LEVEL 3 Unit 4 Computer Networks, Internet and Standards of

You might also like

Download as pdf or txt
Download as pdf or txt
You are on page 1of 24

LEVEL-3

Unit4:ComputerNetworks,InternetandStandardsofBiometricData

Session1:ComputerNetworks

A.Fillintheblanks

1. Collectionofcomputersandotherhardwarecomponentsinterconnectedbycommunication
channel iscalled_________________.
2. Computernetwork allowssharingof_________________and_________________.
3. Computerscanbeconnectedthrough_________________ or_________________.
4. Resourcesincomputernetwork includedevices, such as_________________.
5. Printersharingispossiblethrough_________________.
6. Thereare_________________typesofcomputernetworks.
7. LANstandsfor_________________.
8. Computersnetworkedwithina limit ofgeographicalareaarecalled_________________.
9. WANmeans_________________.
10.LANsat different locations,whenconnectedtogetherarecalled_________________.
11.MANstandsfor_________________.
12.LANsbeyondtheboundariesofa city, whenconnectedtogetherarecalled_________________.
13.P2Pnetworkingmodel standsfor_________________ model.
14.Wheneachcomputercanactboth asa serverandclient,thenthat networkingmodel iscalled
_____________model.
15.HTTPstandsfor_________________.
16.IPaddressmeans_________________ address.
17.Whenthereisoneserverandmanyclients,thensuch networkingmodel iscalled___________
model.
18.InAadhaarcardbiometricdata the_________________networkingmodel isused.
19.Internal networkofanorganisationiscalled___________.
20.Thenetworkthat isnot accessibletothepublicisknown_________________.
21.Thenetworkthat isaccessibletothepublicisknown_________________.

B.Multiplechoicequestions
1. Thecomputernetwork that isusedoutsidetheIntranetisknownas_________________.
(a)Internet (b) Extranet(c)Cable(d)Router
2. Theglobalsystemofinterconnectednetworksthat useTCP/IPprotocol isknownas
______________.
(a)Internet (b) WAN(c)Intranet (d)LAN
3. Thelargest network ofthecomputersintheworldis_________________.
(a)Internet (b) Extranet(c)MAN(d)LAN
4. Whichof thefollowingarenetworkdevices?
(a)Repeater(b)Modem(c)Router(d)All ofthese
5. _________________isusedtoregeneratethesignal whenit becomesweak.
(a)Network hub(b)Networkswitch(c)Repeater(d)Router
6. Tojointhetwophysicalsegmentsof thesamenetwork _________________isused.
(a)Network bridge(b)Network switch(c)Repeater(d)Router
7. Multiplenodesinthenetwork areconnectedbyusingthe_________________.
(a)Network hub(b)Wi-Fi(c)LAN(d)router
8. Thecombinationofnetwork hubandnetwork bridgecanbeperformedbyusing______________.
(a)Bluetooth (b)network switch(c)gateway(d)modem
9. Thedevice that routesthedatapacketsbasedontheirIP addressesis_________________.
(a)UTP cable(b) telephone(c) repeater(d)router
10.Twonetworksworkingondifferentnetworkingmodelscanbe connectedtogetherbyusinga
_________________.
(a)network gateways(b)desktop(c)Internet(d)Wi-Fi
11.Modemmeans_________________.
(a)modulatordemodulator(b)modulator(c)de-modulator(d) router
12.Thecheapest waytosendandreceivethedata through thetelephonelinescanbeperformed
byusinga _____________.
(a)modulatordemodulator(b)modulator(c)de-modulator(d) modem
13.Wirelessaccesspoint isalsoknownas_________________.
(a)spot (b)softspot(c)hot spot (d)Wi-Fi spot
14.Thedevicethatisa combinationofrouterandanaccesspointis_________________.
(a)modem(b)hot spot(c) Wi-Fi router(d)repeater
15.Theset ofstandardsthat allownetwork devicestocommunicateanexchangeinformationis
called_________________.
(a)Wi-Fi router(b)protocol (c)repeater(d)modem

