Computer Networks & Diagrams
Computer Networks & Diagrams
Need of Networking
1. Exchange of information
2. Sharing of resources such as printer, memory, CPU, etc.
3. Backup of information in case one computer fails.
4. Reduction in operating cost
THE INTERNET:-
It is a world-wide network of large and small networks around the globe.
It allows all the computers in a network to exchange information with each other using
a common set of rules called PROTOCOLS.
1. At source computer, the message to be sent is first divided into very small parts called
Packets using a TCP(Transmission Control Protocol).
2. Each packet is given a serial no. and destination address is marked on them using
IP(Internet Protocol).
3. The destination computer receives data packets in random order and then they are re-
assemble again in order of their serial no. to form the original message using TCP again.
WHAT IS INTERSPACE?
Interspace is a client/server software program that allows multiple users to communicate
online with real-time audio, video and text chat in dynamic 3D environments.It is the future
of internet.
TYPES OF NETWORKS:-
1. Local Area Network(LAN)
2. Metropolitan Area Network(MAN)
3. Wide Area Network(WAN)
4. Personal Area Network (PAN)
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |1
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |2
LAN
MAN
WAN
1. It is spread across the cities or even country and may cover whole world when
distance is large (>60kms). It is collection of several LANs.
2. It uses satellite communication or telephone lines as transmission medium.
3. Because of large distances, WANs operate at less speed of less than 1 Mbps.
4. No limit of distance between the nodes.
5. More chances of loss of data.
PAN
Transmission Media:
A transmission medium is a medium of data transfer over a network. It can be wired or
wireless.
These are Twisted Pair Cable, Co-axial Cable, and Optical Fibre Cable.
It contains four twisted pairs covered in an outer shield. These pairs are colour
coded.
It is of two types:
(i) UTP (Unshielded Twisted Pair):
As the name suggests in UTP cables individual pairs are not shielded.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |3
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |4
It is a thin (External diameter app. 0.43cm) and flexible cable and therefore it offers
ease of installation.
It can carry data up to a length of 100m at a stretch.
(ii) STP (Shielded Twisted pair): It is the same cable as the UTP, but with
each pair shielded individually. An outer
shield then covers all the pairs like in
UTP.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |4
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |5
Advantages Disadvantages
1. Expensive communication media as
1. It can carry data for a larger distance compared to Twisted pair(TP).
(185m - 500m) at a stretch.
2 it can carry a signal over long distance at 2. Bulkier and less flexible as compared to
higher speed.(upto 100 Mbps) Twisted pair(TP).
3. has a higher bandwidth in the range of 300 – 3. Difficult to install.
400 MHz.
4. More durable and resistant to interference
Optical Fibers are long, thin strands of glass about the thickness of a human hair.
They are arranged in bundles called optical fiber cables and used to transmit data
through light signals over long distances.
2 it can carry a signal over long 2. Difficult to install and quite fragile
distance without loss of data.
3.Highly secure 3. Need special tools and methods for
Installation.
4. More durable and resistant to
interference
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |5
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |6
Wireless Media
Only radio waves, microwaves, and infrared rays are used for wireless
communication.
Frequencies of waves are measured in Hertz (Hz).
Radio Waves -
Radio waves have a frequency range of 3 KHz to 3GHz.
Radio waves are used for communication over distances ranging from a few
meters (in walkie-talkie) up to covering an entire city.
These waves are easy to generate and can travel long distances.
They are best suitable for hilly areas as it can penetrate obstacles such as
mountains, trees, buildings easily.
That's why they are widely used for communication, both indoors and
outdoors.
Cordless phones, AM and FM radio broadcast, Garage door openers etc.
are examples of radio wave transmission.
Advantages Disadvantages
These waves are omnidirectional i.e. can 1. not highly secure.
be transmitted in any direction.
Can penetrate obstacles such as 2. need of special signalling equipment.
buildings, mountains, etc. easily.
