to generate and can travel long Permission from concerned
distances. authorities is required for use of
radio wave transmission
No need of antennas and repeaters.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |6
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |7

Micro Waves –

 Micro waves have a frequency range of 300MHz (0.3 GHz) to 300 GHz.
Microwaves travel in straight lines and cannot penetrate any solid object.

 Therefore for long distance microwave communication, high towers are


installed and microwave antennas are put on their tops.

Characteristics of Micro Wave Transmission:

 Relatively inexpensive than wired media


 The transmission is in straight lines so the transmitting and receiving
antennas need to be properly aligned ( line of sight transmission)

Infrared Waves

 Infrared waves have a frequency range of 300 GHz to 400 THz.


 Infrared waves are so called because they have a frequency range of just less than
that of red light.
 These waves are used for short range communication (approx. 5m) in a
variety of wireless communications, monitoring, and control applications.

 Home-entertainment remote-control devices, Cordless mouse, and


Intrusion detectors are some of the devices that utilize infrared
communication.
Characteristics of Infrared Wave Transmission:
 No government license is required for their use.
 It is a line of sight transmission, therefore at a time only two devices can
communicate.
 The waves do not cross any solid object in between.

Bluetooth -

 Bluetooth technology uses radio waves in the frequency range of 2.402 GHz to 2.480
GHz.

 This technology is used for short range communication (approx. 10m) in a variety of
devices for wireless communication.

 Baby monitors, door openers, and cell phones are some of the devices that utilize
Bluetooth communication.

Characteristics of Bluetooth Transmission:

 Line of sight between communicating devices is not required.


 Bluetooth can connect upto eight devices simultaneously.
 Slow data transfer rate (upto 1Mbps).

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |7
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |8

Satellite Link –

 Satellite links are used for very long distance wireless communication which may
range from intercity to intercontinental.

 Transmission from the earth to a satellite is known as uplink.

 Transmission from a satellite to the earth is known as downlink.

Characteristics of Transmission using satellite link:

 Satellites cover large area of earth


 This system is expensive.
 Requires legal permissions.

Network Topology:-
The physical arrangement of computers in a network is called Topology.
Bus Topology
 All nodes share a common cable/wire to receive and transmit data.

 At the end of cable, a device called “terminator” is attached to absorb the


signals.

Advantages Disadvantages
1. Short cable length is required 1. difficult to detect and correct fault.
because of common data cable.
2. Low installation cost and easy to 2. use of additional devices(repeaters) is
layout and maintain. required in case the cable length is more.
3. Additional nodes can be connected 3. In case if cable or terminator fails, the
at any point using repeaters. entire network breaks down.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |8
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |9

4. Failure of one node does not affect 4. Network traffic is more so more
the network. chances of data loss.

Star Topology
1. In this, all nodes are connected to a central device called Switch/Hub.

Advantages Disadvantages
1. one device per connection therefore if 1. Large cable length is required because
one node fails it may be easily detached. each node is separately connected to
switch.
2. Easy to detect & correct faults. 2. Installation cost is more.

3. Network traffic is very less. 3. if central switch fails, the entire network
fails.

Ring Topology
1. In this each node is connected to two other nodes to form a ring or a circle.
2. One node takes data from other node and gives it to adjacent node. Thus data
travels in one direction only.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |9
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 10

Advantages Disadvantages
1. Short cable length is required because of 1. failure of one node cause the failure
less connection. of the entire network
2. Low installation cost and easy to layout and 2. Difficult to detect and correct fault.
maintain.

3. Additional nodes can be connected at any 3. Difficult to attach and detach


point nodes.

4. Every node gets the chance to transmit


creating a very “fair” LAN.

Tree Topology

1. It is modified form of Bus topology.


2. In this, several nodes may be connected to a single node. The top most node is called
as “root” node and other nodes are called as “child” nodes.
3. Data is transmitted throughout all the branches of a tree and are received by all
stations.

Advantages Disadvantages
1. Easy to detect and correct fault. 1. failure of root node cause the failure of
the entire network
2. Easy to connect additional nodes. 2. High installation cost and difficult to
layout and maintain.

Mesh Topology:

 In mesh topology there is more than one path of communications


between nodes.
 Each node is connected to more than one node.
 It is based on Point-to-Point network. (multi-path connection)

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 10
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 11

Advantages Disadvantages
1. Easy to detect and correct fault. 1. Installation cost is high.
2. Suitable for long distance 2. Large cable length is required.
networking.
3. It is highly reliable and secure. 3. Bulk wiring is required.
NETWORK DEVICES /HARDWARE:-

1. NIC(Network Interface Card / Unit) or Ethernet Card:

(i) It is a device that connects computer to a network.


(ii) Also called as TAP(Terminal Access Point)
(iii) Each NIC CARD has a unique address (alpha-numeric) which uniquely
identifies it in a network. This address is called MAC(Media Access Control)
address. It is given by NIC manufacturer.
(iv) MAC address is a 6-byte address with each byte separated by a colon divided
into 6 parts.
The first 3 bytes are manufacturer-id and last 3 bytes are card no.
e.g.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 11
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 12

2. Hub/Switch
(i) Are network devices mainly used to connect several computers with each other in a
network.
(ii) They contain multiple ports.
(iii)They transmit data in the form of frames.

Difference between Hub and Switch (Very Important)


 In a hub, a frame is "broadcast" to every computer in a network. The hub has no
way of distinguishing which port a frame should be sent to. This places a lot of
traffic on the network and degrades performance by dividing bandwidth. It can
cover distance from 300ft to 1000ft at a speed of 10Mbps.
 In a switch, when a frame is received, it knows exactly which port to send it to,
without significantly increasing network traffic. Unlike hub, switch will allocate full
bandwidth to each of its ports. This upgrades the performance.
 It can cover distance from 300ft to 2000ft at a speed of 10 to 100Mbps.
 Switch is also called Intelligent Hub.

Types of Hubs:-
(i) Active Hub :- can amplify the weak signals along the network. These can
be used like repeaters to extend the length of network.

(ii) Passive Hub: - They are used to pass signals from one computer to
another without amplifying them. These cannot be used as repeaters.
5. Repeater:-
(i) It is a device used to amplify an incoming signals and
retransmit it to the destination
(ii) It does not perform any error checking on signal.
(iii) It functions on the Physical layer of OSI model.
(iv) They are mostly used when distance between the
sender and receiver is 70m or above.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 12
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 13

6. Router:-

(i) It is a device that connects two or more networks of similar type.