C.StatewhetherthefollowingstatementsareTrueorFalse
1. Protocolsaretheset ofrulesforcommunication.
2. Inacomputernetwork, all computersneednot usethesameprotocol forcommunication.
3. Protocolsmayincludesignaling,authentication, errordetectionandcorrection.
4. TCP/IPstandsforTransmissionControl Protocol/Internet Protocol.
5. TCP/IPisnot acoreprotocol ofInternet.
6. IP istheprimaryprotocol usedforrelayingdata acrossthenetwork boundaries.
7. Ipv4uses64bit addressingscheme.
8. Ipv4provides232possibleaddresses.
9. IANAmeansInternetAssignedNumbersAuthority.
10.Ipv6uses64bit address.
11.Ipv6addressconsistsof8groupsoffourhexadecimaldigits.
12.Most oftheoperatingsystemssupportIpv4andIpv6.
D.Shortanswerquestions

1.Whatisacomputernetwork?
• Acomputernetworkconsistsofcomputers,printers, scannersandotherhardware
interconnectedbycommunicationchannels.
• Thenetworkisusedforsharingofresources, suchasprinter, scannerorstoragedevices
andservices, suchasmail andwebservices.

2.Listtheadvantagesofacomputernetwork.
• Weusesocial networkingsites, such asFacebook.InFacebook,onecanconnect with
theirfriendsbycreatinganaccountonFacebook,shareimagesandvideoswiththemtoo.
• Similarly,computerisalsoconnectedbya network madeupofwiresorfrequencies
through airthatiswireless.
• Itallowsthecomputerstocommunicatewitheach other.
• Whenthecomputersinthisnetwork are connectedtoInternetthenallthecomputersof
thisnetworkcancommunicatewith the othercomputersconnectedtotheInternet across
theglobe.
• EvenasinglecomputerconnectedtoInternetcancommunicatewithothercomputers,
whichareconnectedtotheInternet.

3.Whatarethedifferenttypesofcomputernetworks?/
WritethefeaturesofLAN.
• LAN(LocalAreaNetwork)Most of theorganisationscreatea simplenetworkofcomputers
withinthebuildingorcampusbyconnectingcomputersandperipheralstoservethe
purposeofsharingcomputinginfrastructurewithintheorganisation.
• Thistypeof networkiscalledlocal areanetwork (LAN)

• LANoperateina limitedgeographical area, such asschools,colleges,offices,etc.


• Computersandothernetworkdevicesare connectedinthenetwork byusingawired
media.It alsousesawirelessconnection.
WideAreaNetwork(WAN)/ WritethefeaturesofWAN.
• Whenanorganizationneededtoprovidea networkindifferentlocationsacrosslarge
geographical areasthenWANiscreated.
• WANconnect LAN'sbetweendifferent locations.Forexample,computersordevicesina
branchofficecouldconnect tothecomputernetworksattheheadofficethrough
telephonelinesorsatellites.
• Apart fromdistance,theotherfeaturethat distinguishesa WANfromaLANisthat the
WANwouldmakeuseofa rangeofcommunicationtechnology,suchastelephone,
microwaveandsatellitelinks.
• WANsarealsousedinbiometricsystemstocommunicatewith theremoteserverasinthe
caseofAadhaar,biometricdata issavedandretrievedfromserverthroughbiometric
device.

MetropolitanAreaNetwork(MAN)
• AMANisanetwork thatconnectstwoormoreLANorCAN(CampusAreaNetwork)
togetherbut doesnot extendbeyondtheboundariesofmetropolitanarea.
• Multiplerouters,switchesandhubsareconnectedtocreateaMAN.
• MANisoperatedbya governmentbodyorcorporation.
6.Statethenetworkingmodelsusedincomputernetworks.OR Givethediagramsofnetworkingmodels.
Therearebasicallytwonetworkmodels— peer-to-peerandclient/server.
• Thecomputernetworkcanhavethecombinationofbothpeer-to-peerandclient/server
models.
• Forexample,youmaybeusinga centralisedmailserverand/oraccessfilesfromother
machinesinthenetwork.