The transmitting and receiving antennas The transmission can be interfered by
need not be aligned. motors or other electrical equipment
Easy to generate and can travel long Permission from concerned
distances. authorities is required for use of
radio wave transmission
No need of antennas and repeaters.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |6
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |7
Micro Waves –
Micro waves have a frequency range of 300MHz (0.3 GHz) to 300 GHz.
Microwaves travel in straight lines and cannot penetrate any solid object.
Infrared Waves
Bluetooth -
Bluetooth technology uses radio waves in the frequency range of 2.402 GHz to 2.480
GHz.
This technology is used for short range communication (approx. 10m) in a variety of
devices for wireless communication.
Baby monitors, door openers, and cell phones are some of the devices that utilize
Bluetooth communication.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |7
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |8
Satellite Link –
Satellite links are used for very long distance wireless communication which may
range from intercity to intercontinental.
Network Topology:-
The physical arrangement of computers in a network is called Topology.
Bus Topology
All nodes share a common cable/wire to receive and transmit data.
Advantages Disadvantages
1. Short cable length is required 1. difficult to detect and correct fault.
because of common data cable.
2. Low installation cost and easy to 2. use of additional devices(repeaters) is
layout and maintain. required in case the cable length is more.
3. Additional nodes can be connected 3. In case if cable or terminator fails, the
at any point using repeaters. entire network breaks down.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |8
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |9
4. Failure of one node does not affect 4. Network traffic is more so more
the network. chances of data loss.
Star Topology
1. In this, all nodes are connected to a central device called Switch/Hub.
Advantages Disadvantages
1. one device per connection therefore if 1. Large cable length is required because
one node fails it may be easily detached. each node is separately connected to
switch.
2. Easy to detect & correct faults. 2. Installation cost is more.
3. Network traffic is very less. 3. if central switch fails, the entire network
fails.
Ring Topology
1. In this each node is connected to two other nodes to form a ring or a circle.
2. One node takes data from other node and gives it to adjacent node. Thus data
travels in one direction only.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 Page |9
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 10
Advantages Disadvantages
1. Short cable length is required because of 1. failure of one node cause the failure
less connection. of the entire network
2. Low installation cost and easy to layout and 2. Difficult to detect and correct fault.
maintain.
Tree Topology
Advantages Disadvantages
1. Easy to detect and correct fault. 1. failure of root node cause the failure of
the entire network
2. Easy to connect additional nodes. 2. High installation cost and difficult to
layout and maintain.
Mesh Topology:
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 10
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 11
Advantages Disadvantages
1. Easy to detect and correct fault. 1. Installation cost is high.
2. Suitable for long distance 2. Large cable length is required.
networking.
3. It is highly reliable and secure. 3. Bulk wiring is required.
NETWORK DEVICES /HARDWARE:-
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 11
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 12
2. Hub/Switch
(i) Are network devices mainly used to connect several computers with each other in a
network.
(ii) They contain multiple ports.
(iii)They transmit data in the form of frames.
Types of Hubs:-
(i) Active Hub :- can amplify the weak signals along the network. These can
be used like repeaters to extend the length of network.
(ii) Passive Hub: - They are used to pass signals from one computer to
another without amplifying them. These cannot be used as repeaters.
5. Repeater:-
(i) It is a device used to amplify an incoming signals and
retransmit it to the destination
(ii) It does not perform any error checking on signal.
(iii) It functions on the Physical layer of OSI model.
(iv) They are mostly used when distance between the
sender and receiver is 70m or above.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 12
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 13
6. Router:-
7. Gateway:-
8. Bridge:-
(i) A bridge is a network device that connects one LAN segment to another LAN
segment that uses the same protocol.
(ii) Mainly used to reduce the Network Traffic on LAN.
(iii) Bridges operate at the Data Link Layer(Layer-2) of OSI Model.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 13
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 14
9. Modem :-
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 14
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 15
Message Switching:-
1. In this, an entire message is transmitted to a destination. No exclusive path is
required to get the message from point A to point B.
Advantages:-
Disadvantages:-
2. costly
Packet Switching:-
1. In this, long messages are divided into small parts called packets. Their size may
range from 600 bytes to 4000 bytes.