(ii) Its job is to read the destination address on the packet and decide
the best possible route to send them to destination node.
(iii) They are expensive and relatively slow and suitable for large
companies and WAN’s.
(iv) They operate on Network Layer of OSI model.

7. Gateway:-

(i) Similar to a Router but connects two dissimilar types of network


(ii) It serves as an entrance point to another network.
(iii) The gateway also operates at Network
Layer(Layer-3) of OSI Model(like
Router).

8. Bridge:-

(i) A bridge is a network device that connects one LAN segment to another LAN
segment that uses the same protocol.
(ii) Mainly used to reduce the Network Traffic on LAN.
(iii) Bridges operate at the Data Link Layer(Layer-2) of OSI Model.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 13
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 14

9. Modem :-

(i) Stands for Modulator-Demodulator.


(ii) MODEM enables a computer to transmit
data over telephone or cable lines by
converting digital signals into analog
(Modulation) and Analog into Digital (De-
Modulation).
(iii) Mainly used to connect Digital Devices
with an Internet.
(iv) Modem can be of 2 types:-
(a) Internal Modems – that are fixed within the computer.
(b) External Modems – that are connected externally to a computer

10. WAP(Wireless Access Point) OR WI-FI HOT SPOT

It is a device that connects different devices on wireless LAN with a


fixed wire network and it then broadcast wireless signals.

11. RJ-45 Connector-


 It is short for Registered Jack-45.

 It is an 8-wire connector used to connect computers on LAN


especially Ethernet LANs.

 It looks similar to 4-wire RJ-11 connector which is standard


telephone connector but it is wider than RJ-11.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 14
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 15

Data Transmission Switching Techniques:- (Very Important)


What is Switching?
It means selecting the path to transmit data from source to destination and
then directing the data down that path.
It is of 3 types:-
1. Message switching
2. Packet switching
3. Circuit switching

Message Switching:-
1. In this, an entire message is transmitted to a destination. No exclusive path is
required to get the message from point A to point B.

Advantages:-

1. Good use of network resources.

Disadvantages:-

1. Requires large disk space.

2. costly

Packet Switching:-
1. In this, long messages are divided into small parts called packets. Their size may
range from 600 bytes to 4000 bytes.
2. Each packet contains source and destination address and may take a different path
through the network.
Advantages:-
1. It is faster because messages are not stored for later use.

2. Packets are transmitted through free and clear paths therefore no loss.

Disadvantages:-
1. There has to be some mechanism to decide from which path the packets should be
transmitted.

Circuit Switching:-
1. In this, a physical path or a link is created for data transmission between sender
and receiver in advance.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 15
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 16

2. End-to-End path is set up between the computers before any data can be sent.

Advantages:-
1. Reliability of transfer because no other devices are using that path.

2. Dedicated communication channel between sender and receiver.

Disadvantages:-
1. Overhead is required to create physical pathway.
2. It takes time to put all the links in place to complete the circuit.

DATA COMMUNICATION TERMINOLOGIES


1. Data Channel:- is the medium through which data or signal is carried from
one point to another. Also called as Transmission Channel.

2. Bandwidth :-

 It is the difference between the highest and lowest frequencies of transmission


channel.

 Frequency is measured in Hertz.(i.e. cycles per second).

 Bandwidth is typically measured in bits per second (bps). Commonly used


larger units are Kilo-bits per second (Kbps), Mega-bits per second (mbps) and
Giga-bits per second (Gbps).

 “Wider the bandwidth, the more data it can transmit in a given period of time.

3. Data Transfer rate – is the amount of data transfer per second. It is measured
in Kbps(Kilo bits/second) or mbps (Mega bits/second).

4. Baud:- is also a unit used to measure the speed of data transfer, now replaced by
term bits per second(bps), Kbps, mbps, gbps.

Q. What are Network Protocols?


Ans:-
A network protocol is a set of rules that governs the
communication between the devices in a network.
Q. Explain most common protocols.
Ans:-
1. HTTP- Hypertext Transfer Protocol
 HTTP is used to control the transfer of hypertext from one web page to another.
 Hypertext is created using HTML.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 16
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 17

 It is based on client-server principle.

2. FTP – File Transfer Protocol


 It controls the transfer of files between computers on internet.
 It works on client-server principle.
 The process of transferring a file from internet to local computer is called Downloading
and from local computer to internet server is called Uploading.

3. TCP/IP - Transmission Control Protocol / Internet Protocol:


 It is the main protocol on which the entire working of internet depends.
 TCP breaks the large message into small packets and reassemble it again at receiver
end.
 IP puts the source and destination address on each packet and determine the size of
each packet.

4. SLIP– Serial Line Internet Protocol


 It allows a computer to use Internet Protocol with a standard voice-grade telephone
line and a high speed modem over dial-up lines.
 It is an older protocol that is now replaced by PPP(point-to-point protocol).

5. PPP – Point-to-Point Protocol


 It allows computer to use TCP/IP and to be connected directly to net using a
standard voice-grade telephone line and a high speed modem over serial lines.
 It offers error correction and supports multiple network protocols
simultaneously.
 In India, VSNL uses PPP.

6.SMTP – Simple Mail Transfer Protocol


 It is used to only send e-mails to the server but not to receive them.

7.IMAP – Internet Message Access Protocol


 It is used to receive emails from the server.
 The emails are held for the user by the server. Only if user requests to read a
specific email message then only it will be downloaded from the server.

8.POP3 – Post Office Protocol 3


 It is also used to receive emails from the server.
 All the emails are downloaded from the server to the user’s computer.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 17
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 18

Q. Differentiate between WIRELESS and MOBILE COMPUTING.


Wireless Computing means transfer of data between devices without the use of wires. The devices
NEED to be connected continuously to the base network.

Mobile Computing means transfer of data between the devices that are mobile in nature such as
smart phones, laptops, tablets, etc. The devices NEED NOT to be connected continuously to the
base network.