Peer-to-peer(P2P)model
• Ina peer-to-peerbiometricnetwork, theclientsareall networkedtooneanotherwithout
havingtheneedof mainhosts.
• Thecomputerscommunicatewith eachotherbyusingaprotocol. Thebiometricdevices
knownas‘ Peers.’ Fig.4.10.showsanexampleofapeertopeernetwork.
• Forexample,iftheprocessingofverificationand/oridentificationtransactionsbecome
toomuchforonepeertohandle, thentheworkloadcanbetransmittedacrosstotheother
peerssince theyareall networkedtogether.
Client/servermodel
• Client/servernetwork consistsofonecentral serverandseveral client computers
connectedtotheserver.
• Theserverisapowerful computerwithhighprocessingspeedandhigh storagecapacity,
whiletheclientsarelesspowerful with eitherpersonal computersorworkstations.
• Inclient/servernetworkingofbiometricsystemall biometricdevicesareinterlinkedwith
anotherandtheoverall systemisconnectedtoa central server.
• Theserverisknownasthe‘ Host,’ andtheconnectedbiometricdevicesarecalled‘ Clients.’
Theclientstransmitthebiometrictemplatesandotherrelevantinformationtothehost.
• Thehost thenconductstheverificationand/oridentificationat databaselevel.
• Thetransmissionofthebiometrictemplatestothehostisknownas‘ NetworkRequests.’
• Theclient asksthehost toconfirmtheidentityof theindividual andtosendtheresult of
thistransactionbacktotheclient.

8.WhatisIntranet?
• Intranet providesaccesstothewebapplicationswithintheorganisation.
• ThewebsitescreatedforInternet provideglobal access, while internal webapplicationis
set uptobeusedbytheemployeeoftheorganisation.
• Thisinternal webapplicationiscalledIntranet.
• WebpagesontheIntranet arenot accessibletoanemployeewhotriestoaccessthem
fromoutsidethecompany’ snetwork.
• Fig. 4.11showsthetypical Intranet infrastructure.

9.WhatisInternet?
• Internet isa global systemofinterconnectednetworksandusesTCP/IP(Transmission
Control Protocol/Internet Protocol)protocol suite.
• Internet consistsofbillionsofcomputingdevicesandisthelargestnetwork intheworld.
• Internet isusedforvariouspurposes,suchasbrowsing, e-mail, chatting,social networking
andonlineshopping,etc.

10.Explainthefunctionofthefollowingnetworkdevices—
(a)repeaters
• Repeatersisa twoport device.Inalongdistancenetwork, whenthesignalbecomesweak,
a repeaterisusedtoregeneratethesignal.
• Whenthesignalbecomesweak,theycopythesignalbit bybit andregenerateitat the
original strength.Thesignal canbetransmittedoverthesame network.
• Repeaterscanbeboth wiredandwireless, ifitiswirelessthenwecall ita rangeextender.
• Fig. 4.15showshowrepeaterisusedinconnectingthenetwork.
(b)router
• Arouterisa devicelikea switchthat routesdata packetsbasedontheirIP addresses.
Routerismainlya Layer3orNetwork Layerdevice.
• Routersare usedforconnectingvariousnetworks(LANorWAN). Aroutertransmitsdata
fromincomingnetwork toanothernetwork.
• Aroutermaintainsaroutingtableofvariousnetworks. Forbiometricdevice,routershould
support port forwardingafterwhichoneshouldensurethat therouterhasaccesstoit.
• Basedonthedestinationaddress,therouterdeterminestowhich networktheincoming
packet shouldbetransmitted.
• Fig. 4.19showshowtherouterisusedtoconnect heterogeneousnetworks.

