Computer Science
Class XII
ARPANET : The seeds of todays Internet were planted in 1969, when U.S. Department of
Defence sponsored a project named ARPANET(Advance Research Projects NETwork) with
a goal to connect computers at different universities and U.S. defence. In mid 80s, federal
agency, the National Science Foundation, created a new, high-capacity network called
NSFnet. NSFnet allowed only the academic research on its network. It was the Inter
networking i.e. linking of these two and some other networks (i.e., the ARPANET, NSFnet
and some private networks) that was named Internet.
ii) INTERNET: The Internet is a worldwide network of computer networks that evolved from
the first network ARPANET. Internet is made up of many networks each run by a different
company and interconnected at peering points. The common use of Internet standards ( set
of rules called protocols ), allows users connected to one network to communicate and
exchange information with users on another network.
iii) INTERSPACE: Interspace is a client/server software program that allows multiple users to
communicate online with real-time audio, video and text chat in dynamic 3D environments. It
provides the most advanced form of communication available on the internet today. It is the
vision of what the internet will become.
Different ways of sending data across the network - Switching Techniques:
i) Circuit Switching: In this technique, first the complete physical connection between two
computers is established and then data is transmitted from the source computer to the
destination computer. This technique is to setup an end-to-end path between the computers
before any data can be sent.
ii) Message Switching: In this technique, the source computer sends data or the message to
the switching office first, which stores the data in its buffer. It then looks for a free link to
another switching office and then sends the data to this office. This process is continued
until the data is delivered to the destination computer. Its working principle is also known as
store and forward. There is no limit on block size.
Iii) Packet Switching: Packet switching places a tight upper limit on block size, unlike message
switching where there is no limit on the block size. A fixed size of packet which can be
transmitted across the network is specified. Another point of its difference from message
switching is that the data packets are stored on the disk in message switching whereas in
packet switching, all the packets of fixed size are stored in main memory. This improves the
performance as the access time is reduced, thus the throughput of the network is improved.
Twisted Pair Cable: The most common form of wiring in data communication application is
the twisted pair cable. It consists of two identical wires wrapped together in a double helix.
Main advantages of twisted pair cable are: it is simple, easy to install and maintain, is
physically flexible, has a low weight, can be easily connected and is very inexpensive.
Despite having such advantages, there are some disadvantages also. The data
transmission characteristics of twisted pair cable is not so good. Because of high
attenuation, it is incapable of carrying a signal over long distances without the use of
repeaters. Its low bandwidth capabilities make it unsuitable for broadband applications. It
support maximum data rates of 1 MBPS without conditioning and 10 MBPs with
conditioning.
b) Coaxial Cable: This type of cable consists of a solid wire core surrounded by one or more
foil or wire shields, each separated by some kind of plastic insulator. The inner core carries
the signal, and the shield provides the ground. The coaxial cable has high electrical
properties and is suitable for high speed communication. It is widely used for television
signals. In the form of (CATV) cable, it provides a cheap means of transporting multichannel television signals around metropolitan areas. Major advantages includes higher
bandwidths- up to 400 MBPS and be used for broadband transmission i.e., several channels
can be
transmitted simultaneously (as with cable TV). Disadvantages: It is expensive
compared to twisted pair cables and are not compatible with twisted pair cables.
c) Optical Fibers: Optical fibers consist of thin strands of glass or glass like material which are
so constructed that they carry light from a source at one end of the fiber to a detector at the
other end. The light sources used are either light emitting diodes (LEDs) or laser
diodes(LDs). The data to be transmitted is modulated onto the light beam using frequency
modulation techniques. The signals are then picked up at the receiving end and
demodulated. The band width of the medium is potentially very high.
The fiber cable consists of three pieces: (i) The core i.e., the glass or plastic through which
the light travels.(ii) the cladding, which is a covering of the core that reflects light back to
Wireless media :
NETWORK DEVICES:
NIC : Any computer which has to be a part of the computer network must have an NIC ( Network
Interface Card/ Unit ) installed in it. A computer communicates with other computers on the
network with the help of NIC only.
