Professional Documents
Culture Documents
Types of Networking:-
1) Based on Network size (LAN, MAN, WAN)
2) Based on Topology (Bus, Star, Ring, Tree, Mesh)
3) Based on Transmission Media.
4) Based on Management Methode.
2) Based on Topology
Topology defines the structure of the network of how all the components are
interconnected to each other. There are two types of topology: physical and
logical topology.
Physical topology is the geometric representation of all the nodes in a network.
a) BUS Network Topology:- A bus topology is a topology for a Local Area Network
(LAN) in which all the nodes are connected to a single cable. The cable to which the nodes
connect is called a "backbone". If the backbone is broken, the entire segment fails.
Full Mesh: All hosts have a point-to-point connection to every other host in the
network. Thus for every new host n(n-1)/2 connections are required. It provides
the most reliable network structure among all network topologies.
सभी होस्ट का िेटवकक में हर दू सरे होस्ट से पॉइंट-टू-पॉइंट किेक्
क्शि होता है। इस प्रकार प्रत्येक िए
होस्ट के निए
n(n-1)/2 किेक्
क्शि की आवश्यकता होती है। यह सभी िेटवकक टोपोिॉजी के बीच सबसे नवश्वसिीय
िेटवककसंरचिा प्रदाि करता है।
Partially Mesh: Not all hosts have point-to-point connection to every other
host. Hosts connect to each other in some arbitrarily fashion. This topology
exists where we need to provide reliability to some hosts out of all.
आंनिक रूप से मेष: सभी मेजबािों का हर दू सरे मेजबाि से पॉइंट-टू-पॉइंट किेक्
क्शि िहीं
होता है। मेजबाि एक दू सरे से मिमािे ढं ग से जुड़ते हैं। यह टोपोिॉजी मौजूद है जहां
हमें कु छ मेजबािों को नवश्वसिीयता प्रदाि करिे की आवश्यकता है।
The choice to use a hybrid topology over a standard topology depends on the
needs of a business, school, or the users. The number of computers, their
location, and desired network performance are all factors in the decision.
1) Twisted pair cable:- A twisted pair is a wire in which two wires are twisted
(twisted) to each other. This wire is usually seen in Landline Telephone or
internet Connection Cable RJ45. Twisted Pair Cable is divided into 2 parts.
2) Coaxial cable
Coaxial cable is made of copper wire. There is a layer of Insulation over the
copper wire and copper copper above it. Its data transfer is up to 185 meters.
Installation of the coaxial cable is easy, but it is quite flexible and weak due to
which there was more fear of breaking it.
3) FOC (Fiber Optic Cable):- This cable is made of Pure Silica Glass, it was
developed in 1970. Fiber Optic Cable has revolutionized the world of Internet.
Today all the countries are connected to each other through internet, in which
Fiber optic Cable has a big role. Fiber Optic Cable is an Advanced
Transmission Media using high speed and long distance to data Is used to
transmit.
Client/Server Network:-
In client-server network relationships, certain computers act as servers and
others act as clients.
A server is simply a computer that provides the network resources and provides
service to other computers when they request it. A client is the computer
running a program that requests the service
from a server. Local area network (LAN) is
based on client server network relationship.
A client-server network is one on which all
available network resources such as files,
directories, applications and shared devices,
are centrally managed and hosted and then
are accessed by the client.
Client server networks are defined by the presence of servers on a network that
provide security and administration of the network.
You can do all of this by connecting a computer to the Internet, which is also
called going online. When someone says a computer is online, it's just another
way of saying it's connected to the Internet.
The Internet, then known as ARPANET, was brought online in 1969 under a
History of internet •
contract let by the renamed Advanced Research Projects Agency (ARPA) which
initially connected four major computers at universities in the southwestern US
(UCLA, Stanford Research Institute, UCSB, and the University of Utah).
WWW:- The world wide web ('www' or 'web' for short) is a collection of
webpage’s found on this network of computers. Your web browser uses the
internet to access the web.