Q. Explain various technologies used for wireless and mobile computing.


Ans:- These technologies are:-
1. GSM – Global System for Mobile Communication
2. TDMA – Time Division Multiple Access
3. CDMA – Code Division Multiple Access
4. WLL – Wireless in Local Loop
5. GPRS – General Packet Radio Service
6. 1G, 2G, 3G, 4G, 5G Networks

1. GSM
 It is a digital cellular technology used for transmitting mobile voice and data services in
Europe, Australia and Asia for 2G networks.
 It can operate at frequency 900 to 1800 MHz.
 GSM uses SIM cards (Subscriber identity Module) that are small chips which stores data
and Phone Number.
 It also uses TDMA technology(Time Division Multiple Access).

2. TDMA
 It divides the radio frequency into time slots and then allocating slots to multiple channels.
 It can allow 8 simultaneous calls on the same radio frequency.

3. CDMA
 It uses spread-spectrum technology.
 Unlike TDMA, it does not assign a specific frequency to each user instead each channel
uses the full frequency any time
 Each user’s signal is spread over the entire bandwidth by a unique spreading code.
4. WLL
 Local loop is a circuit line from a subscriber’s phone to the local central office (LCO).
 It is mostly use in rural and remote areas to use wireless links for connection such as radio
links.
 It consists of a radio transceiver and WLL interface assembled in one metal box.
 Each user has a low power mini-station with telephone connection.
 The point-to-point signal transmission occurs.
Advantages of WLL:-
1. Best suited for rural and remote areas where there is less number of users.
2. Low installation cost.
3. It offers better bandwidth and high quality data transmission.
4. Easy installation.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 18
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 19

4. GPRS
 It is a packet switching system to transfer data in the form of packets whereas GSM
is circuit switching system.
 It can transfer data at a speed of 56Kbps to 110 Kbits.
 GPRS is used for video calling, Email accessing, multimedia messaging etc.

1G, 2G, 3G, 4G & 5G Networks (Very Important)


‘G’ stands for ‘generation’ of wireless technology.

1. 1G Network
 It is first analog cellular systems(NMT, C-Net, AMPS)started in early 1980’s.
 It supports only voice calls with no data services.
 The data transfer rate is 2 Kbps.
 It uses circuit switching technique.

2. 2G Network
 It is first digital cellular systems (GSM, CDMAOne)started in early 1990’s.
 It supports digital voice and SMS(Short Messaging Service).
 The data transfer rate is 14-16 Kbps.
 It also uses circuit switching technique.

3. 3G Network
 It is also a digital cellular network (CDMA, EDGE) started in late 1990’s.
 It supports high quality audio, video and data.
 The data transfer rate is 2 Mbps.
 It uses packet switching technique.

4. 4G Network

 The main advantage of 4G network over 3G is the rate of speed. It provides data
speed up to 100 Mbps.
 4G provides better video quality(FHDTV) than 3G.
 4G is entirely IP based, which means it uses internet protocols for video and audio
data.
 It also uses packet switching technique.
 Also referred to by term “MAGIC” which stands for Mobile Multimedia, Anywhere,
Global Mobility Solutions over, Integrated and Wireless and Customized Services.

5. 5G Network

 The main advantage of 5G network over 4G is the rate of speed. It provides data
speed up to 10 Gbps (Giga bits per second) which is 100 times faster than 4G.
 Low latency rate (about 1-millisecond)

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 19
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 20

 Higher device capacity (i.e. number of connected devices per unit area) as
compared with 4G.
 99.999% availability.
 100% coverage.
 90% reduction in network energy usage.

Q. List some other Mobile Communication Technologies.


Ans:-
1. LTE – Long Term Evolution
2. VoLTE – Voice Over LTE
3. X LTE-Advanced
4. WiMax / WiMax 2
5. EV-DO
6. HSPA
7. IMS

Q. Write short notes on above technologies.


Ans:-
1. LTE – Long Term Evolution
 LTE is sometimes referred to as 4G LTE.
 It is a standard for wireless data transmission.
 It allows you to download your favourite music, images and videos really fast than
you could with the 3G.
 It is OFDMA based 3GPP standard.
OFDMA - Orthogonal Frequency Division Multiplexing Access
3GPP - 3rd Generation Partnership Project)
 It has a download speed of 100Mbps and upload speed of 50Mbps.

2. VoLTE – Long Term Evolution


 It is a standard for voice calls over a 4G LTE network.
 VoLTE has up to three times more voice and data capacity than 3G and up to six
times more than 2G.
3. X-LTE – Long Term Evolution
 It is high-speed LTE data network that promises the "very best high-speed data
experience available on any wireless network.
 XLTE is a solution to address a problem network congestion as experienced by
other carriers:

4. HSPA
 Stands for High Speed Packet Access, is a 3G mobile broadband communication
technology.
 It is a combination of two mobile protocols –
(i) High Speed Downlink Packet Access (HSDPA) and

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 20
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 21

(ii) High Speed Uplink Packet Access (HSUPA)


 It supports download speed upto 14 Mbps and download speed upto 5.76 Mbps.
 An improved version of HSPA, known as Evolved HSPA(HSPA+) provides download
speed up to 84Mbps and download speed up to 22Mbps.
IMS
 Stands for IP Multimedia System.
 It is a architectural framework for delivering multimedia services such as voice,
video and text messaging over IP networks.
5. EV-DO / 1xEV-DO
 Stands for EVolution-Data Optimized and shorthand for CDMA2000.
 It is a CDMA based 3G technology developed by Qualcomm.
 It supports data speed up to 3.1 Mbps.

6. WiMax / WiMax2
 Stands for Worldwide Interoperability for Microwave Access.
 It offers a wireless broadband internet.
 It is based on the IEEE 802.16 set of standards.
 It supports data speed from 30Mbps to 1Gbps.
 It has two main components: A WiMax tower and a WiMax receiver.

Q. What are components of Mobile Processor?


Ans:-
1. CPU – Central Processing Unit
It receives commands, makes calculations and sends signals throughout the
device.
2. GPU – Graphics Processing Unit
It handles the visuals for games and applications.
3. Camera ISP – Image Signal Processor
It provides instant image capture, high resolution support, image stabilization, etc.
4. Radio-Frequency(RF) Transceiver and 3G/4G Modem
RF Transceiver receives and transmit voice signals and modem allows your phone
to send and receive digital signals over wireless networks.