MODEM: A modem is a computer peripheral that allows you to connect and communicate with
other computers via telephone lines. A modem changes the digital data from the computer into
analog data, a format that can be carried by telephone lines. In a similar manner, the modem
receiving the call then changes the analog signal back into digital data that the computer can
digest. This is called modulation/demodulation. 3 types of modulation techniques are used: AM
(Amplitude Modulation), FM(Frequency Modulation), PM(Phase Modulation)
ROUTER: : A router is a networking device, that forwards data packets between computer
networks. This creates an overlay internetwork, as a router is connected to two or more data
lines from different networks. When a data packet comes in one of the lines, the router takes the
address of its ultimate destination and directs the packet to the next network on its journey.
WAN
1. Span entire countries.
2. Data rate less than 1 Mbps
3. Owned by multiple organisation.
4. Comparatively higher error rates.
Advantages
Bus Topology
Economic as compared to other
topologies of network
Simple Architecture
Tree Topology
Faster as compared to Bus
Topology
Easier to set-up for multi-floor
plans of network
Star Topology
Faster communication as
compared to Bus topology
Independent line of connection
allows freedom of removing or
adding nodes from the network
Bus Topology
Tree Topology
Star Topology
Disadvantages
Y
Receive
Transmit
5. SMS (Short Message Service): is the transmission of short text messages to and from a
mobile phone, fax machine and/or IP address. Once a message is sent, it is received by
Short Message Service Center (SMSC), which must then get it to the appropriate mobile
device. To do this, the SMSC sends a SMS request to the home location register (HLR) to
find the roaming customer. Once the HLR receives the request, it will respond to the SMSC
with the subscribers status: 1) Inactive or active 2) where subscriber is roaming. Simple
Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-mail)
transmission across Internet Protocol (IP) networks. While electronic mail servers and
other mail transfer agents use SMTP to send and receive mail messages, user-level client
mail applications typically only use SMTP for sending messages to a mail server
for relaying. For receiving messages, client applications usually use either the Post Office
Protocol (POP) or the Internet Message Access Protocol (IMAP) or a proprietary system
(such as Microsoft Exchange or Lotus Notes/Domino) to access their mail box accounts on a
mail server.
6. Email : is basically short for electronic mail i.e., messages sent & received electronically by
computer. It is an extremely cost-effective way to move information around quickly and
reducing the clutter of paper in the office
7. Voice Mail : refers to e-mail systems that support audio. Users can leave spoken messages
for one another and listen to the messages by executing the appropriate command in the email system.
8. Chat: Online textual talk, in real time, is called Chatting.
Viruses: It is a software program capable of reproducing itself and usually capable of causing
great harm to files or other programs on the same computer. A virus is a software program
designed to infect, destroy or interfere with a computer or software program. Viruses are
able to replicate, require host program as a carrier and are activated by external action.
Viruses can destroy file allocation tables(FAT) and lead to the corruption of the entire file
system. They can create bad sectors on the disk and decrease the space on hard disks by
duplicating files. They are also capable of destroying executable files and alter data, leading
to the system failure.
Worms : A computer worm is a self-replicating malware computer program. It uses a computer
network to send copies of itself to other nodes (computers on the network) and it may do so
without any user intervention.
Trojan Horse: A Trojan is a program that appears to be legitimate, but in fact does something
malicious. Unlike viruses, a Trojan does not replicate (i.e. infect other files), nor does it make
copies of itself as worms do. They generally spread through e-mail and exchange of disks
and information between computers.
Cookies: A cookie is a message given to a Web browser by a Web server. The browser stores
the message in a text file. The message is then sent back to the server each time the
browser requests a page from the server. The main purpose of cookies is to identify users
and possibly prepare customized Web pages for them. When you enter a Web site using
cookies, you may be asked to fill out a form providing such information as your name and
interests. This information is packaged into a cookie and sent to your Web browser, which
stores it for later use. The next time you go to the same Web site, your browser will send the
cookie to the Web server. The server can use this information to present you with custom
Web pages.
Hackers and Crackers: Hacker is a slang term for a computer enthusiast, i.e., a person who
enjoys learning programming languages and computer systems and can often be
considered an expert on the subject(s). The Crackers are the malicious programmers who
break into secure systems whereas Hackers are more interested in gaining knowledge for
playful pranks.