2. Each packet contains source and destination address and may take a different path
through the network.
Advantages:-
1. It is faster because messages are not stored for later use.
2. Packets are transmitted through free and clear paths therefore no loss.
Disadvantages:-
1. There has to be some mechanism to decide from which path the packets should be
transmitted.
Circuit Switching:-
1. In this, a physical path or a link is created for data transmission between sender
and receiver in advance.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 15
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 16
2. End-to-End path is set up between the computers before any data can be sent.
Advantages:-
1. Reliability of transfer because no other devices are using that path.
Disadvantages:-
1. Overhead is required to create physical pathway.
2. It takes time to put all the links in place to complete the circuit.
2. Bandwidth :-
“Wider the bandwidth, the more data it can transmit in a given period of time.
3. Data Transfer rate – is the amount of data transfer per second. It is measured
in Kbps(Kilo bits/second) or mbps (Mega bits/second).
4. Baud:- is also a unit used to measure the speed of data transfer, now replaced by
term bits per second(bps), Kbps, mbps, gbps.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 17
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 18
Mobile Computing means transfer of data between the devices that are mobile in nature such as
smart phones, laptops, tablets, etc. The devices NEED NOT to be connected continuously to the
base network.
1. GSM
It is a digital cellular technology used for transmitting mobile voice and data services in
Europe, Australia and Asia for 2G networks.
It can operate at frequency 900 to 1800 MHz.
GSM uses SIM cards (Subscriber identity Module) that are small chips which stores data
and Phone Number.
It also uses TDMA technology(Time Division Multiple Access).
2. TDMA
It divides the radio frequency into time slots and then allocating slots to multiple channels.
It can allow 8 simultaneous calls on the same radio frequency.
3. CDMA
It uses spread-spectrum technology.
Unlike TDMA, it does not assign a specific frequency to each user instead each channel
uses the full frequency any time
Each user’s signal is spread over the entire bandwidth by a unique spreading code.
4. WLL
Local loop is a circuit line from a subscriber’s phone to the local central office (LCO).
It is mostly use in rural and remote areas to use wireless links for connection such as radio
links.
It consists of a radio transceiver and WLL interface assembled in one metal box.
Each user has a low power mini-station with telephone connection.
The point-to-point signal transmission occurs.
Advantages of WLL:-
1. Best suited for rural and remote areas where there is less number of users.
2. Low installation cost.
3. It offers better bandwidth and high quality data transmission.
4. Easy installation.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 18
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 19
4. GPRS
It is a packet switching system to transfer data in the form of packets whereas GSM
is circuit switching system.
It can transfer data at a speed of 56Kbps to 110 Kbits.
GPRS is used for video calling, Email accessing, multimedia messaging etc.
1. 1G Network
It is first analog cellular systems(NMT, C-Net, AMPS)started in early 1980’s.
It supports only voice calls with no data services.
The data transfer rate is 2 Kbps.
It uses circuit switching technique.
2. 2G Network
It is first digital cellular systems (GSM, CDMAOne)started in early 1990’s.
It supports digital voice and SMS(Short Messaging Service).
The data transfer rate is 14-16 Kbps.
It also uses circuit switching technique.
3. 3G Network
It is also a digital cellular network (CDMA, EDGE) started in late 1990’s.
It supports high quality audio, video and data.
The data transfer rate is 2 Mbps.
It uses packet switching technique.
4. 4G Network
The main advantage of 4G network over 3G is the rate of speed. It provides data
speed up to 100 Mbps.
4G provides better video quality(FHDTV) than 3G.
4G is entirely IP based, which means it uses internet protocols for video and audio
data.
It also uses packet switching technique.
Also referred to by term “MAGIC” which stands for Mobile Multimedia, Anywhere,
Global Mobility Solutions over, Integrated and Wireless and Customized Services.
5. 5G Network
The main advantage of 5G network over 4G is the rate of speed. It provides data
speed up to 10 Gbps (Giga bits per second) which is 100 times faster than 4G.
