COMMUNICATION AND NETWORK CONCEPTS - Students 24.4.24
COMMUNICATION AND NETWORK CONCEPTS - Students 24.4.24
NETWORK GOALS :
i) Resource sharing: The aim is to make all programs, data and peripherals available to
anyone on the network irrespective of the physical location of the resources and the user.
ii) Reliability: A file can have copies on two or three different machines, so if even one of them
is unavailable, the other copies could be used.
iii) Communication medium: It acts as a communication medium. Messages can be sent – e.g.
internal email.
APPLICATIONS OF NETWORKS :
i) Sharing: The potential advantage of network is to provide an easy and flexible means of
sharing. There are three distinct types of sharing.
a) Peripherals: These are often expensive. It is impractical for each computer on the network
to have both its laser printer and dot matrix printer.
b) Users of a multi user system can share and exchange information in a number of ways.
c) In a traditional time sharing system, all control is performed centrally; if the processor fails
then the entire system fails. In a network system, the failure of one node should not have
domain effect on the rest. This is called distributed control.
ii) Access to remote database: It is easy for the average person sitting at his PC to
makereservation for airplanes, trains, hotels and so on anywhere in the world with instant
confirmation.
iii) Communication facilities: Able to contain digitized voice, still pictures and even moving
television and video images.
EVOLUTION OF NETWORK:
Evolution of networking started way back in 1969 by the development of first network called
ARPANET, which led to development of Internet.
i) ARPANET : The seeds of today’s Internet were planted in 1969, when U.S. Department of
Defence sponsored a project named ARPANET(Advance Research Projects NETwork)with
agoal to connect computers at different universities and U.S.defence. In mid 80’s, federal
agency, the National Science Foundation, created a new, high-capacity network called
NSFnet. NSFnet allowed only the academic research on its network. It was the Inter
networking i.e. linking of these two and some other networks(i.e., the ARPANET, NSFnet and
some private networks) that was named Internet.
ii) INTERNET: The Internet is a worldwide network of computer networks that evolved from the
first network ARPANET. Internet is made up of many networks each run by a different
company and interconnected at peering points. The common use of Internet standards ( set
of rules called protocols ), allows users connected to one network to communicate and
exchange information with users on another network.
Bits per second(bps): It refers to the speed at which data transfer is measured. Bytes per second
is denoted as Bps. The rate of a thousand bits per second is known as kbps i.e., kilo bits per
second. A rate of a thousand bytes per second is denoted by Kbps (Kilo bytes per second).A rate
of a million bits per second is denoted through mbps- mega bits per second. A rate of a million
bytes per second is denoted as Mbps.
Data transfer rates: The data transfer rate represents the amount of data transferred per second
through the communications channel or a computing or storage device. Data rate is measured in
units of bits per second (bps), bytes per second (Bps), kilobytes per second(kBps), megabytes
per second(MBps), gigabytes per second(GBps), terabytes per second(TBps).
a) Twisted Pair Cable: The most common form of wiring in data communication application is
the twisted pair cable. It consists of two identical wires wrapped together in a doublehelix.
Main advantages of twisted pair cable are: it is simple, easy to install and maintain,is
physically flexible, has a low weight, can 2be easily connected and is very inexpensive.
Despite having such advantages, there are some disadvantages also. The data
transmission characteristics of twisted pair cable is not so good. Because of high attenuation,
it is incapable of carrying a signal over long distances without the use of repeaters. Its low
bandwidth capabilities make it unsuitable for broadband applications. It support maximum
data rates of 1 MBPS without conditioning and 10 MBPs with conditioning.
b) Coaxial Cable: This type of cable consists of a solid wire core surrounded by one or more foil
or wire shields, each separated by some kind of plastic insulator. The inner core carries the
signal, and the shield provides the ground. The coaxial cable has high electrical properties
and is suitable for high speed communication. It is widely used for television signals. In the
form of (CATV) cable, it provides a cheap means of transporting multi-channel television
signals around metropolitan areas. Major advantages includes higher bandwidths- up to 400
MBPS and be used for broadband transmission i.e., several channels can be transmitted
simultaneously (as with cable TV). Disadvantages: It is expensive compared to twisted pair
cables and are not compatible with twisted pair cables.
c) Optical Fibers: Optical fibers consist of thin strands of glass or glass like material which are
so constructed that they carry light from a source at one end of the fiber to a detector at the
other end. The light sources used are either light emitting diodes (LEDs) or laser diodes(LDs).