Q. Give some examples of latest Mobile Processors.


Ans:-
1. Qualcomm Snapdragon – SD 712, 720, 720G, 730, 855, 855+, 865 and 865+
2. Apple - A12, A13 Bionic, A14 Bionic
3. Samsung - Exynos 9611, Exynos 990, 880
4. Mediatek – Helio G80, G85, G90, G90T, Dimensity 1000, 1000+, 800U
5. Honor – Kirin 650, 655, 935, 955, 960
6. Huawei - Kirin 990
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 21
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 22

Q. Write short notes on following:


1. SMS –
 Stands for Short Message Service.
 It is transfer of short text messages to and from a mobile phone and contain no
images or graphics.
 Once a message is sent, it is recived by SMSC (Short Message Service Centre)
which then sends it to the desired mobile.

2. CHAT –
 Online textual talk in a real time is called chatting.
 In chatting, you type a message on your screen which is immediately received by
the recipient and vice versa.

3. VIDEO CONFERENCING-
 It is two-way videophone conversation among multiple participants.
 It requires a multimedia PC with a webcam, video compression hardware, internet
access and a telephone line.
Q. Which protocol is used for chatting?
Ans:-
 The IRC (Internet Relay Chat) protocol is used for real-time chatting.
 It is a simple, text-based protocol that allow users to chat individually or in groups.
 It requires a Chat Server and Clients.

Q. Which protocol is used for Video Conferencing?


Ans:- Two protocols are used for video-conferencing:
(i) H.323
 H. 323 was the first VoIP standard to transport audio and video over IP networks.
 H. 323 is widely used in IP based videoconferencing, Voice over Internet
Protocol (VoIP) and Internet telephony.
(ii) SIP – Session Initiation Protocol
 The Session Initiation Protocol is a signalling protocol that enables the Voice
Over Internet Protocol (VoIP).
 It controls the messages sent between endpoints and managing the actual
elements of a call. SIP supports voice calls, video conferencing, instant
messaging, and media distribution.
Q. What is VoIP?
Ans:-
 Voice over Internet Protocol (VoIP), also called IP telephony, is a technology
that allows you to make voice calls using a broadband Internet connection
instead of a regular (or analog) phone line.
 VoIP services convert your voice into a digital signal that travels over the
Internet.
 VoIP can allow you to make a call directly from a computer, a special VoIP
phone, or a traditional phone connected to a special adapter.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 22
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 23

Q. How can you connect to internet wirelessly?


Ans:- In two ways:-
(i) Using Wi-Fi –
 Wi-fi refers to Wireless Fidelity.
 It allows you to connect to the internet without a direct line from your PC to your
ISP.
 For wi-fi to work, you need:
a) A broadband connection
b) A Wi-Fi (wireless) Router which relays wireless signals from DSL modem to
your PC.
c) A Laptop or Desktop with a wireless adapter (internal or external).

(ii) Using WiMax:


 Stands for Worldwide Interoperability for Microwave Access.
 It requires a tower called Base Station which is connected to internet using
high-speed wired connection.
 Internet Connectivity is provided to the user wirelessly using microwave link
known as WiMax Subscriber Unit.
 It can cover a distance of upto 50kms( a small city) for fixed stations and
 upto 15kms for mobile stations.

Q. What is Wi-Fi Hotspot?


Ans:-
 A Hotspot is a place that offers Wi-fi access free of cost or with a nominal fee.

 Anyone can use a laptop, a Wi-Fi Mobile, or other wi-fi devices to access the
internet.
 Hotspots are public locations such as Libraries, Airports, Hotels, Restaurants, etc.

Q. Write short notes on following terminologies:


(i) WWW –
 WWW stands for World Wide Web.
 WWW is a set of programs, standards and protocols governing the way in which
multimedia files (called as Hypertext) are created and displayed on internet using
HTTP Protocol (Hypertext Transfer Protocol).
 Hypertext is a combination of text, photographs, graphics, video and audio and
hyperlinks.
 It was created by Timothy Berners Lee in 1989 in Geneva.
 WWW gain its popularity with invention of HTML and text browser in 1990.

Difference between WWW and Internet


 Most people think that WWW is internet and vice-versa, which IS NOT TRUE.
 A large part of the Internet is the ‘World Wide Web’.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 23
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 24

 This is made up of websites that have one or more web pages and you probably use
the most of them.
 But, Internet isn’t just the webpages that you use everyday, It also consists of other
components like Forums, Usenet, etc
(ii) Telnet-
 It is a protocol that allows you to log on to remote computers (called hosts) over the
internet. It was created and launched in 1969.
 It gives a Character-based terminal window on another computer to login and execute
Telnet Commands.

(iii) Web Browser-


It is a program that lets you surf the web and view web pages. Also called as Web Client.
E.g. Google Chrome, Mozilla Firefox, Opera, Safari, etc.
(iv) Web Server-
 A web server is a computer that host websites. I
 It runs a web server program that delivers web pages to the clients as they are
requested.
 E.g Microsoft's Internet Information Server (IIS), Google Web Server (GWS), IBM’s
Server Domino, Apache Web server.
(v) Web Page-
 Web page is a document available on world wide web.
 Web Pages are stored on web server and can be viewed using a web browser.

 The top-level web page of a website is called HOME PAGE.


(vi) Web Portal-
 It is a website that hosts other websites.
 It is a especially designed website that provides a set of resources such as
Email, forums, search engines, etc. under one roof. E.g. Google, Yahoo,
Indiatimes.com, Khoj.com, etc.
(vii) Web Hosting-
 It is the process of uploading / saving the web content on a web server to make it
available on WWW.
 In case an individual or a company wants to make its website available on the
internet, it should be hosted on a web server.
Examples of Web Hosting Providers are: GoDaddy.com, BigRock.com, etc.

Types of Web Hosting:-


1. Free Hosting –
 It is a free non-paid web hosting service.
 There are many web hosts who provide subdomains to anyone free of cost who
want to make website.
 Examples:- Blogger, WordPress, Geocities, Tripod, etc.
 When you make your websites with these free website hosting services, your
website gets such name as <yoursite>.blogspot.com and
<yoursite>.wordpress.com.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 24
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 25

2. Virtual or Shared Hosting-


 Shared hosting is a type of web hosting where a single physical server
hosts multiple sites.
 Each user is provided his own domain name www.<yourname>.com or .in or
.org, etc.
 One can access and update his site 24x7 using Control Panel.