(c)modem
• Modems, alsocalledasmodulatorandde-modulator, arethedevicethatmodulatesoneor
morecarrierwavestoencodedataanddemodulatesthecarrierwavetodecodethatdata.
• Themodemsprovidethecheapestwaytosendandreceivedata,likethetelephone lines.
Modemisusedindial-upnetwork Internet connectionat home.
• Fig. 4.21showsa modem.
11.Whatisnetworkprotocol?ExplainTCP/IPnetworkprotocol.
• Protocolsarea set ofrulesorstandardsthat allownetworkdevicestocommunicateand
exchangeinformation.
• Thebiometricdevicesconnectedinnetwork alsohavetousenetwork protocolsto
transmit theinformationthrough datapackets.
• Someexamplesofprotocolsatthenetwork layerareNetBEUI, IPX/SPX, TCP/IP,
AppleTalk.
TCP/IP(TransmissionControlProtocol/InternetProtocol)
• TCP/IPisa combinationoftwoprotocols.TCPstandsforTransmissionControl Protocol,
andIP standsforInternet Protocol. Biometricsystemsmost commonlyuseTCP/IP
protocol.
• Itisthemostwidelyusedprotocol fordata transferoverInternet.TCPoffers
connectionbasedservices.
• Most operatingsystemssupport TCP/ IP.
• TCP/IPconsistsoffourdistinctnetworklayers:
Linklayer
Thislayerconsistsofthecommunicationtoolsusedinthebiometric network.Thedata
packetscontainingbiometrictemplatestravel fromonelink tothenext till theyreachthe
server.
InternetprotocolThisisresponsiblefortheinternal communicationsbetweenthevarious
network linksthatmakeuptheentirenetworksegmentsbetweenthebiometricdevices
andtheserver.
TransportlayerThisisprimarilyresponsibleforoverall communicationbetweenthe
biometricdevicesandserver.
Applicationlayer
• Thisisresponsiblefortheprocessingservices,suchastheverificationand/or
identificationtransactionprocessing.
• TCP/IPisthemost widelyusedprotocolinLAN, WANandInternet becauseisopen
standardcanbeusedindifferentoperatingsystems, runsonanynetwork framework, such
asethernet,tokenring, dial-upconnections, followroutableandacommonaddressing
scheme.
------------*****************______
ExplaintheNetworkProcessingLoads
Thisistheconcept ofproperlybalancingthenetworkload. It ensurestheworkloadofall the
devicesconnectedtonetwork isproportionatelyequal toavoidthedelays.

• Whenthebiometricdevicesareconnectedwith oneanother,thetransactionprocessing
loadfortheverificationandidentificationbasedapplicationscanbesharedwith
distributednetworkresources.
• Forexample,ininternational airport,theidentityofthepassengersistrackedbythefacial
andirisrecognition.
• Forthelargenumberofpassengersmanysuchdevicesarerequiredwhichareplacedon
different locationsthroughouttheairports.
• Thesebiometricdevicesarenetworkedtogether.Anotheradvantagewith networkingis
thatifthereisa systemfailureinonesegment, theothermodalitieswill be abletoquickly
makeupforanydowntimeinjust a matterofa fewminutes.
• Fig. 4.2showsthatwhenaclient sendsa request tothesystemandwhentherearevarious
terminalsnetworkedinthesystem, thereisat least oneterminal, which canrespondtothe
client ifothersarebust ornot working.

Whatisdatapacket?
• Thebiometrictemplateisbrokendownintobits, knownas‘ Data Packets.’
• Forexample,everytimeabiometrictemplateissent toa central serverforstorage and
verificationoridentificationprocessing, it isdonevia the datapacket
Whatarethedatapacketsconsists andformattingdatafortransmission?
Adatapacketconsistsofaheader,packetandtrailerasshowninFig.4.8.Theheaderspecifiesthe
finaldestinationofthebiometrictemplate.Thetrailerpossessestheabilitytoensurethatthedata
packet getstotherightdestinationduringtheintendedtimeframe.

Whatisdatapacketswitching?
• Data packetswitchingisanimportant aspect ofbiometricnetwork design.
• Forexample,whenmorethanthreebiometricdevicesareconnectedtotheserver,
different network routesmaybeusedtoreach thedestination.
• Thisisdonetooptimisetheflowofdata packetsinbiometricnetworksystem.
WhatisExtranet?

• Extranet isapartofthecompany’ snetwork thatcanbe madeavailabletousesecurelyby


anemployeethroughoutside.
• Forexample, anorganisationmayallowa vendortovieworaccesstheirresources, such
astheirinternal websiteforupdatingaproductcatalogue,ortrainingmaterial.
• However, thisishighlyrestrictedtoInternet usersthat are public.Some organisations
allow
provisiontoaccessthroughvirtual privatenetwork (VPN).Fig. 4.12showstheextranet
infrastructure.

Whatishostandnodes?
Ina network,thedevices,which receiveorgeneratedata arecalledhostsandtheintermediate
devicesarecallednodes.

Whatarethedifferenttypesofnetworkingdevices?
differenttypesofnetworkingdevices,whicharelistedasfollows
• Network InterfaceCard(NIC) • Repeaters• NetworkBridge• Network Hubs• Network
Switches• Routers• Network Gateways• Modem• AccessPoint • Wi-FiRouter

ExplaintheNetworkbridge
• Anetworkbridgeisarepeater,which joinstwophysical segment ofa samenetwork.
• ItfilterscontentbyreadingtheMACaddressesofsourceanddestination. It isalsoused
forinterconnectingtwoLANsworkingonthesameprotocol.
• Ithasasingleinputandsingleoutput port,thusmakingit a2-portdevice.Fig.4.16showsa
connectingthe physical segment of anetwork.