The data to be transmitted is modulated onto the light beam using frequency modulation
techniques. The signals are then picked up at the receiving end and demodulated. The band
width of the medium is potentially very high.
The fiber cable consists of three pieces: (i) The core i.e., the glass or plastic through which
the light travels.(ii) the cladding, which is a covering of the core that reflects light back to the
core, and the (iii) Protective coating, which protects the fiber cable from hostile environment.
Advantages: It is immune to electrical and magnetic interference i.e., noise in any form
because the information is traveling on a modulated light beam, highly suitable for harsh
industrial environments, guarantees secure transmission and has a very high transmission
capacity and can be used for broadband transmission where several channels(i.e., bands
of frequency) are handled in parallel and where it is also possible to mix data transmission
channels with channels for telescope, graphics, TV and sound.
Disadvantages: Fiber optic cables are quite fragile and may need special care to make them
sufficiently robust for an office environment, connecting either two fibers together or a light
source to a fiber is a difficult process, because of noise immunity, optical fibers are virtually
impossible to tap, light can reach the receiver out of phase, Connection losses are common
problems, are more difficult to solder, are the most expensive of all the cables.
3
Wireless media :
4
5
6
7
NETWORK DEVICES:
NIC : Any computer which has to be a part of the computer network must have an NIC ( Network
Interface Card/ Unit ) installed in it. A computer communicates with other computers on the network
with the help of NIC only.
MODEM: A modem is a computer peripheral that allows you to connect and communicatewithother
computers via telephone lines. A modem changes the digital data from the computer into analog
data, a format that can be carried bytelephone lines. In a similar manner, the modem receiving the
call then changes theanalog signal back into digital data that the computer can digest. This is
called modulation/demodulation. 3 types of modulation techniques are used: AM (Amplitude
Modulation), FM(Frequency Modulation), PM(Phase Modulation)
RJ-45:is short for Registered Jack-45. RJ-45is an eight-wire connector, which is commonly
used to connect computers on the local area networks i.e., LANs especially Ethernet. The
RJ-45 connector looks very much similar to standard telephone connector (RJ- 11 connector),
but it is wider than RJ-11 as it houses eight wires instead of six( as in RJ11).
8
ETHERNET CARD: Ethernet is a LAN architecture developed by Xerox Corp in association with
DEC and Intel.Ethernet uses bus or star topologies and can support data transfer rates of up to
10 Mbps. The computers that are part of Ethernet, have to install a special card called Ethernet
Card.
HUB: A hub is a hardware device used to connect several computers together. A hub contains
multiple independent but connected modules of network and inter-networked equipment. Active
hubs electrically amplify the signal as it moves from one connected device to another. Passive
hubs allow the signal to pass from one computer to another without any change.
SWITCH: A switch is a device that is used to segment networks into different subnetworks called
subnets or LAN segments. Segmenting the network into smaller subnets, prevents traffic
overloading in a network. A switch is responsible for filtering i.e., transforming data in a specific
way and forforwarding packets(a piece of message being transmitted) between LAN segments.
REPEATER : A repeater is a device that amplifies a signal being transmitted on the network. Over
distance, the cables connecting a network lose the signal transmitted. If the signal degrades too
much, it fails to reach the destination. Or if it does arrive, the degradation of the message
makes it useless. Repeaters can be installed along the way to ensure that data packets reach
their destination. Repeaters are generally installed where the cable length connecting two
computers in a network exceeds 75 mts(approximately).
Router
A Router is a network device that works like a bridge to establish connection between two
networks but it can handle networks with different protocols.
TYPES OF NETWORKS : Networks are classified on the basis of geographical spread and on
this basis, there can be four types of networks:
➢ Personal Area Networks (PANs)
➢ Local Area Networks (LANs)
➢ Wide Area Networks (WANs)
➢ Metropolitan Area Networks (MANs)
Personal area network (PAN): is a computer network used for communication among computer
devices, including telephones and personal digital assistants, in proximity to an individual's body.