3. Dedicated Hosting -
 In this type of hosting, a dedicated server with dedicated resources is provided
to a single user.
 Mainly suitable for large companies such as Group of Schools, Big online mall
(Flipkart, Amazon),etc.

Q. What is Web 2.0?


Ans:-
 The term web 2.0 was given by O'Reilly Media in 2004.
 Web 2.0 refers to new generation of dynamic and interactive websites.
 Web 2.0 websites uses a new programming language called AJAX (Asynchronous
JavaScript and XML).
 AJAX helps the entire page does not get reloaded each time. This helps in making
the website interactive.
 Web 2.0 tools are available free and are widely used by following sites:
 Facebook
 WordPress
 YouTube
 Blogger
 Flickr
 Twitter

Q. What is HTML?
Ans:-
 (Hypertext Markup Language) is language the helps in creating and designing web
content.
 It is designed to display the data in formatted manner.
 A HTML document has the extension .htm or .html.
 Hypertext is a text which is linked to another document.

Q. What is XML?
Ans:-
 (EXtensible Markup Language) is a markup language like HTML. It is designed to
carry or store data.
 In contrast to HTML, it is not designed to display data.
 Unlike HTML, it does not have predefined tags. Tags are user-defined. XML is case
sensitive. XML is deigned to be self-descriptive.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 25
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 26

 XML is a W3C recommendation.


 XML documents form a tree structure.
For Example
<school> root element
<student> child element
<rollno>101</rollno>
<name>RAHUL</name> sub-child elements
<class>12</class>
</student>
</school>

Q. What is DHTML?
Ans:-
 It is used for designing the animated and interactive web pages that are developed
in real-time.
 DHTML helps users by animating the text and images in their documents.
It allows the authors for adding the effects on their pages such as the drop-down
menus or rollover buttons.

Q. What is Web Scripting?


Ans:-
 A scripting language is a programming language which can be embedded or
integrated with other languages.
 Examples are: JavaScript, VBScript, PHP, Perl, Python, Ruby, and ASP.
 It is used extensively to create dynamic web pages.

Q. What are different types of Web Scripting?


Ans:- 2 types:-
Client-Side Scripting Block of code executed by web browser (client) before the
page is submitted by the user. Examples:- VB Script and Java
Script
Server -Side Scripting Block of code executed by Web Server after the page is
submitted by the user.
Examples:- ASP,JSP, PHP

Q. What is Firewall?
Ans:-
1. A firewall is hardware or software based network security system. It prevents
unauthorized access (from hackers, viruses, worms etc.) to or from a network.
2. Firewalls are used to prevent unauthorized internet users to access private networks
connected to the Internet.

3. All data entering or leaving the Intranet pass through the firewall, which examines
each packet and blocks those that do not meet the specified security criteria.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 26
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 27

Q. What are Cookies?


Ans:-
1. When the user browses a website, the web server sends a text file to the web browser.
2. This small text file is a cookie.
3. They are usually used to track the pages that you visit and remember your preferences
for future use.

Q. Differentiate between Hacker and Cracker.


Ans:-
 A Hacker is a computer enthusiast, who uses his computer programming skills to
intentionally access a computer without authorization.
A hacker accesses the computer without the intention of destroying data or
maliciously harming the computer.

 Crackers are the malicious programmers who break into security systems with the
malicious intention of destroying data or harming the system.
Q. What is Cyber law?
Ans:-
Cyber law is the area of Law that deals with the Internet, the WWW, cyberspace,
netizens, electronic devices and their respective legal issues. It is the Law of the
Internet.
The first cyber law was the Computer Fraud and Abuse Act (CFAA), enacted in 1986.

Q. What is India’s IT Act?


Ans:-
The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is the
primary law in India dealing with cybercrime and electronic commerce.
Enacted by: Parliament of India
Commenced: 17 October 2000
This act was later amended in December 2008 through IT Amendment Act,2008
which includes the following amendments:
(i) Digital signatures get legal recognition
(ii) E-documents get legal recognition
(iii) The maximum penalty for any damage to computer system is a fine up to
Rs. 1crore.
(iv) Additional focus on Data Protection and Cyber Terrorism.

Q. What is Cyber Crime?


Ans:-

Any criminal offense that is carried out using any electronic device and internet is
referred to as Cyber Crime. It includes crimes like phishing, pharming, identity
theft, cyber bullying, cyber stalking, cyber terrorism, child pornography, etc.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 27
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 28

Q. Write short notes on following:

(i) Phishing –
Phishing is a method of trying to gather personal information using deceptive e-mails and
websites. The goal is to trick the email recipient into believing that the message is
something they want or need. For instance, a request from their bank or a company to
click on a link or download an attachment, etc.
(ii) Spoofing -
It refers to a fraudulent or malicious practice in which a hacker impersonates another
user in a network believing others that they are authentic.

(iii) Social Engineering or Pretexting -


It is act of posing as a legitimate or government officials to obtain personal
information from financial institutions, telephone companies and other sources.

(iv) Online Scams-


It is a type of fraud which makes use of the Internet by providing incorrect information
for the purpose of tricking victims out of money, property, and inheritance.

Example- Charity fraud, Internet ticket fraud, Online gift card fraud, online shopping
fraud.

(v) Illegal Downloads –

Refers to obtaining files for which don’t have the right to use or download from
internet.
Example: downloading a movie which is not available for free download, downloading
a copy of licensed software or an app illegally.
(i) Child Pornography –
Is defined as to produce and distribute any material (images, text, movies,
etc.) that depicts sexual activity of anyone under the age of 18(belong to child
category).
Information Technology Act, 2000 and Indian Penal Code, 1860 provides
protection from child pornography.
(ii) Hacking-
It refers to gaining unauthorized access to a network or computer to steal
data or to install malware. The person who does this is called Hacker.
Hacker exploits your computer or network security using various techniques
like Phishing, Spoofing, Social Engineering, etc.

(iii)Cyber Trolling and Cyber Bullying-


Cyber Trolling refers to the posting of Sarcastic, insulting and opposing
comments about something or someone online. The messages posted this
way are called Trolls and the persons involved are called Trollers.
It is a form of Cyber Bullying.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 28
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 29

Cyber Bullying refers to the process of defaming, harassing, insulting or


embarrassing someone using internet, cell phones, instant messaging,
chatting or social sites such as Facebook, Instagram, Twitter, etc.
Both come under Cyber Crime.