The World Wide Web (WWW) is a network of online content that is formatted
in HTML and accessed via HTTP. The term refers to all the interlinked HTML
pages that can be accessed over the Internet. The World Wide Web was
originally designed in 1991 by Tim Berners-Lee while he was a contractor at
CERN. (French "Conseil Européen pour la Recherche Nucléaire", or European
AWeb
URLAddress
(UniformorResource
URL Locator) is a unique identifier used to locate a
resource on the Internet. It is also referred to as a web address.
इंटरिेट। DNS ड्ोमेि िामों को IP पतों में अिुवाद करता है तानक ब्राउज़र इंटरिेट
संसाधिों को िोड् कर सकते हैं।
• इंटरिेट से जुड़े प्रत्येक उपकरण का एक नवनिष्ट आईपी होता है पता जो अन्य मिीिें
नड्वाइस को खोजिे के निए उपयोग करती हैं। ड्ीएिएस सवकर मिुष्ों को IP याद रखिे की
आवश्यकता को समाप्त करते हैं 192.168.1.1 (आईपीवी4 में) जैसे पते
• Every device in the network has address. There are two types of network
Network
address Address
1- Physical Address 2-Logical Address
1- Physical Address
Media Access Control (MAC) Address –
• MAC Addresses are unique 48-bits hardware number of a computer, which is
embedded into network card (known as Network Interface Card) during the time
of manufacturing.
MAC Address is also known as Physical Address of a network device.
• MAC Address is a 12-digit hexadecimal number (6-Byte binary number),
which is mostly represented by Colon-Hexadecimal notation. First 6-digits (say
00:40:96) of MAC Address identify the manufacturer, called as OUI
(Organizational Unique Identifier).
• The rightmost six digits represent Network Interface Controller, which is
assigned by manufacturer.
IPv4 :- IP stands for Internet Protocol and v4 stands for Version Four (IPv4).
IPv4 was the primary version brought into action for production within the
ARPANET in 1983. IP version four addresses are 32-bit integers.
Classes of IPv4
IPv6
An IPv6 address is a 128-bit alphanumeric value that identifies an endpoint
device in an Internet Protocol Version 6 (IPv6) network. IPv6 is the successor to
Written by Mohammad Faiz (Education World) SHAAN CLASSES Page 12
a previous addressing infrastructure, IPv4, which had limitations IPv6 was
designed to overcome.
• Format of an IPv6 address
In precise terms, an IPv6 address is 128 bits long and is arranged in
eight groups, each of which is 16 bits. Each group is expressed as four
hexadecimal digits and the groups are separated by colons.
• An example of a full IPv6 address could be:
• FE80:CD00:0000:0CDE:1257:0000:211E:729C
IP address
What is IPstands for internet protocol address; it is an identifying number that
explain?
is associated with a specific computer or computer network. When connected to
the internet, the IP address allows the computers to send and receive
information.
यह एक पहचाि संख्या है जो एक नवनिष्ट कं प्यूटर या कं प्यूटर िेटवकक से जुड़ी
होती है। इंटरिेट से किेक्ट होिे पर, आईपी एड्र ेस कं प्यूटर को सूचिा भेजिे
और प्राप्त करिे की अिुमनत देता है।
HTML:-
HTML is Stands for "Hypertext Markup Language". HTML is the language
used to create web-pages. "Hypertext" refers to the hyperlinks that an HTML
page may contain. "Markup language" refers to the way tags are used to define
the page layout and elements within the page.
Hotof
Modes Spot
Connecting Internet
Wi-Fi
LAN Cable
Broad Band
USB Tethering
AHotspot
hotspot is a physical location where people can access the Internet, typically
using Wi-Fi, via a wireless local area network (WLAN) with a router connected
to an Internet service provider.
We can protect our hotspot Using protection like-WPS (WiFi Protected Setup)
and WPA (Wi-Fi Protected Access)
USB
USBtethering
Tetheringis a feature in your
Smartphone that makes you to connect
your phone to a computer via USB Cable.
USB Tethering allows the sharing of an
Internet connection of the phone or tablet
with other device such as laptop/computer
via USB Data cable.
AMetasearch
Meta-search engine
engineis an online information retrieval tool that uses the data of
a web search engine to produce its own results. Meta-search engines take input
from a user and immediately query search engines for results.