The devices may or may not belong to the person in question. The reach of a PAN is typically a
few meters. PANs can be used for communication among the personal devices themselves
(intrapersonal communication), or for connecting to a higher level network and the Internet.
Local Area Network (LAN) :Small computer networks that are confined to a localized area (e.g.,
an office, a building or a factory) are known as Local Area Networks(LANs). The key purpose of
a LAN is to serve its users in resource sharing, hardware as well as software resources. One
computer is designated as the file server that stores all of the software that controls the network,
as well as the software that can be shared by the computers attached to the network. Computers
connected to the file server are called Workstations.
Metropolitan Area Network (MAN) : Metropolitan Area Networks are the networks spread over
a city. For e.g., cable TV network that are spread9 over a city, can be termed as metropolitan area
networks. The purpose of a MAN is also the sharing of hardware and software resources among
its users.
Wide Area Networks (WAN) The networks spread across countries are known as WANs. A Wide
Area Network(WAN) is a group of computers that are separated by large distances and tied
together. It can be a group of LANs that are spread across several locations and connected
together to look like one big LAN. The WANs link computers to facilities fast and efficient
exchange of information at lesser costs and higher speeds. The largest WAN in existence is the
Internet.
LAN WAN
1. Diameter of not more than a few kilometers 1. Span entire countries.
2. A total data rate of at least several Mbps. 2. Data rate less than 1 Mbps
3. Complete ownership by a single organisation. 3. Owned by multiple organisation.
4. Very low error rates. 4. Comparatively higher error rates.
NETWORK TOPOLOGIES
The pattern of interconnection of nodes in a network is called the TOPOLOGY.
10
i) The Bus or Linear Topology: This consists of a single length of the transmission
medium(normally coaxial cable) on to which the various nodes are attached. The transmission
from any station travels the length of the bus, in both directions, and can be received by all
other stations. The bus has terminators at either end which absorb the signal and removes it
from the bus. Data is transmitted in small blocks, known as packets. Each packet has some
data bits, plus a header containing its destination address. A station wanting to transmit some
data sends it in packets along the bus. The destination device, on identifying the address on
the packets, copies the data onto its disk.
Advantages
a) Short cable length and simple wiring layout: Because there is a single common data path
connecting all nodes, the linear topology allows a very short cable length to be used.
b) Resilient Architecture: The linear architecture has an inherent simplicity that makes it
very reliable from a hardware point of view. There is a single cable through which all the
data propagates and to which all nodes are connected.
c) Easy to extend : Additional nodes can be connected to an existing bus network at any
point along its length.
Disadvantages
a) Fault diagnosis is difficult: Since control of the network is not centralized in any particular
node, detection of a fault may have to be performed from many points in the network.
b) Fault isolation is difficult: If a node is faulty on the bus, it must be rectified at the point
where the node is connected to the network.
c) Repeater configuration: When the network has its backbone extended using repeaters,
reconfiguration may be necessary.
d) Nodes must be intelligent: Each node on the network is directly connected to the central
bus. This means that some way of deciding who can use the network at any given time
must be performed in each node.
ii) The Star Topology:This topology consists of a central node to which all other nodes are
connected by a single path.
Advantages :
a) Ease of service: The star topology has a number of concentration points. These provide
easy access for service or reconfiguration of the network.
b) One device per connection
c) Centralized control/problem diagnosis: The fact that the central node is connected directly
to every other node in the network means that faults are easily detected and isolated. It is
simple to disconnect failing nodes from the system.
d) Simple access protocols.
Disadvantages
a) Long cable length: Because each node is directly connected to the center, the star
topology necessitates a large quantity of cable. Whilst the cost of cable is often small,
congestion in cable ducts and maintenance and installation problem can increase cost
considerably
b) Difficult to expand: The addition of a new node to a star network involves connections all
the way to the central node.
c) Central node dependency: If the central node in a star network fails, the entire network is
rendered inoperable. Thus heavy reliability and redundancy constraints on this no
iii) The Tree Topology:A variation of bus topology is the tree topology. The shape of the network
is that of an inverted tree with the central root branching and sub branching to the extremities
of the network. Transmission in this topology takes place in the same way as in bus topology.