(iv) Cyber Stalking –


It is kind of online harassment wherein the victim gets stalked by the stalker
through online messages and emails.
Cyber stalker often does the following things:
(i) Collects all personal information about the victim such as name,
address, contact no., daily routine of the victim, place of work, date
of birth, etc.
(ii) He may post this information on obscene and illegal websites.
(iii) He may subscribe the email account of the victim to illegal websites.
(iv) He may blackmail the victim by sending repeated e-mails and by
repeated calls.
(v) He may follow the victim everywhere to keep track of victim’s activities.

Q. What do you mean by Intellectual Property Rights?


Ans: These are the rights of the owner of Information to decide how much information is
to be exchanged, shared or distributed.

Also it gives the owner the right to decide the price for doing so.

Q. What is Computer Virus?


Ans:-
 It is a malicious program that attaches itself to the host files or boot record of disks.
 The virus gets executed each time the host program is executed.
 They can spread through external media such as CDs,PD’s browsing infected internet
sites and mostly from email attachments.

Types of Viruses

File Virus: These viruses infect and replicate when it gets attached to MS-DOS program
files with EXE or COM extensions.

Boot sector virus: These viruses infect the boot sector of floppy disks or hard drives. Boot
sector of a drive contains program that participates in booting the system.

Macro virus: These viruses infect and replicate using the MS Office program suite, mainly
MS Word and MS Excel. The virus inserts unwanted words or phrases in the document.

Q. What damage a Virus can cause?


Ans:-
1. can destroy FAT(File Allocation Table) and corrupt the entire file system.
2. can create bad sectors on the disk.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 29
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 30

3. can decrease the space on hard disks by duplicating files.


4. can destroy specific executable files and alter data in data files.
5. can cause the system to hang.

Q. What is a Computer Worm?


Ans:-
1. Unlike viruses, it does not need to attach itself to a host but replicates itself and infect
files.
2. It is self-contained and do not require a host.

3. A worm scans the network for another machine that has a specific security hole.

4. It copies itself to the new machine using the security hole, and then starts replicating
from there as well.

5. Most worm disrupt services and create system management problems.

Q. What is Trojan Horse?


Ans:-
1. A Trojan horse is a code hidden in a program and performs malicious functions.
2. Trojan Horses trick users into installing them by appearing to be legitimate
programs, games or spreadsheets. Once installed on a system, they reveal their true
nature and cause damage.
3. Some Trojan horses will infect a central server and report back information such as
passwords, user IDs, and captured keystrokes.

4. Trojans does not replicate itself.

Q. What is Spam or Junk Mail? How can you avoid spams?


Ans:-
1. Unwanted messages or mails are known as Spam.
2. It is an unsolicited email that contains same message and send to large number of
addresses.
3. Most spam is commercial advertising. In addition to wasting people's time, spam also
eats up a lot of network bandwidth.

Avoiding Spams:-
1. By creating Spam Filters.
2. By not registering yourself with true email id to sign up for the things on an Internet.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 30
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 31

Q. What e-Banking or Online Banking or Internet Banking?


Ans:-
 It is a banking that can be done via internet enabled device.
 It includes making online payments, transferring funds, applying for loans. etc.
Q. What are the advantages and disadvantages of e-Banking?
Ans:-
Advantages Disadvantages
1. It is fast and efficient Challenging for novice persons
2. Available 24x7 Vulnerable to hacking
3. Can be done at our own Depends upon a reliable internet
convenience connection
4. Funds can be transferred
instantly via RTGS/NEFT

Q. Name some mobile banking apps.


Ans:-
1. Umobile – Union Bank of India app
2. Yono – SBI Bank app
3. iMobile – ICICI Bank app
4. M-Connect – Bank of Baroda app
5. Citibank IN – Citibank app
6. NGPay – HDFC Bank app

Q. What is e-Wallet?
Ans:-
 E-wallet is a electronic service used for payments.
 It is your own wallet from which you can use your own money in
electronic form.
 Some most popular e-wallets of today are: Paytm, Airtel Money,
Freecharge, Mobikwik, PhonePe, PayZapp, Pockets, etc.

STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 31
QUESTION BANK – COMPUTER NETWORKS (DIAGRAM-BASED)
SAMPLE QUESTION WITH RULES & ANSWERS
Q. MyPace University is setting up its academic blocks at Naya Raipur and is planning to set up a
network. The University has 3 academic blocks and one Human Resource Center as shown in the
diagram below:

Center to Center distances between various blocks/center is as follows:


Law Block to business Block 40m
Law block to Technology Block 80m
Law Block to HR center 105m
Business Block to technology Block 30m
Business Block to HR Center 35m
Technology block to HR center 15m
Number of computers in each of the blocks/Center is as follows: Law Block 15
Technology Block 40
HR center 115
Business Block 25
Answer the following questions:
a) Suggest the most suitable place (i.e., Block/Center) to install the server of this University with a
suitable reason.
Rule :
Always suggest the place where there are max. no. of computers.
Ans:- HR Center because it has max. no. of computers(i.e. 115)

b) Suggest an ideal layout for connecting these blocks/centers for a wired connectivity.
RULE:-
Inter-connect the buildings/blocks/wings/centres that have least distance in such a way so that data can
be transferred to all blocks/wings/buildings.
if there are 5 buildings then no. of connections should be 4.
if there are 4 buildings then no. of connections should be 3.
if there are 3 buildings then no. of connectiond should be 2.
then select those no. of connections with least distance from the table given. Draw the given layout in
answer copy and show the distances between the blocks.
Ans:-
30m
15m
40m
c) Which will be the most suitable topology? Give reason.
Rule/Ans: Always give this answer as STAR TOPOLOGY.
Reason:-
(i) Network traffic is very less because each node is connected via separate cable to the server.
(ii) Less loss of data.
(iii) Easy to attach and detach nodes.

d) Suggest the placement of following devices with justification:


(i) Switch/Hub
(ii) Repeater
(iii) Modem/Telephone/Internet Connecting Device
Ans:-
(i) Switch / Hub – always placed in each block/building/centre/wing.
Ans: in each block to interconnect all computers.

(ii) Repeater - is placed where distance between the blocks/wings/buildings is 70 metres or above.
NOTE: Always suggest the placement of repeater according to the cable layout drawn by you ant not
according to the distances given in the table.
Ans:- None as there is no distance more than 70m.

