Teachers and Examiners (CBSESkillEduction) collaborated to create the Networking and Internet Class 11 Notes. All the important Information are taken from the NCERT Textbook Information Technology (802) class 11.
Networking and Internet Class 11 Notes
Evolution of Networks and Internet
The idea of the Internet was developed in 1969, and since then, it has undergone a number of technological and infrastructure modifications, as will be explained below: The idea behind Advanced Research Project Agency Network served as the basis for the creation of the Internet (ARPANET). The American Department of Defense created ARPANET.
TCP/IP (Transmission Control Protocol/Internet Protocol) was created in 1970 in response to the need for communication among multiple heterogeneous networks. The U.S. National Science Foundation created NSFNET, a large network, along with many other smaller networks, in 1984 for use in research and teaching. The network grew significantly once ARPANET and NSFNET were linked. The TCP/IP protocol (communication rules) served as a glue to join different heterogeneous networks into a single network. The Internet (a network of networks) is this large network.
Electronic equipment that exchange data or messages with one another, such as computers, printers, fax machines, and telephones, are referred to as nodes or stations.
a. Sender – The node that is responsible for sending the data.
b. Receiver – The node that is responsible for receiving the data.
c. Message – Message is the information or meaningful data that is being communicated in a structured form.
d. Channel – Channel is the communication medium through which message is transmitted
A computer network is made up of a number of connected nodes that communicate over a channel. There are three types of computer network communication:
1. Simplex – Information can only be transmitted in one way in simplex mode. It is known as a unidirectional mode. The data transferred via numerous fibre optics and satellites in computer networks is straightforward in nature.
2. Half-duplex – Only one node at a time can broadcast data in the half-duplex mode, which allows for bidirectional communication between the two nodes. In low-bandwidth situations, this mode is typically used to transfer files between nodes.
3. Full-duplex – In full-duplex mode, both communicating parties can send and receive at the same time. NIC (Network Interface Card) supports full-duplex mode.
The channel of transmission through which data can be sent as a signal from one node to another is referred to as a transmission medium.
There are two type of transmision medium –
- Guided Medium
- Unguided Medium
1. Guided Medium – In guided medium, the data transmitted in a cable system that has a fixed path. for example Co-axil, UTP, Optical fiber cable, etc.
2. Unguided Medium – In Unguided medium, the data transmit through free space in the form of electromagnetic signal. for example, radio waves, lasers, micro waves etc.
Repeater – With increase in distance, a signal may become weak and distorted. A repeater is used to restore the input signal to its original form, so that it can travel a larger distance.
Hub – A hub joins multiple lines, sometimes known as cable segments, as opposed to a repeater which links only two wires. A hub has multiple input/output (I/O) ports, each of which is connected to a single device.
Bridge – In order to create a larger local area network (LAN), smaller LANs can be combined using bridges, which are multiport devices used to connect two or more LANs.
Switch – Switches are used to connect individual nodes in the network with one another, as opposed to bridges, which join two or more LAN segments.
Router – Routers are used to link different networks (LAN or WAN) collectively. Data from an incoming network is sent to another network via a router. A router keeps track of different networks’ routing tables. The router chooses which network the incoming packet should be sent to based on the destination address.
Gateway – A gateway enables communication across networks based on various protocol systems. Data from one network that uses one protocol is translated to the outgoing network’s protocol before being forwarded.
On the basis of geographical span, network can be broadly categorized as PAN, LAN, MAN, and WAN.
Personal area network – An individual’s workspace can be connected to a computer network called a personal area network (PAN) . for example, connection between PCs and smartphone, PCs and tables, PCs and printer etc.
Local area network – Local Area networks are private networks and can span a radius of up to 1 Km. They are generally established within a building or campus. LANs operate at a speed in the range 10 Mbps to 1 Gbps.
Metropolitan Area Network – These networks, which have a radius of up to 50 km, are used to create connections within cities. Resources can be shared more easily because to MANs, which link different local area networks. a city-based cable television network, as an example.
Wide Area Network – A WAN typically covers a distance of roughly 1000 km. They are useful for linking isolated places and for long-distance communication. They create connections inside a nation or continent. A WAN may be owned and operated by a number of different companies. It links numerous metropolitan and local area networks.
Network topology refers to the positioning of nodes in a network, often known as their layout. or the arrangement of nodes in a network is called network topology. there are two type of topologies –
- Broadcast – All nodes share the same physical link one node transmit and other receive. for example, Bus and Ring topologies.
- Point to point – Every pair of nodes has a dedicated link. for example, Star and Mesh topologies.
In a bus topology, several nodes are connected by a lengthy cable known as the backbone cable (or just the backbone) using a connector known as the tap. This topology requires less cabling and is easy to install and extend the network laid using it. However, fault detection and isolation is difficult.
In a ring topology, all devices are connected by a cable that forms a ring. The intended recipient of the message is reached by way of a one-way transmission of the intended message. The problem of network is it take longer time to send a message from one node to another node.