In both cases, there is no need to remove packets from the medium because when a signal
reaches the end of the medium, it is absorbed by the terminators.
11
COMMUNICATION PROTOCOLS : A PROTOCOL is a format description of message formats
and the rules that two or more machines must follow to exchange those messages. Protocol
defines standardized formats for data packets, techniques for detecting and correcting errors and
so on.
ii) FTP(File Transfer Protocol) : This protocol is mainly concerned with transfer of file from one
network to another in an organization
iii) Point-to-Point Protocol : P-P(Point-to-Point) link basically relies upon two functions-transmit
and receive. The main characteristic of P-P network is that each station receives exactly from
one transmitter, and each transmitter transmits to exactly one receiver. Thetransmit and
receive operations can occur over separate wires or they can take turns over the same wire
using a variety of techniques.
Transmit Receive
X Y
Receive Transmit
v) HTTP: HTTP is the protocol that is used for transferring hypertext (i.e. text, graphic, image,
sound, video etc.) between two computers and is particularly used on the World Wide Web. It is
a TCP/IP based communication protocol and provides a standard for Web browsers and servers
to communicate.
WIRELESS/MOBILE COMPUTING:
Wireless refers to the method of transferring information between a computing device, such as a
personal data assistant(PDA), and a data source, such as an agency database server, without a
physical connection. Mobile simply describes a computing device that is not restricted to a
desktop. A mobile device may be PDA, a “smart” cell phone or Web Phone, laptop computer, or
any one of numerous other devices that allow the user to complete computing tasks without being
tethered, or connected, to a network. Wireless communication is simply data communication
without the use of landlines. Mobile computing means that the computing device is not
continuously connected to the base or central network.
2. CDMA (Code-Division Multiple Access):A digital cellular technology that uses spread-
spectrum techniques, CDMA does not assign a specific frequency to each user. Instead, every
channel uses the full available spectrum. CDMA uses a spread-spectrum technique where
data is sent in small pieces over a number of discrete frequencies available for use. Each
user’s signal is spread over the entire bandwidth by unique spreading code. At the receiver
end the same unique code is used to recover the signal.
3. WLL (Wireless in Local Loop): Mobile Telephony is primarily meant to provide telephony for
people on the move. WLL is a system that connects subscribers to the public switched
telephone network(PSTN) using radio signals as a substitute for other connecting media.
Advantages of WLL include enhanced reliability, better bandwidth and superior customer
service features, high quality data transmission and signaling services.
4. GPRS : GPRS stands for General Packet Radio Service and is a second generation (2G) and
third generation (3G)--or sometimes referred to as in-between both generations, 2.5G--
wireless data service that extends GSM data capabilities for Internet access, multimedia
messaging services, and early mobile Internet applications via the wireless application
protocol (WAP), as well as other wireless data services.
5. IG, 2G & 3G : 1G (or 1-G) refers to the first-generation of wireless telephone technology or
mobile telecommunications. These are the analog telecommunications standards that were
introduced in the 1980s and continued until being replaced by 2G digital telecommunications.
The main difference between two succeeding mobile telephone systems, 1G and 2G, is that
the radio signals that 1G networks use are analog, while 2G networks are digital.3G is a
specification for the third generation of 13mobile communications technology.3G (Third
Generation) mobile communications technology is a broadband, packet-based transmission
of text, digitized voice, video and multimedia at data rates up to and possibly higher than 2
mb per second(mbps).
7. Voice Mail : refers to e-mail systems that support audio. Users can leave spoken messages
for one another and listen to the messages by executing the appropriate command in the e-
mail system.
NETWORK SECURITY
Protection Methods:
1. Authorization: determines whether the service provider has granted access to the web
service requestor. Basically, authorization confirms the service requestor’s credentials.
Authorization is performed by asking the user a legal login-id.
2. Authentication: ensures that each entity involves in using a web service- the requestor, the
provider, and the broker-is what it actually claims to be. Authentication involves accepting
credentials from the entity and validating then against an authority. Authentication is also
termed as password-protection.
3. Encrypted Smart Cards: Passwords in a remote log-in session generally pass over the
network in unencrypted form, any hacker(or cracker) can simply record it and can use it later
maliciously to corrupt data/files or to harm anyone etc. To counter such threats, encrypted
smart cards are used.
