Uploaded by zunairashirgaonkar

IP Theory Notes (3)

advertisement
INTRODUCTION TO COMPUTER NETWORK
1. Computer Network: The collection of interconnected computers is called a computer network.
2. LAN – Local Area Network: When the network of computer is confined to a small or localised
area, it is known as Local Area Network (LAN).
3. MAN – Metropolitan Area Network: A metropolitan area network is the network which is
spread over a city.
4. WAN – Wide Area Network: The network of computers which is spread across the countries
probably over the entire world is known as a Wide Area Network (WAN).
5. PAN – Personal Area Network: PAN refers to a computer network, which is used for
communication among computer devices spread over a few meters.
6. Switch: A switch is a network device which is used to interconnect computers or devices on a
network.
7. Repeater: A repeater is a device that is used to amplify and regenerate a signal which is on its
way through a communication channel.
8. Gateway: It connects different computer networks so that information can be passed between
them.
9. Router: A device that forwards data packets from one network to another by finding the
shortest route, based on an internal routing table
10. Nodes: It refers to the computers that are attached to a network and are seeking to share the
resources.
11. Server: A computer that facilitates the sharing of data, software and hardware resources on the
network is called server.
12. Modem: A modem (modulator/demodulator) is a hardware device that allows a computer to
send and receive information over telephone lines.
13. Hub: A hub is an electronic device that connects several nodes to form a network and redirects
the received information to all the connected nodes in broadcast mode.
14. Bus Topology: Bus topology is a topology for a Local Area Network (LAN) in which all the nodes
are connected to a single cable.
15. Terminator: The starting and ending point of cable is called terminator.
16. Star Topology: A star topology is a topology where all the computers connect to the single
central computer using it as a hub.
17. Tree Topology: Tree topology is a topology which has a root node and all other nodes are
connected to it forming a hierarchy. It is also called hierarchical topology.
18. Mesh Topology: Mesh topology is a group of nodes which are all connected to each other and
many types of connections are possible in a mesh topology.
19. Internet: Internet is a massive network of networks which connects millions of computers
together globally, forming a network in which any computer can communicate with another
computer.
20. World Wide Web (WWW): World Wide Web is an information system that identifies all the web
resources by Uniform Resource Locator (URL).
21. Uniform Resource Locator (URL): A URL is the address of a given unique resource on the Web
that matches users to a specific resource online.
22. E-mail: E-mail is defined as the transmission of messages over communications networks.
23. Messages: Messages are notes entered from keyboard and sent over internet using computer or
mobile.
24. Chat: Chat refers to any kind of communication over the Internet that offers a real-time
transmission of text messages from sender to receiver.
25. VoIP: Voice over Internet Protocol (VoIP) is a technology that allows you to make voice calls
using a broadband Internet connection instead of a regular phone line.
26. Website: Website is a collection of web pages which are grouped and connected together in
various ways.
27. Webpage: A document which can be displayed in a web browser is called Webpage.
28. Web Server: Web server is a computer that stores web server software and a website's
component files.
29. Web Hosting: Web hosting is an online service that enables you to publish your website or web
application on the internet.
30. Web Brower: Web browser is an application used to access and view websites.
31. Plug-ins: A software component that adds a specific feature to an existing computer program is
called plug-ins.
32. Add-ons: Add-ons are hardware units that can be added to a computer to increase the
capabilities or a program unit that enhances primary program.
33. Cookies: Cookies are small files which are stored on a user’s computer and contains information
such as webpages visited in the past, log-in details, etc.
34. HTTP: The information over the web is shared using a protocol called Hyper Text Transfer
Protocol (HTTP).
35. Hyper Text Mark-up Language (HTML): It is a mark-up language that defines a web page and is
used to create HTML documents.
36. Static Webpages: Static web pages are simple HTML written pages which serve as response from
browser to server in which all the information and data is static in nature.
37. Dynamic Webpages: Dynamic webpages are the pages written in some complex language in
which data is rendered after some interpretation and capacity to produce distinctive content for
different calls.
SOCIETY, LAW AND ETHICS
1. Digital Footprint: A digital footprint is a body of data that you create while using the Internet.
2. Net Etiquette: Net Etiquette are the rules that have developed as people have begun to
communicate and interact on the Internet.
3. Communication Etiquette: It refers to the accepted codes of conduct with respect to
interpersonal communication.
4. Data Protection: Data protection refers to the practices, safeguards, and binding rules put in
place to protect your personal information and ensure that you remain in control of it.
5. Personal Data: Personal data is any information relating to you, whether it relates to your
private, professional or public life.
6. Intellectual Property Rights (IPR): It refers to the rights of the owner of information to decide
how much information is to be exchanged, shared or distributed.
7. Plagiarism: It refers to stealing someone else’s intellectual work and representing it as your own
work without citing the source of information.
8. Paraphrasing: The act of changing the words or sentence construction of a copied document is
called paraphrasing.
9. Accidental Plagiarism: It involves careless paraphrasing, quoting text excessively along with poor
documentation.
10. Deliberate Plagiarism: It includes copying someone else’s work or any kind of information from
electronic sources without the permission of the original author.
11. Digital Property: It refers to any information about you or created by you that exists in digital
form, either online or electronic storage device.
12. Free Software: It is a software that is freely accessible and can be freely used, changed,
improved, copied and distributed by all who wish to do so.
13. Open Source Software: It is a software that can be freely used but does not have to be free of
charge.
14. Free and Open Source Software (FOSS): It refers to the software which is free as well as open.
15. Privacy: It is the protection of personal information given online.
16. Online Fraud: It is the fraud committed using the internet.
17. Cyber Crime: It is any criminal offense that involves the use of electronic communications or
information systems.
18. Phishing: It is the practice of attempting to acquire sensitive information from individuals over
the Internet by means of deception.
19. Scams: Any fraudulent business practice that extracts money from an unsuspecting, ignorant
person is called scam.
20. Online Scams: Scams that are committed over the Internet are called online scams.
21. Copyright: It is a form of protection given to the authors of “original works of authorship”.
22. Software Copyright: It is used by software developers and proprietary software companies to
prevent the unauthorized copying of their software.
23. Cyber Law: It is a generic form which refers to all the legal and regulatory aspects of Internet
and the World Wide Web.
24. Hacking: Hacking is an unauthorised access to or control over computer network security
systems for some illicit purpose.
25. Cyber Bullying: Cyber bullying is the harassment or bullying executed through digital devices.
26. E-waste: E-waste broadly covers waste from all electronic and electrical appliances and
comprises of items such as computers, mobile phones, etc.
27. Identity Theft: It occurs when someone uses another person’s personal information to take on
that person’s identity in order to commit fraud or other crimes.
TYPES OF TOPOLOGIES – ADVANTAGES AND DISADVANTAGES:
1
Topology Name
Bus Topology