India IT Act : In India, the cyber laws are contained in the Information technology Act, 200
which was notified on 17 October 2000. It aims to provide the legal infrastructure for ecommerce in India by governing the transactions through the Internet and other electronic
medium. It states that :
An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as
"electronic commerce", which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with the
Government agencies and further to amend the Indian Penal Code, the Indian Evidence
IPR issues: Intellectual property (IP) refers to creations of the mind: inventions, literary and
artistic works, and symbols, names, images, and designs used in commerce. IP is divided
into two categories: Industrial property, which includes inventions (patents), trademarks,
industrial designs, and geographic indications of source; and Copyright, which includes
literary and artistic works such as novels, poems and plays, films, musical works, artistic
works such as drawings, paintings, photographs and sculptures, and architectural designs.
Rights related to copyright include those of performing artists in their performances,
producers of phonograms in their recordings, and those of broadcasters in their radio and
television programs.
Spam: Spam is flooding the Internet with many copies of the same message, in an attempt to
force the message on people who would not otherwise choose to receive it. Most spam is
commercial advertising, often for dubious products, get-rich-quick schemes, or quasi-legal
services.
VIRUSES
Computer virus is a malicious program that requires a host and is designed to make a system
sick. Just like a real virus, viruses can spread from computer to computer, and they can
replicate themselves. Some viruses are categorized as harmless pranks, while other are far
more malicious. Broadly there are three type of viruses1 File infectors attach themselves to a program file
2 Boot sector viruses install themselves on the beginning tracks of a hard drive.
3 Macro viruses- Infect data files
Most viruses are spread by e-mail attachment and warn them to be suspicious of any files
attached to unsolicited messages
The following are characteristics of a computer virus:
1.it is able to replicate.
2.it requires a host program as a carrier.
3.it is activated by external action .
4.its replication ability is limited to the system
Suggest the suitable topology for networking the computers of all the wings.
Star topology can be used to network the computer of all wings.
ii) Name the wing where the server is to be installed. Justify your answer.
Ans. The server should be installed in Wings S, as Wing S has maximum number of
computer and installing the server in this wing will help to reduce the network
traffic.
iii) Suggest the placement of the hub / switch in the network.
Ans. Hub / Switch will be required in all the Wings.
iv) Mention an economic technology to provide an internet accessibility to all the
wings.
Ans. The economic way to provide internet accessibility to all wings is to use the proxy
server at wing S and connect to the internet through a dial-up network.
Q2. The Cyber Mind Organisation has set up its new Branch at Mizoram for its office
and web based activities. It has a Wings of buildings as shown in the diagram:
Wing
Z
Wing
Y
WingU
U
Wing
X
60 m
135 m
70 m
165 m
80 m
50
130
40
15
i)
Suggest a most suitable cable layout of connections between the Wings and
topology.
ii) Suggest the most suitable place (i.e., Wing) to house the server of this
organization with a suitable reason with justification.
iii) Suggest the placement of the following devices with justification:
(1) Repeater
(2) Hub / Switch
iv) The organization is planning to link its head office situated in Delhi with the
offices as Mizoram. Suggest an economic way to connect it; the company is
ready to compromise on the speed of connectivity. Justify your answer.
Ans : i) Bus topology
Wing
Z
Wing
X
Ans.
Ans.
Wing
Y
Wing
U
iii) Suggest the most suitable place (i.e., Wing) to house the server of this
organization with a suitable reason with justification.
The most suitable place to house the server is Wing Z as it has most number
of computers. It will save on the cabling cost and most of the traffic will be
local as per 80 : 20 rule of network design.
iii) Suggest the placement of the following devices with justification:
(1) Repeater As per the layout suggested we need install separaters as
each of the wings will have a hub installed that acts like a repeater.
(2) Hub / Switch each of the wings requires a hub to connect several
computers in the wing.
iv) The organization is planning to link its head office situated in Delhi with the
offices as Mizoram. Suggest an economic way to connect it; the company is
ready to compromise on the speed of connectivity. Justify your answer.
Ans.
An economic way of connecting is Dial-up or broadband as it can connect
two computers at an economic rate though it provides lesser speed than other
expensive methods.