4. Biometric systems : The biometric systems involve some unique aspect of a person’s body
such as finger-prints, retinal patterns etc. to establish his/her identity.
Viruses: Computer virus is a malicious program that requires a host and is designed to make a
system sick. Just like a real virus, viruses can spread from computer to computer, and they
can replicate themselves. Some viruses are categorized as harmless pranks, while other are
far more malicious. They are also capable of destroying executable files and alter data,
leading to the system failure.
1)can destroy the File allocation table(FAT) and lead to the corruption of an entire file
system,resulting in the need to fully reinstall and reload the system
2) can create bad sectors on the disk ,destroying parts of program and files
3) can decrease the space on hard disc by duplicating files.
4) can format specific tracks on the disks or format the entire disc.
5) can destroy specific executable files and alter data in data files ,causing aloss of
integrity in the data.
6)can cause the system to hang so that it does not respond to any keyboard or mouse
movements.
15
Worms : A computer worm is a self-replicating malware computer program. It uses a
computer network to send copies of itself to other nodes (computers on the network)
and it may do so without any user intervention.
The following are characteristics of a worm:
1. It is able to replicate
2. It is self-contained and does not require a host
3. It is activated by creating process(it needs a multitasking system).
4. If it is a network worm, it can replicate across communication links.
Trojan Horse: A Trojan is a program that appears to be legitimate, but in fact does something
malicious. Unlike viruses, a Trojan does not replicate (i.e. infect other files), nor does it make
copies of itself as worms do. They generally spread through e-mail and exchange of disks
and information between computers.
Cookies: A cookie is a message given to a Web browser by a Web server. The browser stores
the message in a text file. The message is then sent back to the server each time the browser
requests a page from the server. The main purpose of cookies is to identify users and possibly
prepare customized Web pages for them. When you enter a Web site using cookies, you may
be asked to fill out a form providing such information as your name and interests. This
information is packaged into a cookie and sent to your Web browser, which stores it for later
use. The next time you go to the same Web site, your browser will send the cookie to the Web
server. The server can use this information to present you with custom Web pages.
Hackers and Crackers: Hacker is a slang term for a computer enthusiast, i.e., a person who
enjoys learning programming languages and computer systems and can often be considered
an expert on the subject(s).The Crackers are the malicious programmers who break into
secure systems whereas Hackers are more interested in gaining knowledge for playful pranks.
India IT Act : In India, the cyber laws are contained in the Information technology Act, 200 which
was notified on 17 October 2000. It aims to provide the legal infrastructure for e-commerce in
India by governing the transactions through the Internet and other electronic medium. It states
that :
An Act to provide legal recognition for transactions carried out by means of electronic data
interchange and other means of electronic communication, commonly referred to as
"electronic commerce", which involve the use of alternatives to paper-based methods of
communication and storage of information, to facilitate electronic filing of documents with the
Government agencies and further to amend the Indian Penal Code, the Indian Evidence Act,
1872, the Bankers' Books Evidence Act, 1891 and the Reserve Bank of India Act, 1934 and
for matters connected therewith or incidental thereto.
CyberLaw: CyberLaw is a generic term, which refers to all the legal and regulatory aspects of
Internet and World Wide Web.
Cyber Crimes :Computer crime or cybercrime is a form of crime where the Internet or
computers are used as a medium to commit crime.A generalized definition of cyber crime
may be “ unlawful acts wherein the computer is either a tool or target or both”. The computer
may be used as a tool in the following kinds of activity- financial crimes, sale of illegal articles,
pornography, online gambling, intellectual property crime, e-mail spoofing, forgery, cyber
defamation, cyber stalking. The computer may however be target for unlawful acts in the
following cases- unauthorized access to computer/
16 computer system/ computer networks,
theft of information contained in the electronic form, e-mail bombing, data didling, salami
attacks, logic bombs, Trojan attacks, internet time thefts, web jacking, theft of computer
system, physically damaging the computer system.