(iii) Modem/Telephone/Internet Connecting Device


Rule:- It is always placed where there are max. no. of computers.
Ans:- HR Center because it has max. no. of computers(i.e. 115)

e) The company is planning to set up its Admission Office in Nainital. Suggest suitable transmission
technology to interconnect offices at Naya Raipur and Nainital.Give reason.
Ans: Radiowave Transmission
Rule:-
 For hilly areas, it is RADIOWAVE TRANSMISSION because
(i) It is omni-directional (i.e. can transmit signals in any direction )
(ii) It can penetrate obstacles such as mountains, trees, buildings,etc.
 For plain areas where distance is very large(>1000km) then suggest Satellite communication.
 For plain areas where distance is less(in metres) then suggest twisted pair or telephone wires or
coaxial cables.

f) Suggest the most suitable economical technology to provide internet connectivity in all the blocks.
Rule:- Broadband for plain areas
Wifi or WiMax for hilly areas.
Ans:- Broadband
Reason:
1. It is cheaper.
2. The data transfer speed is fast and high.

g) The company want his employees to communicate the with employees of London Office for face-to-
face communication. Which internet service should be used by the office and also name the protocol.
Ans: Video Conferencing is used for Face-to-Face communication
Protocol is VoIP(Voice Over Internet Protocol)

h) Suggest the device/software to prevent unauthorized access of data to/from the company's network.
Ans:- Firewall is always used for data security.
g) The company wants internet accessibility in all the wings.Suggest a suitable device for secure internet
connectivity.
Ans:-
Router / Wifi Router is always used for spreading internet connection.

PRACTICE QUESTIONS
Q.1. SYMANTEC SOFTWARE caters to many high profile clients and has 5 buildings where it
runs its operations (shown below)

The distance between buildings are shown through in above diagram .


Number of computers in each building are
Building pro 55
Building graycell 185
Building wizard 60
Building robo 70
Building master 70
Answer the following questions on the basis of above given information.
I. Suggest the possible cable layouts for networking the buildings.
II. Where would you suggest the placement of server. Justify your answer,
III. Suggest the placement of hub/switch in the network.
IV. Suggest the placement of the following devices with justification:
i. Internet connecting Device/Modem
ii. Hub/Switch
iii. Repeater
V. Mention in economic technology to provide internet accessibility to all buildings.
Q.2. “Hindustan Connecting World Association” is planning to start their offices in four major cities in
India to provide regional IT infrastructure support in the field of Education & Culture. The
company has planned to set up their head office in New Delhi in three locations and have named
their New Delhi offices as “Sales Office”, “Head Office” and “Tech Office”. The company’s regional
offices are located at “Coimbatore”, “Kolkata” and “Ahmedabad”. A rough layout of the same is
as follows:
Approximate distances between these offices as per network survey team is as follows:
Place From Place To Distance
Head Office Sales Office 10 KM
Head Office Tech Office 70 Meter
Tech Office Sales Office 15 KM
Head Office Kolkata Office 1291 KM
Head Office Ahmedabad Office 790 KM
Head Office Coimbatore Office 1952 KM
In continuation of the above, the company experts have planned to install the following number of
computers in each of their offices:
Head Office 100
Sales Office 20
Tech Office 35
Kolkata Office 55
Ahmedabad Office 155
Coimbatore Office 250
(i) Suggest network type (out of LAN, MAN, WAN) for connecting each of the following set of
their offices:
i) Head Office and Tech Office ii) Head Office and Coimbatore Office
(ii) Which device will you suggest to be procured by the company for connecting all the computers
within each of their offices in New Delhi out of the following devices?
i) Modem ii) Telephone iii) Switch/ Hub
(iii) Which of the following communication media, will you suggest to be procured by the company
for connecting their local offices in New Delhi for very effective and fast communication?
i)- Ethernet Cable ii)- Optical Fiber iii)- Telephone Cable
(iv) Suggest a cable/ wiring layout for connecting the company’s local offices located in New Delhi.
Also, suggest an effective method/ technology for connecting the company’s regional offices at
“Kolkata”, “Coimbatore” and “Ahmedabad”.
(v) Suggest the most suitable place to install the server in New Delhi offices.
Q.3. Sunbeam Group of Institutions in Varanasi is setting up the network among its different branches.
There are four branches named as Bhagwanpur (BGN), Lahartara (LHT),
Varuna (V) and Annapurna (A).
Distance between branches are given below :

LHT Branch BGN to V 7 Km


BG
N Branch V to LHT 4 Km
Branch V to A 3 Km
Branch BGN to LHT 4 Km
Branch BGN to A 3.5 km
Branch LHT to A 1 km
V A
Number of computers in various Branches :

Branch BGN 137


Branch V 65
Branch A 29
Branch LHT 98
i) Suggest a suitable topology for networking the computer of all the branches.
ii) Name the branch where the server should be installed. Justify your answer.
iii) Suggest the placement of hub or switches in the network.
iv) Mention any economic way to provide internet accessibility to all branches.
v) Draw a cable layout of connecting various branches.
vi) Suggest the placement of repeater.
Q.4. Sunbeam Communications is planning to start their offices in various cities of India to provide
regional IT infrastructure support in the field of education. The company has planned to set up
their head office in Varanasi at three different locations and have named them as “Head office”,
“Tech office”, & “Sales office”. The company’s regional offices are located in Delhi, Mumbai &
Kolkata. A rough layout of the same is as follows :

Approximate distances between these offices :


Place from Place to Distance
Head office Sales office 15 KM
Head office Tech office 55 M
Head office Delhi Office 695 KM
Head office Mumbai Office 1398 KM
Head office Kolkata office 608 KM
Number of computers :
Head office 205
Sales office 152
Tech office 56
Delhi Office 85
Mumbai Office 187
Kolkata office 105
i) Suggest a suitable topology for networking the computer of all the local offices in Varanasi
and also suggest an effective technology for connecting company’s regional offices.
ii) Name the branch where the server should be installed. Justify your answer.
iii) Suggest the device to be procured by the company for connecting all the computers within
each of its offices.
iv) Mention any economic way to provide internet accessibility to all the local branches.
Q.5. Haldiram Private Ltd. has decided to network all its offices spread in five buildings of Company
(Shown below). No. of computers given in square brackets [ ].
The distance between buildings are given below:
Between 1 & 2 20 Mts Between 3 & 5 70 Mts
Between 2 & 3 50 Mts Between 1 & 5 65 Mts
Between 3 & 4 120 Mts Between 2 & 5 50 Mts
Between 4 & 5 30 Mts
(i) Suggest cable layout(s) for connecting the buildings.
(ii) Suggest the most suitable building to install the server of this organization with a suitable
reason, with justification.
(iii) The company also has another office in the same city but at a distant location about
25-30 kms away. How can link be established with this building. (i.e. suggest the transmission
medium).
Q.6. "China Middleton Fashion" is planning to expand their network in India, starting
with two cities in India to provide infrastructure for distribution of their product.
The company has planned to set up their main office units in Chennai at three
different locations and have named their offices as "Production Unit", "Finance Unit" and "Media
Unit". The company has its corporate unit in Delhi.