Low latency rate (about 1-millisecond)
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 19
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 20
Higher device capacity (i.e. number of connected devices per unit area) as
compared with 4G.
99.999% availability.
100% coverage.
90% reduction in network energy usage.
4. HSPA
Stands for High Speed Packet Access, is a 3G mobile broadband communication
technology.
It is a combination of two mobile protocols –
(i) High Speed Downlink Packet Access (HSDPA) and
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 20
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 21
6. WiMax / WiMax2
Stands for Worldwide Interoperability for Microwave Access.
It offers a wireless broadband internet.
It is based on the IEEE 802.16 set of standards.
It supports data speed from 30Mbps to 1Gbps.
It has two main components: A WiMax tower and a WiMax receiver.
2. CHAT –
Online textual talk in a real time is called chatting.
In chatting, you type a message on your screen which is immediately received by
the recipient and vice versa.
3. VIDEO CONFERENCING-
It is two-way videophone conversation among multiple participants.
It requires a multimedia PC with a webcam, video compression hardware, internet
access and a telephone line.
Q. Which protocol is used for chatting?
Ans:-
The IRC (Internet Relay Chat) protocol is used for real-time chatting.
It is a simple, text-based protocol that allow users to chat individually or in groups.
It requires a Chat Server and Clients.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 22
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 23
Anyone can use a laptop, a Wi-Fi Mobile, or other wi-fi devices to access the
internet.
Hotspots are public locations such as Libraries, Airports, Hotels, Restaurants, etc.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 23
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 24
This is made up of websites that have one or more web pages and you probably use
the most of them.
But, Internet isn’t just the webpages that you use everyday, It also consists of other
components like Forums, Usenet, etc
(ii) Telnet-
It is a protocol that allows you to log on to remote computers (called hosts) over the
internet. It was created and launched in 1969.
It gives a Character-based terminal window on another computer to login and execute
Telnet Commands.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 24
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 25
3. Dedicated Hosting -
In this type of hosting, a dedicated server with dedicated resources is provided
to a single user.
Mainly suitable for large companies such as Group of Schools, Big online mall
(Flipkart, Amazon),etc.
Q. What is HTML?
Ans:-
(Hypertext Markup Language) is language the helps in creating and designing web
content.
It is designed to display the data in formatted manner.
A HTML document has the extension .htm or .html.
Hypertext is a text which is linked to another document.
Q. What is XML?
Ans:-
(EXtensible Markup Language) is a markup language like HTML. It is designed to
carry or store data.
In contrast to HTML, it is not designed to display data.
Unlike HTML, it does not have predefined tags. Tags are user-defined. XML is case
sensitive. XML is deigned to be self-descriptive.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 25
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 26
Q. What is DHTML?
Ans:-
It is used for designing the animated and interactive web pages that are developed
in real-time.
DHTML helps users by animating the text and images in their documents.
It allows the authors for adding the effects on their pages such as the drop-down
menus or rollover buttons.
Q. What is Firewall?
Ans:-
1. A firewall is hardware or software based network security system. It prevents
unauthorized access (from hackers, viruses, worms etc.) to or from a network.
2. Firewalls are used to prevent unauthorized internet users to access private networks
connected to the Internet.
3. All data entering or leaving the Intranet pass through the firewall, which examines
each packet and blocks those that do not meet the specified security criteria.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 26
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 27
Crackers are the malicious programmers who break into security systems with the
malicious intention of destroying data or harming the system.
Q. What is Cyber law?
Ans:-
Cyber law is the area of Law that deals with the Internet, the WWW, cyberspace,
netizens, electronic devices and their respective legal issues. It is the Law of the
Internet.
The first cyber law was the Computer Fraud and Abuse Act (CFAA), enacted in 1986.
Any criminal offense that is carried out using any electronic device and internet is
referred to as Cyber Crime. It includes crimes like phishing, pharming, identity
theft, cyber bullying, cyber stalking, cyber terrorism, child pornography, etc.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 27
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 28
(i) Phishing –
Phishing is a method of trying to gather personal information using deceptive e-mails and
websites. The goal is to trick the email recipient into believing that the message is
something they want or need. For instance, a request from their bank or a company to
click on a link or download an attachment, etc.
