0% found this document useful (0 votes)
7 views

Networking_Advanced

Uploaded by

kaushalsikdar63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views

Networking_Advanced

Uploaded by

kaushalsikdar63
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 31

Networking

By Kaushal sikdar
XII’C’
introduction to Computer
Networks
A computer network is a system of interconnected devices
that communicate and share resources. It enables data
exchange, resource sharing (e.g., printers, files), and improved
communication. Networks range from small (LAN) to large-
scale (WAN) setups, utilizing hardware like routers and
switches and protocols like TCP/IP for efficient data transfer.
Types of network
Types of networks include
• LAN (Local Area Network) for small areas like homes or offices.
• WAN (Wide Area Network) for large geographic regions.
• MAN (Metropolitan Area Network) for cities.
• PAN (Personal Area Network) for personal devices.
• SAN (Storage Area Network) for data storage.
• VPN (Virtual Private Network) for secure remote access.
Network Devices
Network devices facilitate communication within a network.
Key devices include
• Hub (broadcasts data)
• Switch (directs data to specific nodes)
• Router (routes data based on IP)
• Bridge (connects LANs)
• Gateway (connects different networks)
• Modem (converts signals)
• Repeater (amplifies signals)
• NIC (enables network connection on devices)
Network topologies
Network topologies define the layout of a network.
Common types include:-
• Bus (single central cable),
• Star (nodes connected to a central hub),
• Ring (nodes form a circular chain),
• Mesh (multiple interconnected paths),
• Tree (hierarchical structure).

Each topology affects performance, scalability, and fault tolerance


differently.
Protocols
Protocols are rules governing data communication in networks.
Key protocols include;
• HTTP (web communication)
• TCP/IP (data transmission and routing)
• FTP (file transfer)
• SMTP (email sending)
• DNS (domain name resolution)

They ensure reliable, secure, and standardized communication between


devices across diverse networks and the internet.
IP Addressing
IP addressing assigns unique identifiers to devices in a network.
IPv4 uses 32-bit addresses, while IPv6 uses 128-bit.
Types include
public (internet access)
private (local networks)
static (unchanging)
dynamic (temporary)
Subnetting divides networks for efficiency, enabling devices to
communicate within and across networks using IP-based routing.
Network Security
Network security protects networks from unauthorized access, cyber
threats, and data breaches.
Measures include:-
• firewalls (filter traffic),
• Encryption (secure data transfer),
• Authentication (verify user identity).

It combats threats like malware, phishing, and denial-of-service attacks,


ensuring data integrity,confidentiality, and availability in both wired and
wireless networks.
Internet Concepts
Internet concepts encompass web servers (host websites), web clients
(access websites),URLs (locate resources online), and DNS (maps domain
names to IPs).Technologies like HTTP/HTTPS enable data transfer,
while search engines index information. Cloud computing provides
remote data storage and services,fostering connectivity and resource
sharing globally.
MCQ’S
(20 question related to networking)
1. A Computer Network:
a) Is a collection of hardware components
b) Is interconnected by communication channels
c) Allows sharing of resources and information
d) All of the above

Answer: d
2. What is the use of Bridge in the Network?
a) To connect LANs
b) To separate LANs
c) To control network speed
d) All of the above

Answer: a
3. Which of these is not a communication channel?
a) Satellite
b) Microwave
c) Radio wave
d) Wi-Fi

Answer: d
4. Each IP packet must contain:
a) Only Source address
b) Only Destination address
c) Source and Destination address
d) Source or Destination address

Answer: c
5. What is a Firewall in computer network?
a) The physical boundary of network
b) An operating system of computer network
c) A system designed to prevent unauthorized access
d) A web browsing software

Answer: c
6. MAN Stands for _____.
a) Metropolitan Area Network
b) Main Area Network
c) Metropolitan Access Network
d) Metro Access Network

Answer: a
7. Which of the following is not the Networking
Devices?
a) Gateways
b) Linux
c) Router
d) Firewalls

Answer: b
8. The term HTTP stands for?
a) Hyper terminal tracing program
b) Hypertext tracing protocol
c) Hypertext transfer protocol
d) Hypertext transfer program

Answer: c
9. Which one of the following is the most common
internet protocol?
a) HTML
b)NetBEUI
c)TCP/IP
d)IPX/SPX

Answer: c
10. Which one of the following is not a network
topology?
a) Star
b)Ring
c)Bus
d)Peer to Peer

Answer: d
11._________________ is a collection of many separate
networks
a) A MAN
b) An internet
c) A LAN
d) None of the above
Answer: b
12. The topology in which all nodes are individually
connected to a central connection point:
a) Ring
b)Bus
c)Star
d)Tree

Answer: c
13. It can be a software program or a hardware
device that filters all data packets coming through
the internet, a network, etc) it is known as
the_______:
a) Antivirus
b)Firewall
c)Cookies
d)Malware
14. Which of the following is considered as the
unsolicited commercial email?
a) Virus
b)Malware
c)Spam
d)All of the above

Answer: c
15. The term “TCP/IP” stands for_____
a) Transmission Contribution protocol/ internet protocol
b)Transmission Control Protocol/ internet protocol
c)Transaction Control protocol/ internet protocol
d)Transmission Control Protocol/ internet protocol

Answer: b
16. In order to ensure the security of the data/
information, we need to ____________ the data:
a) Encrypt
b)Decrypt
c)Delete
d)None of the above

Answer: a
17. Firewall is the type of ………..
a) Virus
b) Security threats
c) Worm
d) None of the above

Answer: d
18. MAC address is also called ______.
a) Physical address
b)Logical address
c)Source address
d)Destination address

Answer: a
19. Which of the following devices is not a
networking device?
a) Hub
b)Switch
c)Bridge
d)None of these

Answer: d
20. A collection of hyperlinked documents on the
internet forms the ?
a) World Wide Web (WWW)
b)E-mail system
c)Mailing list
d)Hypertext

Answer: a
Thank you
(for watching patiently)

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy