Class XII (As Per CBSE Board) : Computer Science

Download as pdf or txt
Download as pdf or txt
You are on page 1of 18

As per Term

wise
Syllabus
2021-22

Chapter 6
Network/Email
Protocols ,mobile-
wireless technology

Computer Science
Class XII ( As per CBSE Board)
Visit : python.mykvs.in for regular updates
Network Protocols

Network protocols are sets of rules and regulations that


dictate how to format, transmit and receive data on
computer network devices – like servers, routers to
endpoints -- can communicate regardless of the
differences in their infrastructures, designs or
standards.
To successfully send or receive information, network
devices must accept and follow protocol conventions .

Visit : python.mykvs.in for regular updates


Network Protocols

TCP/IP (Transmission Control Protocol/Internet Protocol)- also referred to as


the Internet Protocol Suite, is the World Wide Web's core communication
system which enables every Internet-based device to communicate with
every other such devices simultaneously.
An IP address is the unique numerical address of a device in a computer
network that uses Internet Protocol for communication. The IP address allow
you to pinpoint a particular device from the billions of devices on the
Internet. Static IP Addresses-usually never change but they may be changed
as a result of network administration.
Dynamic IP Addresses-These IP addresses are temporary and assigned to a
computer when they get connected to the Internet each time
Two most used ip versions are ipv4 and ipv6. IPv4 is a 32-Bit IP Address. IPv6
is 128 Bit IP Address. IPv4 is a numeric address, and its binary bits are
separated by a dot (.) IPv6 is an alphanumeric address whose binary bits are
separated by a colon (:)
Visit : python.mykvs.in for regular updates
Network Protocols

IPv4 ADDRESS CLASS -

Of the five address classes, three—Class A, B, and C—were designated


for unicast single source–to–single destination communication.
Addresses in Class D were reserved for IP Multicast applications, which
allows one-to-many communication. Class E addresses were reserved
for experimental purposes.
Visit : python.mykvs.in for regular updates
Network Protocols

How TCP/IP WORKS -worksTCP/IP is a two-layered program: the higher


layer (TCP) disassembles message content into small "data packets" that
are then transmitted over the Internet to be re-assembled by the
receiving computer's TCP back into the message's original form.

Visit : python.mykvs.in for regular updates


Network Protocols

TCP/IP and Higher-Level Applications - Many higher-level


apps that ecommerce businesses need to be familiar
with utilize and/or are built on TCP/IP.
• FTP (the Internet's File Transfer Protocol)
• HTTP (the Internet's Hyper-text Transfer Protocol)
• Telnet, which enables logging on computers from
remote locations
• SMTP (Simple Mail Transfer Protocol)

Visit : python.mykvs.in for regular updates


Network Protocols

FTP – FTP, or File Transfer Protocol, is one of the standard internet protocols used to transfer data files
between a client(FTP client) and a server(FTP server) over a computer network. It was developed in the
early 1970s by Abhay Bhushan (alumni IIT Kanpur),while he was a student at MIT. FTP was initially
created to allow for the secure transfer of files between servers and host computers over the ARPANET
Network Control Program (a precursor to the modern internet).Nowadays it is being used for uploading
files on webserver after non anonymous ftp(means username and password available with
you).downloading is possible as anonymous ftp(no password is required).FTP is available in two mode –
text mode ftp(where user have to give commands in text form) and GUI ftp(graphical interaction is
possible).

Some of the more popular, and reliable, FTP Clients currently operating in the industry are
FileZilla,WinSCP,Cyberduck,gFTP
Visit : python.mykvs.in for regular updates
Network Protocols

How to work on FTP – Here we are using Filezilla.