ExplaintheNetworkhubs
• Itisusedtoconnect multiplenodesinthenetwork. Inahub, thedata receivedinoneport,
replicatestoall ofitsport except the receivingport.
• Theentirenodeattachedtothishub,receivesthesamedata. Fig. 4.17showshow
computersareconnectedtohub.

ExplaintheNetworkswitches
• Itisthecombinationofanetwork hubandanetwork bridge. Aswitchcanperformpacket
forwardingandbridgingat thesametime.
• Switchesaresimilartohubbut managetrafficbasedonMACaddressandareefficient in
largenetworks.
• Switchesareconsideredintelligent astheybuilda tableof MACaddressesofdevices
connectedtoit andwheneach packet isreceived,theyareanalysedandforwardedtothe
devicewithmatchingMACaddress.
• Fig. 4.18showsconnectivityofcomputersanddeviceswiththeswitches.

whatarethetwotypesofswitches?
Switchesareoftwotypes— managedandunmanaged.
• TheUnmanagedswitchesareusedfornetworkingathomesorsmall officeswhere
administrativeconfigurationisnot required.
• ThemanagedswitchesareusedinenterprisenetworksandISP’ s, whicharerequiredto
beconfiguredbythe networkadministratorbeforeitisusedina network

writeanoteonIPAddress
• Everycomputingdevice,suchascomputer, tablet,smartphone, that communicatesonthe
Internet, isassignedauniqueidentifyingnumbercalledIP(Internet Protocol)address.
• CurrentlytherearetwostandardsofIP-address— IPv4andIPv6.
• IPv4(version4), hastheformatoffournumbersbetween0and255separatedbya period.
TheseIPaddressesareassignedbyanInternet ServiceProvider(ISP).
• TheISPchargesa feefortheservice. ExampleofIPaddressare:
• 172.64.85.42• 193.213.78.154
• TheIPv4standardhasa limit of4,294,967,296possibleaddresses.
• TheIPv6standardiseight groupsoffourhexadecimal digits,suchas2001:0db8:85a3:0
042:1000:8a2e:0370:7334.
• TheIPv6standardhasa limit of3.4× 1038possibleaddresses.IPaddressesarestoredin
text filesanddisplayedinhuman-readablenotations, suchas10.3.5.10asshowninFig.
4.23

ClassfulNetwork

• Classful networkisanaddressingscheduleoriginallyintroducedin1981andusedfor
several yearsuntil theintroductionofClasslessInter-DomainRouting(CIDR)method.
• Inthismethod, the32-bitaddressspaceisdividedintofiveaddressclasses, namelyA,B, C,
DandE.Eachclassdefinesa fixednetwork sizeandnumberofhostswithinnetworks.

WhatisWirelessNetworking?
• Wirelessnetworkingisthe wirelesstechnologytoestablisha wire-freeconnectionor
communicationbetweentwoormoredevices.
• Inwiredtechnologydata isencodedaselectriccurrentandsignalstravel throughwires,
whileinwirelesstechnologydataisencodedonelectromagneticwavesthat travel
through air.
• Today, weareusingwirelesscommunicationinlaptop,iPad,andsmartphonestoaccess
theInternet. The wirelesstechnologieshavemadethesedevicesmorefunctional.
• Thewirelessnetworkshavetwomaincomponents— thewirelessaccesspointsthat
includethetransmitteralongwith thearea it cancover, andthewirelessclientslikemobile
handsets, laptopswith Ethernet cards, etc.
• Theaccesspoint receivesdataframesfromthecomputersattachedtoitwirelessly,
checkstheframesandtransmitsthemtotheirdestination.
• Thespeedofwirelessconnectionisdeterminedbythedistanceofthewirelessclient
devicefromthe accesspoint, theobstruction-freepath interference,andthenumberof
usersusingthenetwork ata giventime.
• Followingarethemostcommonwirelesstechnology

Wi-Fi
Wi-Fi isa technologythat takesanInternetsignal andconvertsit intoradiowaves. Theseradio
wavesarepickedupbywirelessadapter. The devicesintheradiusofapproximately50– 60feet
cancatchthesignal.Wi-Fi routersareusedforbroadbandconnectionsat home.