IPR issues:Intellectual property (IP) refers to creations of the mind: inventions, literary and artistic
works, and symbols, names, images, and designs used in commerce.IP is divided into two
categories: Industrial property, which includes inventions (patents), trademarks, industrial
designs, and geographic indications of source; and Copyright, which includes literary and
artistic works such as novels, poems and plays, films, musical works, artistic works such as
drawings, paintings, photographs and sculptures, and architectural designs. Rights related to
copyright include those of performing artists in their performances, producers of phonograms
in their recordings, and those of broadcasters in their radio and television programs.
Spam:Spam is flooding the Internet with many copies of the same message, in an attempt
to force the message on people who would not otherwise choose to receive it. Most
spam is commercial advertising, often for dubious products, get-rich-quick schemes,
or quasi-legal services.
2. HTTP(Hypertext Transfer Protocol) : It is the underlying protocol used by the World Wide
Web. HTTP defines how messages are formatted and transmitted, and what actions Web
servers and browsers should take in response to various commands. For example, when
you enter a URL in your browser, this actually sends an HTTP command to the Web server
directing it to fetch and transmit the requested Web page.
3. HTML. Everything on the web is a document written in a special language called HTML or
Hypertext Markup Language. This language tells the browsers like Mosaic or Internet
Explorer or Netscape how to display text, picture and links on the screen.HTML is a
document-layout and hyperlink-specification language i.e., a language used to design the
layout of the document and to specify the hyperlinks. HTML tells a browser how to display
the contents of a hypertext documents i.e., a documents including text, images and other
support media. The language also tells the browser how to make a document interactive
through special hyperlinks. HTML is a language that supports multimedia and new page
layout features.
4. XML (eXtensible Markup Language) :XML is a markup language for documents containing
structured information. Structured information contains both content (words, pictures, etc.)
and some indication of what role that content plays (for example, content in a section
heading has a different meaning from content in a footnote, which means something
different than content in a figure caption or content in a database table, etc.).
5. URL and Domain Names: The Internet structure of the World Wide Web is built on a set of
rules called Hypertext Transfer Protocol(HTTP)
17 and a page description language called
Hypertext Markup Language(HTML). HTTP uses Internet address in a special format called
a Uniform Resource Locator or URL.URL(Uniform Resource Locator) is an address of a file
on Internet. A file’s Internet address or URL is determined by the type of server or protocol,
name/address of the server on the Internet and the location of the file on the server. The
naming scheme by which servers are identified is also known as domain name system.
6. Web Browser and Web Server: A Web Browser is a WWW client that navigates through
the World Wide Web and displays web pages. A Web Server is a WWW server that
responds to the requests made by web browsers.
7. Web Sites, Web Addresses and Web Pages: A location on a net server is called a web
site. Each web site has a unique address called URL(Uniform Resources Locator)/web
address/ protocol address. The document residing on web sites are called web pages. The
web pages use HTTP. Home Page is the top-level web page of a web site. When a web-
site is opened, its home page is displayed. Web portal is a web site, which hosts other
web sites. In other words, a web portal has hyper links to many other web sites. By clicking
upon these links the corresponding web sites can be opened. www.yahoo.com is an
example of web portal. Other examples are:- www.indiatimes.com , www.khoj.com etc.
8. Web hosting : is a means of hosting web server application on a computer system through
which electronic contents on the Internet is readily available to any web browser client.The
computer system providing the web hosting is known as web-server or the web host.
9. Web scripting : The process of creating and embedding scripts in a web page is known as
web-scripting. Scripts are of two types: client-side scripts and server side scripts. Client
side scripting enables interaction within a web page. They are downloaded at the client
end and then interpreted and executed by the browser. Some popular client side scripting
languages are VBScript, Javascript, Hypertext preprocessor(PHP). Server side scripting
enables the completion of the task at the server end and then sending the result to the client
end.Some popular server side scripting languages are Hypertext preprocessor(PHP),
ASP(Active Server Pages) and JSP(Java server pages).
10. Web 2.0 - Web2.0 is a tool that empower us to make our voice heard on the
internet. It allows people who have access to the internet to write to it – sharing
experiences, knowledge, insights, views, theories, and other ideas. This can be
done by means of text, graphics, sound and video. Web 2.0 is also used for social
networking. Example: Social Networking Sites, Blogs, Facebook, Video Sharing
Sites, Video Conferencing Applications etc.