All of the devices in a star topology are connected to the hub, which serves as the central controller. Any two devices can communicate with each other through the hub that relays messages. Installation and configuration of the star network are simple.
In a mesh topology, every node in the network is linked to every other node. The topology offers secure data transfer without any traffic issues because every conceivable pair of nodes has a dedicated point-to-point connection.
A hybrid topology that combines bus and star topologies is called tree topology. In a bus topology, the primary backbone cable functions as the tree’s trunk, and star networks (and even individual nodes) are connected to it like the tree’s branches.
Identification of computers and users over a network
A network interface controller (NIC) is given a media access control address (MAC address), which it can use as a network address in communications inside a network segment. Ethernet, Wi-Fi, and Bluetooth are just a few of the IEEE 802 networking technologies that frequently employ this application.
MAC addresses are 12-digit hexadecimal (or 48 bit) numbers. By convention, MAC addresses are usually written in one of the following two formats:
MM:MM:MM: SS: SS:SS
Every computer in a network has an additional unique identification code called an IP Address. The four bytes (or 32 bits) that make up an IP address can range in value from 0 to 255. A typical IP address appears as follows:
IP addresses are typically written in decimal format as a “dotted decimal number” like the one above to make them simpler for humans to remember.
An Internet physical IP address is linked to an easy-to-remember name known as a domain name, which is frequently just referred to as a domain. It is the distinctive name that follows the @ symbol in email addresses and the www. prefix in web addresses.
Names and Country-Specific Domain Names. For example
Generic Domain Names:
·com – commercial business
·edu – Educational institutions
·gov – Government agencies
·mil – Military
·net – Network organizations
·org – Organizations (nonprofit)
Country Specific Domain Names:
.in – India
·au – Australia
·ca – Canada
.ch – China
.nz – New Zealand
.pk – Pakistan
.jp – Japan
.us – United States of America
Domain Name Resolution
The process of turning a domain name into an IP address is known as domain name resolution. Since one IP address can correlate to many domain names and one domain name to one IP address, multiple domain names can simultaneously be resolved to the same IP address.
Internet and its Terminology
The capacity to use reading, writing, technological expertise, and critical thinking to navigate our digital world is known as digital literacy. It involves using technology to find, assess, and transmit information, including devices like a smartphone, PC, e-reader, and more.
Network services are programmes that are hosted by servers on a computer network and offer functionality to network users. The Internet has several uses, including e-mail, file sharing, remote login, and the World Wide Web (WWW).
- Electronic Mail (E-Mail) – A multimedia attachment, such as text, audio, an image, or a video, may be included with an email in addition to being a textual message. The email may be sent to one or more intended recipients by the sender.
- File Transfer – FTP is used to transfer files from one computer to another using a TCP-based network (File Transfer Protocol). Client-server architecture is the foundation of File Transfer Protocol.
Local hosts (clients) can download or upload files to distant hosts using FTP (server).
- Remote Login (TELNET) –The acronym for this network is TELNET. It is a client-server programme that enables users to connect to remote systems while logged in to one system.
- World Wide Web (WWW) – The World Wide Web (WWW), also referred to as the “web,” is a collection of connected information stored on devices that are dispersed across the Internet.
Internet Protocol Suite
Protocol is set of rule, The common network model and communication protocol stack used on the Internet and in the majority of other computer networks is known as the Internet Protocol Suite (IP suite). The IP suite is largely the global standard for computer-to-computer communication, despite the existence of alternate networking paradigms.
These sub-tasks or functions are performed by different layers of TCP/IP mode
Data or a message is formed at the sending end and reviewed and processed at the receiving end. The message that will be sent with the header must likewise be enclosed by this layer. On this layer, a number of protocols like HTTP (HyperText Transfer Protocol) and POP3 (Post Office Protocol version 3) operate.
The message is sent from the application layer to the transport layer, which appends the source and destination ports of the processes at the two ends. At this layer, two end-to-end protocols—TCP and UDP—are in use. When timely and error-free data transport is crucial, TCP (Transmission Control Protocol) is a dependable connection-oriented protocol that is required.
The Internet layer receives the segments from the transport layer and adds the source and destination machine network addresses (also termed IP address). IP, or Internet Protocol, is utilised at the Internet layer. The format of packets sent over the Internet is specified by IP.
Host to Internet layer is another name for link layer. The header containing the sender and receiver physical addresses must be included by this layer to the packet that was received from the Internet layer.
Cyber Threats and Cyber Security
Malicious software (programmes) created with the purpose of interfering with system performance by harming the system, gaining unauthorised access to the system, or preventing legitimate users from using computing resources are referred to as malware. Malware includes viruses, worms, and Trojan horses.
Virus – A virus is a software code that may harm your system by overwriting or corrupting the system files.
Worm – A worm is often received via network, and it automatically keeps on creating several copies of itself on the hard disk thereby flooding the hard disk. When a worm is received as an email attachment, it is automatically forwarded to the recipients leading to network congestion.