Mobilenetwork
Mobilephonetechnologieshaveevolveddifferent communicationstandardsfortheirnetworks.
GSMisusedbyAT&TandT-MobileandCDMAisusedbyothermajorcarriers.It ispossiblefora
mobilephoneusingonetype ofnetwork toswitchtotheothertypeof networkbyswitchingout the
SIMcard,which controlsyouraccesstothe mobilenetwork.

Bluetooth
Bluetoothtechnologyisusedtoconnectthedifferentcomponentswirelessly.Bluetooth hasa
rangeofapproximately300feetandconsumeslittle power.Theprinter, wirelesskeyboardand
mousecanbeconnectedtocomputerthroughBluetooth.

BiometricAttendanceSystem(BAS)
• Biometricattendancesystemisusedinmost oftheorganisations.Biometricattendance
machinecapturesfingersoririsforidentityverification.
• Biometrictimeattendancemachinesalsocountsemployees’ work schedule,basedon
thereport.
• Biometricattendancesystemsensuretheaccuracyof attendanceandisuseful inthe
organisationswith largenumberofemployees.

InternalStructureofBiometricAttendanceSystem(BAS)
1. TheBiometricAttendance System(BAS) supportsTCP/IPprotocolsforcommunication.It also
supportsWi-Fi, GPRS andGPS.
2. TheBAS canstore8000to10000uniquebiometricfingerprintsrecordsandupto1,00,000total
transactionsintheirstorage.
3. BAS worksoverpush data technologyandalsosupportsboth staticanddynamicIPaddress.
4. Biometricattendancesystemhasa 800MHz32- bit microprocessor.

Session2:InternetanditsApplication
A.Fillintheblanks
1. The________________isthelargestnetwork intheworld.
2. Internet isrunbya non-profitableorganisationcalled______________.
3. Everywebsiteaddressstartswith ______________.
4. WWWstandsfor______________.
5. URLmeans______________.
6. Thedomainname.govindicatesthat it isa______________website.
7. EverycomputerconnectedtotheInternet isidentifiedbyits______________address.
8. IP addresscontains______________numbers.
9. ISPstandsfor______________.
10.IPaddressesarestoredin______________.
11.Testingofthenetworkcanbeperformedbyusing______________command.
12.Domainnamegives______________toall thewebsitesonthe Internet.
13.Commercial websitesareindicatedby______________inthedomainname.

B.Multiplechoicequestions
1. Normallyall Indianwebsitesareindicatedby______________inthedomainname.
(a).au (b) .us(c).in(d).uk
2. Whichof theseisaprotocol usedintheInternet?
(a)TCP/IP(b)HTTP (c) FTP(d)All ofthese
3. FTP standsfor______________.
(a)Filetransferprotocol (b)Filetransferpractice (c) Filetopunch(d)Formertransferprotocol
4. Themainusageof FTP protocol is______________.
(a)electronicmail exchange(b)fileexchange(c)informingandcontrollingmessages(d) HTML
document exchange
5. Themainusageof HTTPprotocol is___________________.
(a)controllingIPaddresses(b)fileexchange(c)electronicmailexchange(d)HTMLdocument
exchange
6. Themainusageof TCP/IPprotocol is_________________.
(a)controllingtheexchangeofIPaddresses(b)fileexchange
(c)electronicmail exchange(d)HTMLdocument exchange
7. Electronicmail exchangecanbe achievedbyusing______________ protocol.
(a)FTP(b)SMTP(c)HTTP(d)TCP/IP
8. SMTPstandsfor___________________.
(a)Simplemail transferprotocol (b)Simplemail transferprocess
(c)Supermail transferprotocol (d)Supermail toprocess
9. Errormessagesareinformedandcontrolledbyusing___________________protocol.
(a)FTP(b)SMTP
(c)ICMP(d)TCP/IP
10.Thecomputerthatdistributesthe resourcesiscalled_____________________.
(a)Client (b)Server(c)Down-loader(d)Up-loader
11.Theprocessofretrievinginformationfromtheservercomputertotheclient computeris
_______________.
(a)uploading(b) downloading(c)managing(d)printing
12.Theprocessofprovidinginformationfromtheclient computertotheservercomputeris
__________________.
(a)uploading(b) downloading(c)managing(d) printing
13.DNS serverisused______________.
(a)tomanageprintingservices(b)tomanageelectronicmails(c)forstoringof webpages(d)for
translatingURL toIP addresses