Approximate distances between these Units is as follows:


From To Distance
Production Unit Finance Unit 70 Mtr
Production Unit Media Unit 15 KM
Production Unit Corporate Unit 2112 KM
Finance Unit Media Unit 15 KM
In continuation of the above, the company experts have planned to install the
following number of computers in each of their office units:
Production Unit 150
Finance Unit 35
Media Unit 10
Corporate Unit 30
i. Suggest the kind of network required (out of LAN, MAN, WAN) for connecting
each of the following office units:
i. Production Unit and Media Unit
ii. Production Unit and Finance Unit
ii. Which one of the following devices will you suggest for connecting all the
computers within each of their office units?
Switch/Hub
Modem
Telephone
iii. Which of the following communication media, will you suggest to be procured
by the company for connecting their local office units in Chennai for very
effective (High Speed) communication?
Telephone Cable
Optical Fiber
Ethernet Cable
iv. Suggest a cable/wiring layout for connecting the company's local office units
located in Chennai. Also, suggest an effective method/technology for connecting
the company's office unit located in Delhi.

Q.7. “Bhartiya Connectivity Association” is planning to spread their offices in four major cities in
India to provide regional IT infrastructure support in the field of Education & Culture. The
company has planned to setup their head office in New Delhi in three locations and have named their
New Delhi offices as “Front Office”, “Back Office” and “Work Office”. The company has three more
regional offices as “South Office”, “East Office” and “West Office” located in other three major cities of
India. A rough layout of the same is as follows

Place From Place To Distance

BackOffice Front Office 10KM


Back Office Work Office 70 Meter
Back Office East Office 1291 KM
BackOffice West Office 790 KM
Back Office South Office 1952 KM
Number of computers in each of their offices :

Back Office 100


Front Office 20
Work Office 50
East Office 50
West Office 50
South Office 50
(i) Suggest network type (out of LAN, MAN, WAN) for connecting each of the following offices :
• Back Office and Work Office • Back Office and South Office
(ii) Which of the following communication medium, you will suggest to be procured by the
company for connecting their local offices in New Delhi for very effective and fast
communication?
• Telephone Cable • Optical Fiber • Ethernet Cable

(iii) Suggest a cable/wiring layout for connecting the company’s local offices located in New
Delhi. Also, suggest an effective method/technology for connecting the company’s regional
offices-”East Office”, “West Office” and “South Office” with offices located in New Delhi.
Q.8. A company in Mega Enterprises has 4 wings of buildings as shown in the diagram :

Center to Center distances between various Buildings:


W3 to W1 - 50m
W1 to W2 - 60m
W2 to W4 - 25m
W4 to W3 - 170m
W3 to W2 - 125m
W1 to w4 - 90m
Number of computers in each of the wing:
W1 - 150
W2 - 15
W3 - 15
W4 - 25
Computers in each wing are networked but wings are not networked. The company has now decided to
connect the wings also.
i. Suggest a most suitable cable layout for the above connections.
ii. Suggest the most appropriate topology of the connection between the wings.
iii. The company wants internet accessibility in all the wings. Suggest a suitable technology .
iv. Suggest the placement of the following devices with justification if the company wants minimized
network traffic.
a)Repeater
b)Hub / switch
v. The company is planning to link its head office situated in New Delhi with the offices in Mizoram.
Suggest a way to connect it economically.

Q.9. Multipurpose Public School, Bangluru is Setting up the network between its Different Wings of
school campus. There are 4 wings named as SENIOR(S), JUNIOR(J), ADMIN(A) and HOSTEL(H).
Multipurpose Public School, Bangluru.

Number of Computers installed at various wings are as follows:

(i) Suggest the best wired medium and draw the cable layout to efficiently connect
various wings of Multipurpose Public School, Bangluru.
(ii) Name the most suitable wing where the Server should be installed. Justify your
answer.
(iii) Suggest a device/software and its placement that would provide
data security for the entire network of the School.
(iv) Suggest a device and the protocol that shall be needed to provide wireless
Internet access to all smartphone/laptop users in the campus of Multipurpose Public
School, Bangluru.
Q.10. Rehaana Medicos Center has set up its new center in Dubai. It has four buildings as
shown in the diagram given below:

Distances between various buildings are as follows:

Number of Computers

As a network expert, provide the best possible answer for the following queries:
i) Suggest a cable layout of connections between the buildings.
ii) Suggest the most suitable place (i.e. buildings) to house the server of this organization.
iii)Suggest the placement of the following device with justification:
a) Repeater b) Hub/Switch
iv)Suggest a system (hardware/software) to prevent unauthorized access to or from the
network.
11. To provide telemedicine facility in a hilly state, a computer network is to be setup to connect
hospitals in 6 small villages (V1, V2, . . . , V6) to the base hospital (H) in the state capital. This is
shown in the following diagram.
No village is more than 20km away from the state capital.
Imagine yourself as a computer consultant for this project and answer the following questions:
(i) Out of the following what kind of link should be provided to setup this network:
(i) Microwave link (ii) Radio Link (iii) Wired link?
(ii) Give suitable reason for your answer.
(iii) What kind of network will be formed: LAN, MAN, or WAN?
(iv) Many times doctors at village hospital will have to consult senior doctors at the base hospital.
For this purpose, what could be the most feasible way ?- using email, SMS, telephone, or
video conferencing?
(v) Suggest a suitable place to install the Network Server.

You might also like