(ii) Spoofing -
It refers to a fraudulent or malicious practice in which a hacker impersonates another
user in a network believing others that they are authentic.
Example- Charity fraud, Internet ticket fraud, Online gift card fraud, online shopping
fraud.
Refers to obtaining files for which don’t have the right to use or download from
internet.
Example: downloading a movie which is not available for free download, downloading
a copy of licensed software or an app illegally.
(i) Child Pornography –
Is defined as to produce and distribute any material (images, text, movies,
etc.) that depicts sexual activity of anyone under the age of 18(belong to child
category).
Information Technology Act, 2000 and Indian Penal Code, 1860 provides
protection from child pornography.
(ii) Hacking-
It refers to gaining unauthorized access to a network or computer to steal
data or to install malware. The person who does this is called Hacker.
Hacker exploits your computer or network security using various techniques
like Phishing, Spoofing, Social Engineering, etc.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 28
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 29
Also it gives the owner the right to decide the price for doing so.
Types of Viruses
File Virus: These viruses infect and replicate when it gets attached to MS-DOS program
files with EXE or COM extensions.
Boot sector virus: These viruses infect the boot sector of floppy disks or hard drives. Boot
sector of a drive contains program that participates in booting the system.
Macro virus: These viruses infect and replicate using the MS Office program suite, mainly
MS Word and MS Excel. The virus inserts unwanted words or phrases in the document.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 29
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 30
3. A worm scans the network for another machine that has a specific security hole.
4. It copies itself to the new machine using the security hole, and then starts replicating
from there as well.
Avoiding Spams:-
1. By creating Spam Filters.
2. By not registering yourself with true email id to sign up for the things on an Internet.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 30
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 31
Q. What is e-Wallet?
Ans:-
E-wallet is a electronic service used for payments.
It is your own wallet from which you can use your own money in
electronic form.
Some most popular e-wallets of today are: Paytm, Airtel Money,
Freecharge, Mobikwik, PhonePe, PayZapp, Pockets, etc.
STUDY MATERIAL-XII-CS 2020-21 PREPARED BY: MOHIT TANDON SIR, LPS, SEC-D, 9839013528 P a g e | 31
QUESTION BANK – COMPUTER NETWORKS (DIAGRAM-BASED)
SAMPLE QUESTION WITH RULES & ANSWERS
Q. MyPace University is setting up its academic blocks at Naya Raipur and is planning to set up a
network. The University has 3 academic blocks and one Human Resource Center as shown in the
diagram below:
b) Suggest an ideal layout for connecting these blocks/centers for a wired connectivity.
RULE:-
Inter-connect the buildings/blocks/wings/centres that have least distance in such a way so that data can
be transferred to all blocks/wings/buildings.
if there are 5 buildings then no. of connections should be 4.
if there are 4 buildings then no. of connections should be 3.
if there are 3 buildings then no. of connectiond should be 2.
then select those no. of connections with least distance from the table given. Draw the given layout in
answer copy and show the distances between the blocks.
Ans:-
30m
15m
40m
c) Which will be the most suitable topology? Give reason.
Rule/Ans: Always give this answer as STAR TOPOLOGY.
Reason:-
(i) Network traffic is very less because each node is connected via separate cable to the server.
(ii) Less loss of data.
(iii) Easy to attach and detach nodes.
(ii) Repeater - is placed where distance between the blocks/wings/buildings is 70 metres or above.
NOTE: Always suggest the placement of repeater according to the cable layout drawn by you ant not
according to the distances given in the table.
Ans:- None as there is no distance more than 70m.
e) The company is planning to set up its Admission Office in Nainital. Suggest suitable transmission
technology to interconnect offices at Naya Raipur and Nainital.Give reason.