C.StatewhetherthefollowingstatementsareTrueorFalse
1. Webserverisusedforstoringofwebpagesandprovidingthesetotheclient computers.
2. DNS serverisusedtomanageelectronicmails.
3. FTP meansfiletransferpractice.
4. Mozilla Firefoxisa webbrowser.
5. SirTimBernersLeeisconsideredasthefatherofworldwideweb.
6. Safari isatext editingsoftware.
7. ComputersconnectedtotheInternetcannotbecontrolledremotely.
8. Usingremoteaccessfunctionality, sometimeshackerscansteal important data without the
owner’ sknowledge.
9. Checkingofexaminationresultonlineisanexampleoffilesharing.
10.Anyinformationonthe Internet cannot befoundusingsearch engine.
11.Googleisanexampleof search engine.
12.Unique identityofa websitecannot bereflectedbyitsdomainname.
13.Byusingelectronicmail wecanexchangeourmessagesorfilestotwoormorepeople.
14.Cost of the useofInternet isveryhigh.
15.E-mail canbesentfromonecountrytoanyothercountryintheworld.

D.Shortanswerquestions
1.Whatiselectronicmail?Stateitsadvantages.
• Electronicmail ore-mail enablesexchangingmessagesaselectronicmailsorfiles
betweentwoormorepeople.
• e-mail isa waytosendandreceivemessagesacrosstheInternet.
• Thereareseveralorganisations,which provide e-mail service free ofchargethrough the
Internet. Hence, thecostisonlyfortheuseof the Internet.
• Thisisthecheapest andfastest communicationmethodintheworld.
• Anypersonintheworldcancreateanelectronicmail account with thehelpofInternet and
thiscanalsobeusedtofindthispersonontheInternet.
• e-mail messagesreceivedarestoredinthemailbox.
2.Givethestepsforsendingandreceivinge-mail.
Sendingane-mail
• Amessagecanbesent through e-mail just likeapostal mail.
• Tosende-mail,thesenderandreceivermusthaveane-mail addressandInternet
connectivity.
• Soifyouhaveane-mail addressandwant tosende-mail tootherswhoarealsohaving
e-mail address, thefollowingactivitywill illustratethesendingandreceivingofe-mail.

ReceivingandReplyingtoane-mail
• Thee-mailssent byotherstoyouarereceivedintheInboxof youre-mail account.
• Thee-mailsarecategorisedinsideane-mailaccount foreasyuse.
• ThereareothermailboxesalsoforotherpurposeasexplainedbelowandshowninFig.
4.35.Inbox– tostoremailsreceived
Drafts– tostoremailsthatarecomposedtobesentbutcouldnot becompleted
Sent– tostoremailssent
Trash/Deleted– tostore mailsfora certainperiodthat aredeleted
Spam/Junk– tostoremailsthat areunwantedUnwantedemailsstoredinaseparate
folderwithout disturbingtheInboxareknownasspam.

3.Whatdoyoumeanbysearchengine?Givethestepsforobtainingusefulinformationusingsearchengine.
• Searchenginesarethewebsitesusedtosearch theinformationontheInternet.
• Searchenginesmakeit possibletosearch therequiredinformationbasedonthe search
criteria. Search enginesaredesignedfortheInternet userstofindanyinformationeasily.
• Aftertypingthekeywordsinthesearch boxofthesearchengineandclickingthesearch
button, youwill geta numberofwebsitesmatchingyourrequestedinformation.
• Youcanobtainthenecessaryinformationbyclickingoneorseveral hyperlinks.
• Someexamplesofsearchenginesareaslistedbelow.
• https://www.google.com
• https://www.yahoo.com
• https://www.msn.com/
• https://www.ask.com/

4.ExplaintheroleofDNSserver.
DNSServer– usedfortranslatingURLtoIP addresses

5.WhatisFTP?HowisFTPusedforsharingoffiles?
• File TransferProtocol (FTP)
• e-mail client softwarehavealimitedcapacityofsendingafileofupto25MBinsize) asan
attachment.
• Thefilesexceedingthesizeof25MBcannotbesentase-mailattachments.
• FTPisusedtotransferlargefilesofonecomputertoanothercomputerovertheInternet.
• Thisprotocol isoperatedonTCP/IP andusedtouploadfilesontheInternetaswell asto
downloadfilesfromInternet.