2
Tree Topology




3
Star Topology


Advantages
Easy to install
Requires less cable length, i.e.,
cost effective
Failure of a node does not
affect the network



Extension of bus and star
topology
Easy expansion of nodes
Easily managed and maintained
Easy error detection



Easy to trouble shoot
Single node failure does not
affect the entire network



Disadvantages
Entire network might break
due to terminator fault
Not suitable for large number
of computers
Only one node can transmit
data at a time
Heavily cabled
Costly
Difficult to maintain when
more nodes are added
Network fails when central
hub fails
Difficult to expand
Longer cable is required


4
Mesh Topology


Easy fault detection and
removal of faulty parts
Network is not affected when
workstation fails
Possible to transmit data from
one node to many nodes
Easy diagnosis of fault





Expensive due to cost of hub
and longer cables
Entire network fails if hub
fails
Difficult to install and
configure
Cabling cost is more
Bulk wiring is required
IT (AMENDMENT) ACT, 2008:





In India, the cyber laws are enforced through Information Technology Act, 2000, which was
notified on 17 October 2000.
Its prime purpose was to provide legal recognition to electronic commerce and to facilitate filing
of electronic records with the Government.
The act was later amended in December 2008 through the IT (Amendment) Act, 2008.
It provided additional focus on Information Security.
The Information Technology Amendment Act, 2008 came into force from October 27, 2009
onwards.
E-WASTE DISPOSAL PROCESS:
A. Dismantling:
 Removal of parts containing dangerous substances
 Removal of easily accessible parts containing valuable substances
B. Segregation:
 This separation is done in a shredder process
C. Refurbishment and Reuse:
 It has potential for those used electrical and electronic equipments which can be easily
refurbished to put to its original use
D. Recycling:
 Ferrous metals in electrical
 Non-ferrous metals in smelting plants
 Precious metals in separating works
E. Treatment of Dangerous Waste:
 Shredder light fraction is disposed off in landfill sites or incinerated
 Chlorofluoro-carbons are treated thermally
 Printed Circuit Board is incinerated or disposed off in underground storages
 Mercury is recycled or disposed off in underground landfill sites
Download