Ans: Radiowave Transmission
Rule:-
For hilly areas, it is RADIOWAVE TRANSMISSION because
(i) It is omni-directional (i.e. can transmit signals in any direction )
(ii) It can penetrate obstacles such as mountains, trees, buildings,etc.
For plain areas where distance is very large(>1000km) then suggest Satellite communication.
For plain areas where distance is less(in metres) then suggest twisted pair or telephone wires or
coaxial cables.
f) Suggest the most suitable economical technology to provide internet connectivity in all the blocks.
Rule:- Broadband for plain areas
Wifi or WiMax for hilly areas.
Ans:- Broadband
Reason:
1. It is cheaper.
2. The data transfer speed is fast and high.
g) The company want his employees to communicate the with employees of London Office for face-to-
face communication. Which internet service should be used by the office and also name the protocol.
Ans: Video Conferencing is used for Face-to-Face communication
Protocol is VoIP(Voice Over Internet Protocol)
h) Suggest the device/software to prevent unauthorized access of data to/from the company's network.
Ans:- Firewall is always used for data security.
g) The company wants internet accessibility in all the wings.Suggest a suitable device for secure internet
connectivity.
Ans:-
Router / Wifi Router is always used for spreading internet connection.
PRACTICE QUESTIONS
Q.1. SYMANTEC SOFTWARE caters to many high profile clients and has 5 buildings where it
runs its operations (shown below)
Q.7. “Bhartiya Connectivity Association” is planning to spread their offices in four major cities in
India to provide regional IT infrastructure support in the field of Education & Culture. The
company has planned to setup their head office in New Delhi in three locations and have named their
New Delhi offices as “Front Office”, “Back Office” and “Work Office”. The company has three more
regional offices as “South Office”, “East Office” and “West Office” located in other three major cities of
India. A rough layout of the same is as follows
(iii) Suggest a cable/wiring layout for connecting the company’s local offices located in New
Delhi. Also, suggest an effective method/technology for connecting the company’s regional
offices-”East Office”, “West Office” and “South Office” with offices located in New Delhi.
Q.8. A company in Mega Enterprises has 4 wings of buildings as shown in the diagram :
Q.9. Multipurpose Public School, Bangluru is Setting up the network between its Different Wings of
school campus. There are 4 wings named as SENIOR(S), JUNIOR(J), ADMIN(A) and HOSTEL(H).
Multipurpose Public School, Bangluru.
(i) Suggest the best wired medium and draw the cable layout to efficiently connect
various wings of Multipurpose Public School, Bangluru.
(ii) Name the most suitable wing where the Server should be installed. Justify your
answer.
(iii) Suggest a device/software and its placement that would provide
data security for the entire network of the School.
(iv) Suggest a device and the protocol that shall be needed to provide wireless
Internet access to all smartphone/laptop users in the campus of Multipurpose Public
School, Bangluru.
Q.10. Rehaana Medicos Center has set up its new center in Dubai. It has four buildings as
shown in the diagram given below:
Number of Computers
As a network expert, provide the best possible answer for the following queries:
i) Suggest a cable layout of connections between the buildings.
ii) Suggest the most suitable place (i.e. buildings) to house the server of this organization.
iii)Suggest the placement of the following device with justification:
a) Repeater b) Hub/Switch
iv)Suggest a system (hardware/software) to prevent unauthorized access to or from the
network.
11. To provide telemedicine facility in a hilly state, a computer network is to be setup to connect
hospitals in 6 small villages (V1, V2, . . . , V6) to the base hospital (H) in the state capital. This is
shown in the following diagram.
No village is more than 20km away from the state capital.
Imagine yourself as a computer consultant for this project and answer the following questions:
(i) Out of the following what kind of link should be provided to setup this network:
(i) Microwave link (ii) Radio Link (iii) Wired link?
(ii) Give suitable reason for your answer.
(iii) What kind of network will be formed: LAN, MAN, or WAN?
(iv) Many times doctors at village hospital will have to consult senior doctors at the base hospital.
For this purpose, what could be the most feasible way ?- using email, SMS, telephone, or
video conferencing?
(v) Suggest a suitable place to install the Network Server.