मेटाखोज इंजि नकसी जािकारी को इंटरिेट में खोजिे हेतु एक प्रकार का साधि है। इसके द्वारा यह ड्ाटा
को इंटरिेट के माध्यम से िे कर उसे नकसी भी जािकारी को खोजते समय नदखाता है। यह नकसी उपयोग
करिे वािे व्यक्ति से खोजिे वािे िब्द को
िेता है और कई अन्य खोज इंजि से पररणाम जुटाता है। यह उसके स्थाि के अिुसार ड्ाटा नदखाता है।
E-mail
Electronic mail (e-mail) is a computer-based application for the exchange of messages
between users. A worldwide e-mail network allows people to exchange e-mail messages
very quickly. E-mail is the electronic equivalent of a letter, but with advantages in
timeliness and flexibility.
The first e-mail was sent by Ray Tomlinson in 1971.
इिेक्टर ॉनिक मेि (ई-मेि) उपयोगकताकओं के बीच संदे िों के आदाि-प्रदाि के निए एक कं
प्यूटर आधाररत अिुप्रयोग है। एक नवश्वव्यापी ई-मेि िेटवकक िोगों को बहुत तेज़ी से ई-मेि
संदेिों का आदाि-प्रदाि करिे की अिुमनत देता है । ई-मेि एक पत्र के इिेक्टर ॉनिक समकक्ष है ,
िेनकि समयबद्धता और िचीिेपि में िाभ के साथ। पहिा ई-मेि 1971 में रे टॉमनिंसि
द्वारा भेजा गया था।
Log
How in Email
to send emailAccount
To-
What isitaisTO,
used
CC for&emailing
BCC inindividual
E-mail or multiple contacts.
CC – CC is stands for Carbon Copy. The CC field is used to refer to the
concept of the carbon copy as it sends additional copies of a single email to one
or more recipients.
CC का मतिब काबकि कॉपी है। सीसी फील्ड का उपयोग काबकि कॉपी की अवधारणा को
संदनभकत करिे के निए नकया जाता है क्ोनं क यह एक या अनधक प्राप्तकताक ओं को एक
ईमेि की अनतररि प्रनतयां भेजता है।
BCC:- BCC is stand for Blind Carbon Copy. It sends copies of the email to
multiple recipients, the only difference being that none of the recipients are
made aware of who else has received the email.
The BCC field is used when you want to send an email to multiple recipients
but do not want any of them to know about the other people you have sent them
to.
BCC,ब्लाइंड् काबकि कॉपी के निए खड़ा है। यह ईमेि की प्रनतयां कई प्राप्तकताक ओं
को भेजता है, के वि अंतर यह है नक नकसी भी प्राप्तकताक को इस बात से अवगत
िही ं कराया जाता है नक ईमेि नकसिे प्राप्त नकया है।
BCC फील्ड का उपयोग तब नकया जाता है जब आप एक से अनधक प्राप्तकताक ओं को
ईमेि भेजिा चाहते हैं, िेनकि िही ं चाहते नक उिमें से कोई भी उि अन्य
िोगों के बारे में जािे, नजन्हें आपिे उन्हें भेजा है।
Introduction to Blog
Whatever knowledge or experience you have, writing magazines or
articles to people on the Internet is called Blog and those who write blogs
are called Bloggers.
आपके पास जो भी नॉलेज या एक्सपीररयंस है उसको पधिका या लेख धलखकर इंटरनेट पर
लोगों को बताना Blog कहलाता है और जो Blog धलखते हैं उसे Blogger कहते हैं।
AWhat
one-time password, also known as a one-time PIN, onetime authorization
is OTP
code or dynamic password is a password that is valid for only one login session
or transaction on a computer system or other digital device.
AWhat
QR code is a Code
is QR type of matrix barcode invented in 1994 by the Japanese
automotive company Denso Wave. A barcode is a machine-readable optical
label that can contain information about the item to which it is attached.
What is UPI
Unified Payments Interface is an instant real-time payment system developed by
National Payments Corporation of India facilitating inter-bank peer-to-peer and
person-to-merchant transactions. NPCI (National Payments Corporation of
India) is umbrella organization for all digital payments.
