Unit-1 BASICS OF NETWORKING AND WEB ARCHITECTURE Important Notes
Here you will get important point of Unit 1 of CBSE syllabus subject code 803.
Unit-1 BASICS OF NETWORKING AND WEB ARCHITECTURE Important Notes
Important Point to remember:
Network: A collection of independent computers that communicate with one another over a shared network medium.
● Node: A computer attached to a network.
● Server: A computer that facilitates sharing of data, software and hardware resources on the network.
● Network Interface Unit (NIU): A device that helps to establish communication between the server and workstations.
● Circuit switching: A technique in which a dedicated and complete physical connection is established between two nodes for communication.
● Packet switching: A switching technique in which packets are routed between nodes over data links shared with other traffic
● Channel: A medium that is used in the transmission of a message from one point to another.
● Bandwidth: The range of frequencies available for transmission of data
● Personal Area Network (PAN): A computer network organized around an individual person.
● Local Area Network (LAN): A network in which the devices are connected over a relatively short distance.
● Metropolitan Area Network (MAN): A network which spans a physical area ( in the range of 5 and 50 km diameter) that is larger than a LAN but smaller than a WAN.
● Wide Area Network (WAN): A network which spans a large geographical area, often a country or a continent
● Transmission Medium: One which carries a signal from one computer to another.
● Modem: A device that enables a computer to transmit data over, telephone or cable lines. RJ-45: An eight wired connector used to connect computers on a LAN.
● Ethernet card: A kind of network adapter.
● Switch: A small hardware device that joins multiple computers together within a LAN.
● Repeater: An electronic device that amplifies the received signal and then retransmits it on the network
● Router: A network device that connects two networks with different protocols.
● Gateway: A network device that connects two dissimilar networks.
● Wi-Fi card: A small, portable card that allow your computer to connect to the internet through a wireless network.
● Protocol: A special set of rules that two or more machines on a network follow to
communicate with each other.
● Transmission Control Protocol(TCP): It breaks the data into packets that the network can handle efficiently.
● Internet protocol(IP): It gives distinct addresses (called IP address) to each data packet.
● File Transfer Protocol (FTP): It is used for transferring files from one system to another on the internet.
● Hypertext Transfer Protocol (HTTP): It is the protocol that is used for transferring hypertext files on the World Wide Web.
● Point-to-Point Protocol (PPP): It is used for communication between two computers using a serial interface.
● Simple Mail Transfer Protocol (SMTP): It allows transmission of email over the Internet.
● Post Office Protocol 3(POP3): It receives and holds email for an individual until they pick it up.
● Telnet: A protocol for creating a connection with a remote machine.
● IRC: IRC protocol is used for chatting. It is based on client/server model.
● VOIP: VOIP stands for voice over internet protocol. It enables the transfer of voice using a packet switched network rather than using a public switched telephone network.
● A MAC (Media Access Control) address is a unique 12 digit (6 digits for manufacturer code and 6 digits for serial number) hexadecimal number assigned to each NIC. MAC address of an NIC never changes.
● An IP (Internet Protocol) address is a unique 4 digit hexadecimal number assigned to each node on a network.
● Domain Name is a name assigned to a server through Domain Name System (DNS). A domain name usually has more than one parts: top level domain name or primary domain name and sub-domain name(s).
● Domain Name Resolution is the process of getting corresponding IP address from a domain name.
● Malware: The term malware refers to malicious software (programs) designed with the intention to affect the normal functionality by causing harm to the system, or with the intention of getting unauthorized access to the system, or denying access to legitimate users of computing resources.
● Virus: Virus is a malicious program that attaches itself to the host program. It is designed to infect the host program and gain control over the system without the owner’s knowledge.
● Worm: Worm is also a malicious program like a virus. But unlike viruses, it does not need to attach itself to a host program. A worm works by itself as an independent object.
● Trojan horse: A Trojan horse is a program that contains hidden malicious functions. Trojan Horses trick users into installing them by appearing to be legitimate programs.
● Spam: The term spam means endless repetition of worthless text. In other words, unwanted messages or emails are known as Spam.
● Cookies: This small text file is a cookie. Generally a cookie contains the name of the website that it has come from and a unique ID tag.
● Firewall: A firewall is hardware or software based network security system. It prevents unauthorized access (hackers, viruses, worms etc.) to or from a network.
● Cyber Crime: Cybercrime is defined as a crime in which a computer and internet is used in an illegitimate way to harm the user.
● Cyber Law: Cyber law is an attempt to integrate the challenges presented by human activity on the internet with a legal system of laws applicable to the physical world. Intellectual property rights are the rights given to an individual
over the invention of their own. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.
● Intellectual property rights (IPR) Issues: Intellectual property rights are the rights given to an individual over the invention of their own. They usually give the creator an exclusive right over the use of his/her creation for a certain period of time.
● Hacking: The term was used for people who engaged themselves in harmless technical experiments and fun learning activities.
● Cracking: Cracking can be defined as a method by which a person who gains unauthorized access to a computer with the intention of causing damage.
2 thoughts on “Unit-1 BASICS OF NETWORKING AND WEB ARCHITECTURE Important Notes”