Trojan Horse – Trojan Horse is a code that appears to be desirable and useful but ends up harming the
system. Trojan horse can attach itself with a safe application. For example, it may be attached to any game downloaded over the Internet. Such an application when executed creates a backdoor in the system through which a hacker can access the system.
The act of surreptitiously or covertly listening to another person’s private discussion or communications without that person’s agreement is known as eavesdropping. Telephone lines, cellphone networks, email, and instant messaging are all used for eavesdropping.
Denial of Service
A cyberattack known as a denial-of-service (DoS) attack renders a system or network resource inaccessible to its users by temporarily or permanently interrupting services.
The practise of stealing a user’s personal information through fraudulent mail is known as phishing.
These emails either include embedded forms that request personal information from you or include links to web pages that might ask you for it.
Cybercrimes are crimes including theft, fraud, and forgery that involve the improper use of computers or the Internet. According to the IT Act, cybercrime is any illegal activity in which a computer is either a tool, a target, or both. These crimes include some of those listed below –
- Cyber bullying – Harassment or bullying inflicted through the use of electronic or communication devices such as computer, mobile phone, laptop, etc.
- Cyber stalking – Use of electronic communication by a person to follow a person or attempts to contact a person to foster personal interaction repeatedly despite a clear indication of disinterest by such person.
- Online Job Fraud – An attempt to defraud people who need employment by giving them a false hope/ promise of better employment with higher wages.
- Vishing – To seek personal information like Customer ID, Net Banking password, ATM PIN, OTP, Card expiry date, CVV etc. through a phone call.
- SMSing – Use of mobile phone text messages to lure victims into calling back on a fraudulent phone
number, visiting fraudulent websites or downloading malicious content via phone or web.
- SIM Swap Scam – Getting a new SIM card against a registered mobile number
- Credit card (or debit card) fraud – An unauthorized use of another’s credit or debit card information for the purpose of purchases or withdrawing funds from it.
- Identity theft – Dishonestly making use of the electronic signature, password or any other unique
identification feature of any other person.
- Spamming – Persuading a recipient to buy a product or service, or visit a website via email, SMS, MMS
where he can make purchases.
- Ransomware – The victim is asked to pay the demanded ransom to get his device decrypts.
Network Security Tools and Services
Network layer security
TCP/IP protocols may be secured with cryptographic methods and security protocol like Secure Sockets Layer (SSL).
An organization’s previously set security policies are used to monitor and filter incoming and outgoing network traffic through a firewall, a network security device. A firewall is essentially the barrier that stands between a private internal network and the open Internet at its most basic level.
Viruses and other types of dangerous software can be found and eliminated from your computer or laptop using an antivirus package. Malicious software, also referred to as malware, is computer code that can damage your computers, laptops, and the data they contain.
A password manager is a piece of software that aids in organising and storing passwords. In order to access their complete password database from top to bottom, users of password managers typically need to generate a master password, which should be a single, extremely strong password.
Cyber laws serve as a deterrent to illicit cybercrime and regulate the systematic use of e-resources, such as e-business. To prevent cybercrimes and prosecute those responsible, numerous cyber laws have also been passed. These laws specify the punishment that will be meted out to those who violate the laws.
Employability Skills Class 11 Notes
- Unit 1 : Communication Skills Class 11 Notes
- Unit 2 : Self-Management Skills Class 11 Notes
- Unit 3 : Information and Communication Technology Skills Class 11 Notes
- Unit 4 : Entrepreneurial Skills Class 11 Notes
- Unit 5 : Green Skills Class 11 Notes
Employability Skills Class 11 MCQ
- Unit 1 : Communication Skills Class 11 MCQ
- Unit 2 : Self-Management Skills Class 11 MCQ
- Unit 3 : Information and Communication Technology Skills Class 11 MCQ
- Unit 4 : Entrepreneurial Skills Class 11 MCQ
- Unit 5 : Green Skills Class 11 MCQ
Employability Skills Class 11 Questions and Answers
- Unit 1 : Communication Skills Class 11 Questions and Answers
- Unit 2 : Self-Management Skills – III
- Unit 3 : Information and Communication Technology Skills Class 11 Questions and Answers
- Unit 4 : Entrepreneurial Skills Class 11 Questions and Answers
- Unit 5 : Green Skills Class 11 Questions and Answers
Information Technology Class 11 Notes
- Unit -1 : Computer Organization Class 11 Notes
- Unit -2 : Networking And Internet Class 11 Notes
- Unit-3 : Office Automation Tools Class 11 Notes
- Unit-4: RDBMS Class 11 Notes
- Unit-5: Fundamentals of Java Class 11 Notes
Information Technology Class 11 MCQ
- Unit -1 : Computer Organization Class 11 MCQ
- Unit -2 : Networking And Internet Class 11 MCQ
- Unit-3 : Office Automation Tools Class 11 MCQ
- Unit-4: RDBMS Class 11 MCQ
- Unit-5: Fundamentals of Java Class 11 MCQ