• The AEPS system aims to empower all sections of the society by making
AEPS (Aadhaar Enabled Payment System)
financial and banking services available to all through Aadhaar. AEPS is
nothing but an Aadhaar-enabled payment system through which you can
transfer funds, make payments, deposit cash, make withdrawals, make enquiry
about bank balance, etc.
USSD
USSD(Unstructured Supplementary Service Data) is a Global System for
Mobile Communications (GSM) protocol that is used to send text messages.
USSD is similar to Short Message Service (SMS). USSD uses codes made up of
the characters that are available on a mobile phone.
USSD एक प्रोटोकॉि है नजसका उपयोग GSM सेिुिर टेिीफोि द्वारा सनवकस प्रोवाइड्र
के कं प्यूटरो ं के साथ संपकक करिे के निए नकया जाता है। USSD Code * से िरू
होता है और # पर ख़त्म होता है जैसे *121# । USSD Codes 182 वणो (characters) तक
िम्बे होते है।
The
POS point of sale
(Point OforSale)
point of purchase is the time and place where a retail
transaction is completed. At the point of sale, the merchant calculates the
amount owed by the customer, indicates that amount, may prepare an invoice
for the customer, and indicates the options for the customer to make payment.
Net
NetBanking,
Banking also known as online banking or Internet Banking, is an electronic
payment system. It allows you to conduct many different types of transactions
through the internet from the comfort of your home.
RTGS
RTGS का पूरा िाम ( Real Time Gross Settlement ) है. RTGS पैसे टर ांसफर करिे की सबसे
तेज सेवा है । जहााँ आपको NEFT से पैसे प्राप्त करिे में समय िगता है वही RTGS के
माध्यम से 30 नमिट के अन्दर पैसे आपके खाते में पहुाँ च जाते है.
RTGS का इस्तेमाि बड़ी रकम यानि 2 िाख से ऊपर की रकम भेजिे के निए नकया जाता
है। यनद नकसी कारण पैसे दु सरे के अकाउं ट में िही ं पहुाँ चते तोह सारी रकम आपके
अकाउं ट में वापस भेज दी जाती
है। RTGS सेवा का िाभ कोई भी व्यक्ति नजसका बैंक में खाता है उठा सकता है बस
आपको बैंक से एक RTGS फण्ड टर ांसफर का फॉमक िेकर भरिा पड़ता है.
IMPS is a mode of money transfer from one bank account to another in the
Immediate Payment Service (IMPS)
Indian banking system. The system enabled 24x7x365 real-time, interbank,
electronic money transfers when there was only NEFT and RTGS facilities
available in India.
IMPS, NPCI (िेििि पेमेंट कॉरपोरे िि ऑफ इंनड्या (द्वारा एक आसाि मिी टर ांसफर
सेवा
है। IMPS का पूणक रूप तत्काि भुगताि सेवा है जो िोगों को वास्तनवक समय में
पैसे भेजिे और प्राप्त करिे की अिुमनत देता है। यह सेवा मोबाइि बैंनकं ग और
इंटरिेट बैंनकं ग के माध्यम से एक बैंक से
दू सरे बैंक में टर ांजेक्
क्शि की सुनवधा प्रदाि करती है।
IFFERENCE BETWEEN NEFT RTGS AND IMPS
What is Big Data यह समझिा नबल्कु ि आसाि है, उदाहरण के तौर पर आपसे यह पूछा जाए नक आप
BigभरData
नदि Analytics
में मोबाइि का उपयोग नकतिी देर करते हैं आपका जवाब होगा नक कम से कम चार
पांच घंटा तो यूज़ करते हैं इस चार-पांच घंटे के यूज़ में आप जो भी dataचाहे वह
facebook या twitter या अन्य माध्यमों से save करते हैं वह data फे सबुक या अन्य सॉफ्टवेयर
कं पनियों के server में save होता है,आपके जैसे िाखों
िोग यही काम करते हैं, इसी ड्ाटा को हम नबग ड्ाटा कह सकते हैं इस ड्ाटा को
सॉफ्टवेयर कं पनियां big data technology का उपयोग करके प्रोसेस करके इसका उपयोग
उपयोगकताा व्यवहार
धवश्लेषण और product marketing में उपयोग में िाती हैं.