1. Download filezilla then Install filezilla
2. Open site manager from file menu and click on new site button
3. Type credential available of any domain
4. Press ok, It will connect our computer with remote computer ,screen will be something like this

5. Left side pan will display the folder/files of our computer and right side pan will display the file
structure of remote computer.through simple drag and drop we can download upload(receive file
from remote computer to local computer) or upload(sending file to remote computer from local
computer) the files.
Visit : python.mykvs.in for regular updates
Network Protocols

Practice site for FTP


Demo for Web-based Administration:
Location: http://demo.wftpserver.com:5466/
Username: demo-admin
Password: demo-admin

Demo for Web-based Client:


Location: http://demo.wftpserver.com/ Practice it
Username: demo-user
Password: demo-user

Login using your own client with FTP, FTPS, SFTP protocol:
Location: demo.wftpserver.com
Username: demo-user
Password: demo-user
FTP Port: 21
FTPS Port: 990
SFTP Port: 2222
Courtesy - https://www.wftpserver.com/onlinedemo.htm
Visit : python.mykvs.in for regular updates
Network Protocols

Point-to-Point Protocol (PPP) is an open standard protocol that is mostly used


to provide connections over point-to-point serial links. The main purpose of PPP is to transport
Layer 3 packets over a Data Link layer point-to-point link. PPP can be configured on:
Asynchronous serial connection like Plain old telephone service (POTS) dial-up
Synchronous serial connection like Integrated Services for Digital Network (ISDN) or point-to-
point leased lines.
PPP consists of two sub-protocols:Link Control Protocol (LCP): set up and negotiate control
options on the Data Link Layer (OSI Layer 2). After finishing setting up the link, it uses NCP.
Network control Protocol (NCP): negotiate optional configuration parameters and facilitate for
the Network Layer (OSI Layer 3).
Before a PPP connection is established, the link must go through three phases of session
establishment:
1. Link establishment phase: In this phase, each PPP device sends LCP packets to configure and
test the data link
2. Authentication phase (optional): If authentication is enabled, either PAP or CHAP will be
used. PAP and CHAP are two authentication protocols used in PPP
3. Network layer protocol phase: PPP sends NCP packets to choose and configure Network
Layer protocol (OSI Layer 3) to be encapsulated and sent over the PPP data link
Visit : python.mykvs.in for regular updates
Network Protocols

HTTP - HTTP stands for hypertext transfer protocol and is used to transfer data across
the Web. It allow users of the World Wide Web to exchange information found on web
pages. When accessing any web page entering http:// in front of the address tells the
browser to communicate over HTTP.
How It Works-
It is a connectionless text based protocol. Clients (web browsers) send requests through
request object of http to web servers for web pages / images etc.Web server respond
accordingly through response object of http After this cycle(request – response), the
connection between client and server across the Internet is disconnected. A new connection
must be made for each request(means for each web page).

This diagram shows the


working of http protocol.
Working with dns server
and working with web
Server both.

Visit : python.mykvs.in for regular updates


Network Protocols

Remote login – A remote login facility permits a user who is using one computer to login to
remote computer or interact with a program on another computer. Command given at
remote location is processed by server and result displayed over remote location.

Telnet – Telnet is most popular protocol for accessing remote site/server. Using telnet client
software on our computer, we can make a connection to a telnet server (that is, the remote
host). Once our telnet client establishes a connection to the remote host, our client becomes
a virtual terminal, allowing us to communicate with the remote host from our computer. In
most cases, we need to log into the remote host, which requires that we have an account on
that system. Occasionally, we can log in as guest or public without having an
account.Generally it is used in unix based client server system to interact.

Visit : python.mykvs.in for regular updates


Email Protocols

Email –Electronic mail is a facility that allows users to transmit messages across the
internet in fast and secure manner.

Email created using email client program->on press of send button ,it is delivered to
sender’s mail server through SMTP(Simple mail transfer protocol)->which further
transmit the same through internet to recipient’s mail server->whenever recipient’s
email client program’s inbox is opened,that email is delivered to inbox through
POP3 (post office protocols 3rd version)->which user will read in email client
program.
Visit : python.mykvs.in for regular updates
Email Protocols

SMTP – Most of the internet systems use SMTP as a method to transfer mail from one user to another.
SMTP is a push protocol and is used to send the mail to email server. it is usually used with one of two
other protocols, POP3 or IMAP, that let the user save messages in a server mailbox and download them
periodically from the server.An alternative to SMTP that is widely used in Europe is X.400. Many mail
servers now support Extended Simple Mail Transfer Protocol (ESMTP), which allows multimedia files to
be delivered as e-mail.