18
Classification of cyber crime
The information technology act deals with the following cyber crimes along with the others:-
4.Child pornography -Child pornography is a part of cyber pornography and it is such a grave
offence that it is individually also recognized as a cyber crime.
6.Breach of confidentiality and privacy-Any person who, secures access any electronic record
,book register, correspondence, information ,document or other material to any other material
without the consent of the person concerned or discloses such electronic record,book,register,
correspondence, information,document or other material to any other person shall be liable to be
punished under the information technology act
IPR Issues-
The intellectual property (IP) may be defined as a product of the intellect that has commercial
value,including copyrighted property such as literacy or artistic works and idea.
SPAM
spam refers to electronic junk mail or junk newspaper message.
VIRUS PREVENTION
Virus prevention is not a difficult task. All you need to be is extra careful and ensure to
follow the following guidelines to lead virus free computing life.
1) Never use a “ foreign “ disk or cd without scanning it for viruses.
2) Always scan files downloaded from the internet or other sources.
3) Never boot your pc from a floppy unless you are certain that it is a virus free.
4) Write protect your disc
5) Use licensed software
6) Password protect your pc to prevent unattended modification.
7) Make regular backups
8) Install and use antivirus software
9) Keep antivirus software up to date
OSS- Open Source Software – category of software that can be freely used but does
have to be free of charge.
Shareware - Software that is made available with the right to redistribute copies but it is
stipulated that if one intends to use the software, often after certain period of time, then
the license fee should be paid. Source code is not available and no modification is
possible.
Proprietary software – Software that is neither open nor freely available. Modification
and redistribution is either forbidden or requires special permission. Source code is not
available.
FLOSS – Free Libre& Open Source software – software that is free as well as open
source software.
FSF- Free Software Foundation – Non profit organization created for the purpose of
supporting free software movement.
OSI- Open Source Initiative – organization dedicated to the cause of promoting OSS.
W3C – World Wide Web Consortium – organization responsible for producing the
software standards for world wide web
20
Cloud computing :
a proprietary network or a data center that supplies hosted services to a limited number
of people. When a service provider uses public cloud resources to create their private
cloud, the result is called a virtual private cloud. Private or public, the goal of cloud
computing is to provide easy, scalable access to computing resources and IT services.
Board Questions :
Q1. IndianSchool is setting up the network between its different wings. There are
four wings namely : Seniors (S), Juniors (J), Admin (A) and Hostel (H).
i) Suggest the suitable topology for networking the computers of all the wings.
Ans. Star topology can be used to network the computer of all wings.
ii) Name the wing where the server is to be installed. Justify your answer.
Ans. The server should be installed in Wings S, as Wing S has maximum number of
computer and installing the server in this wing will help to reduce the network
traffic.
Q2. The Cyber Mind Organisation has set up its new Branch at Mizoram for its office
and web based activities. It has a Wings of buildings as shown in the diagram:
Wing Wing
Z Y
Wing
U
Wing
X
Number of Computers
Wing X 50
Wing Z 130
Wing Y 40
Wing U 15
i) Suggest a most suitable cable layout of connections between the Wings and
topology.
ii) Suggest the most suitable place (i.e., Wing) to house the server of this
organization with a suitable reason with justification.
iii) Suggest the placement of the following devices with justification:
(1) Repeater (2) Hub / Switch
iv) The organization is planning to link its head office situated in Delhi with the
offices as Mizoram. Suggest an economic way to connect it; the company is
ready to compromise on the speed of connectivity. Justify your answer.
Wing Wing
Z 23 Y
Wing
Wing U
X
iii) Suggest the most suitable place (i.e., Wing) to house the server of this
organization with a suitable reason with justification.
Ans. The most suitable place to house the server is WingZ as it has most number
of computers. It will save on the cabling cost and most of the traffic will be
local as per 80 : 20 rule of network design.
iv) The organization is planning to link its head office situated in Delhi with the
offices as Mizoram. Suggest an economic way to connect it; the company is
ready to compromise on the speed of connectivity. Justify your answer.
Ans. An economic way of connecting is Dial-up or broadband as it can connect
two computers at an economic rate though it provides lesser speed than other
expensive methods.
24