“Big data analytics is a process in which very large groups of data are
collected, organized and analyzed so that hidden patterns and useful
information can be discovered.”
Cloud
CloudComputing
Computingmeans to store your data on the internet instead of
storing it in a computer hard drive. When you keep the data in local
storage ie hard drive, then you can access it only from your computer.
But data stored on servers like Google drive can be access from any
device anywhere.
Blockchain is a technology,
What is blockchain ? it is a platform where not only digital currency but
anything can be digitized and its record can be kept. That is, blockchain is a
digital ledger, while bitcoin is a digital medium, through which some things can
be sold and bought.
ब्लॉकचेि एक टेक्नोिॉजी, यह एक प्लेटफॉमक है जहां िा नसफक नड्नजटि करें सी बल्की नकसी भी चीज
को नड्नजटि बिाकर उसका ररकॉड्क रखा जा सकता है. यािी ब्लॉकचेि एक नड्नजटि िेजर हैं, वहीं
Bitcoin एक नड्नजटि माध्यम है, नजसके जररए कु छ चीजें बेंची और खरीदी जा सकती हैं.
Or
Blockchain is a shared, immutable ledger that facilitates the process of
recording transactions and tracking assets in a business network. An asset can
be tangible (a house, car, cash, land) or intangible (intellectual property,
patents, copyrights, branding). Virtually anything of value can be tracked and
traded on a blockchain network, reducing risk and cutting costs for all involved.
रोबोनटक प्रोसेस ऑटोमेिि, रूपक सॉफ्टवेयर रोबोट या आनटक नफनियि इंटेनिजेंस/नड्नजटि वकक सक पर
आधाररत
नबजिेस प्रोसेस ऑटोमेिि तकिीक का एक रूप है। इसे कभी-कभी सॉफ्टवेयर रोबोनटक्स के रूप में
जािा जाता है।
Cyber Security
Cyber security is the application of technologies, processes and controls to
protect systems, networks, programs, devices and data from cyber attacks.
It aims to reduce the risk of cyber attacks and protect against the unauthorized
exploitation of systems, networks and technologies.
साइबर सुरक्षा नसस्टम, िेटवकक , प्रोग्राम, नड्वाइस और ड्े टा को साइबर हमिों से बचािे के
निए
प्रौद्योनगनकयो, प्रनियाओं और नियंत्रणों का अिुप्रयोग ह।ै
इसका उद्दे य ययसाइबर हमिों के जोक्तखम को कम करिा और नसस्टम, िेटवकक और
प्रौद्योनगनकयों केअिनधकृ त िोषण से बचाव करिा है।
Securing PC
• Use a firewall.
• Keep all software up to date. •
फायरवॉि का प्रयोग करें ।
सभी सॉफ्टवेयर अप टू ड्ेट रखें।
• Use antivirus software and keep it current. • एं टीवायरस सॉफ़्टवेयर का उपयोग
करें और इसे चािू रखें।
• Make sure your passwords are well- • सुनिनित करें नक आपके पासवड्क अच्छी
तरह से चुिे गए और सुरनक्षत हैं।
chosen and protected. • संदेहास्पद अटैचमेंट ि खोिें या
• Don't open suspicious attachments or click असामान्य निंक पर क्तक्लक ि करें
संदेि।
unusual links in messages. •
•
वेब को सुरनक्षत रूप से ब्राउज़ करें ।
पायरे टेड् सामग्री से दू र रहें।
• Browse the web safely.
• Stay away from pirated material.
Keep Your Phone Locked. 1) अपिे फोि को िॉक रखें।
Securing
Set mobile
Secure Passwords. 2) सुरनक्षत पासवड्क सेट करें ।
3) अपिे नड्वाइस के OS को अप-टू-ड्े ट रखें।
Written by Mohammad Faiz (Education World) 4) सुरनक्षत वाईफाई से किेक्ट करें ।
5) ड्ाउििोड् से सावधाि रहें। 4
6) अपिे फोि को जेिब्रेक या रूट ि करें ।
3) Keep Your Device's OS Up-To-Date.
4) Connect to Secure Wifi.
5) Beware of Downloads.
6) Don't Jailbreak or Root Your Phone.
7) Encrypt Your Data.
8) Install Anti-Virus Software.