The SMTP model is of two type :


• End-to- end method
• Store-and- forward method
The end to end model is used to communicate between different organizations whereas the store and
forward method is used within an organization.
Visit : python.mykvs.in for regular updates
Email Protocols

POP3 – Post Office Protocol version 3 (POP3) is a standard


mail protocol used to receive emails from a remote server
to a local email client. POP3 allows us to download email
messages on our local computer and read them even when
we are offline. Note, that when we use POP3 to connect to
our email account, messages are downloaded locally and
removed from the email server. This means that if we
access our account from multiple locations, that may not be
the best option for us. On the other hand, if we use POP3,
our messages are stored on our local computer, which
reduces the space of email account uses on your web
server.
Visit : python.mykvs.in for regular updates
Protocols for chat
& video conferencing
VOIP – Voice over Internet Protocol (VoIP), is a technology that allows us to make voice
calls using a broadband Internet connection instead of a regular (or analog) phone line.
VoIP services convert our voice into a digital signal that travels over the Internet. If we are
calling a regular phone number, the signal is converted to a regular telephone signal before it
reaches the destination. VoIP can allow us to make a call directly from a computer, a special
VoIP phone. In addition, wireless "hot spots" in locations such as airports, parks, and cafes
allow us to connect to the Internet and may enable us to use VoIP service wirelessly.
Advantages:
• Less Cost
• Accessibility
• Flexibility
• Voice Quality
• Extra/Less Expensive Features
Disadvantages:
• Reliable Internet Connection Required
• Power Outages/Emergencies
• Latency

Visit : python.mykvs.in for regular updates


Protocols for chat
& video conferencing

Services provided by VOIP – Phone to phone,pc to phone ,phone to pc,voice


to email,ip phone,toll free number,call center applications,vpn,unified messaging etc.

Protocols used for VOIP are


• Session Initiation Protocol (SIP)- connection management protocol developed by the IETF
• H.323 - one of the first VoIP call signaling and control protocols that found widespread
implementation.
• Real-time Transport Protocol (RTP)- transport protocol for real-time audio and video data
• Real-time Transport Control Protocol (RTCP)- sister protocol for RTP providing stream
statistics and status information
• Secure Real-time Transport Protocol (SRTP) - encrypted version of RTP
• Session Description Protocol (SDP) - file format used principally by SIP to describe VoIP
connections

Visit : python.mykvs.in for regular updates


Wireless technology
BASIS OF
WI-FI WiMAX
COMPRISON
Wi-Fi is an acronym for Wireless Fidelity. WiMAX is an acronym for Worldwide Interoperability
It is a wireless networking technology for Microwave Access. It also goes by the IEEE name
Description that uses radio waves to provide wireless 802.16. It is a technology standard for long-range
high-speed internet and network wireless networking for both mobile and fixed
connections. connection.
Protocol Uses CSMA/CA protocol Uses connection based MAC protocol.
Licensed and
Unlicensed Exclusively unlicensed Can run on both licensed and unlicensed spectrum.
Spectrum
Data
Transmission data at speeds up to 54 mbps. data at speeds upto 40mbps.
Rates
Channel
fixed channel bandwidth of 20 MHz. flexible channel bandwidth - 1.25 MHz to 20 MHz.
Bandwidth
Defined under IEEE 802.11x standards Standardized under 802.16y family of wireless
IEEE Standards
where x is various Wi-Fi versions. networking where y refers to various WiMAX versions.
coverage of up to 100 meters for Non-line of sight connectivity covers a radius of above
Coverage outdoor applications and 30 meters for 25 kilometers (Km). For line of sight connectivity
indoor coverage. coverage area of above 600- square

Visit : python.mykvs.in for regular updates

You might also like