6.IllustratetheconceptofremoteaccessinInternet.

7.Whatisawebbrowser?Stateanyfourcommonlyusedwebbrowsers.
• AWebBrowserisanapplicationsoftwareusedtoaccesstheWorldWideWeb.Thereare
several webbrowsersdevelopedbydifferentcompanies.
• Internet Explorer, MozillaFirefox, GoogleChrome,Safari,Opera are someofthepopular
webbrowsers.
8.Whatisawebsite?Giveexamples.
• Awebsiteconsistsofseveralwebpages. The webpageconsistsoftext, images, videos
andothermultimedia andhyperlinks.
• Thehyperlinksprovide linkstootherwebpagesorwebsites.
• Toaccessawebsite,weneedtoenterthewebsiteaddressontheaddressbaroftheweb
browserandthenpresstheEnterkey.
• Thefirstpageofthewebsitewhichcontainsthebasicinformationaboutthewebsiteiscalledthe
HomePage.
• Theotherpagesofthewebsite canbeaccessedthroughthehyperlinks
• Examples
• MinistryofHumanResourceDevelopment https://www.nios.ac.in
• • National InstituteofOpenSchoolinghttps://www.ignou.ac.in
• • IndiraGandhi National OpenUniversityConsiderthefollowingexampleofURL.
http://psscive.ac.in/Cur/SSCQ2213.pdf

9.Explaintheroleofthefollowingservers—
(i)webserver(ii)mailserver(iii)printserver(iv)DNSserver
• Webserver– usedforstoringwebpagesandprovidingthesetotheclient computers.
• Mailserver– usedforelectronicmail andprovidingthemtotheclient computers.
• Printserver– usedtomanagetheprintingservicesofclient computers.
• DNSServer– usedfortranslatingURLtoIPaddresses

10.WhatdoyoumeanbyuploadinganddownloadingonInternet?
• Thetransferof informationbetweenserverandclient takesplaceintwoways—
downloadinganduploading.
• Theprocessofretrievinginformationfromtheservercomputerstoclient computersis
calleddownloading.
• Theprocessofprovidinginformationfromclient computerstoservercomputersiscalled
uploading.
11.ExplainhowInternetconnectionworks?
• TherearevarioustypesofInternet connectionsprovidedbyISPs.Bandwidthandcost are
thetwofactorstodecidetotakeInternet connectiontouse.
• ThespeedofInternetaccessdependsonthebandwidth.ISPsoffervariousservicesto
connect withtheInternet,suchasDial-upconnection,DSL,CablemodemandIntegrated
ServicesDigital Network (ISDN)connections.
• Most ofthedial-upandISDNconnectionsare nowreplacedbyhigh speedbroadband
Internet connection, asmanyISPs,suchasBSNL, Airtel areofferinghighspeedbroadband
connectionsinlowcost.
• Itsspeedisrangingfrom4MBPS to40MBPS (Megabytespersecond).

ExplainhowInternetworks.
• Internet isa networkofinterconnectednetworksandisdesignedtooperatewithout a
central control.It consistsofclients, serversandInternet ServiceProvider(ISP).
• ThearchitectureofInternet ishierarchical innature.
Clients
Theyaretheendusers.Thesearecomputeroranycomputingdeviceconnectedtothe
Internet toaccesswebpagesfromtheserver. Theyusebrowsers,suchasMozilla Firefox,
Internet Explorer, GoogleChrome, toaccessthewebpages.

InternetServiceProvider(ISP)
Thenextlevel isthelocal Internet ServiceProvider(ISP).TherearetwolevelsofISP— local
andregional. Local ISPisconnectedtoRegional ISP.
(i)Local ISP isthe local telephonecompany, suchasBharat SancharNigamLtd.(BSNL),
MahanagarTelephoneNigamLtd.(MTNL),andAirtel. Theclientcancall localISPusinga
modem.
(ii)Regional ISPisatnext level,which connectsthelocal ISP’ slocatedinvariouscities
viarouters.Aroutercaninterconnectnetworkshavingdifferenttechnologies, different
mediaandphysical addressingschemes. Ifthepacketreceivedbytheconcernedregional
ISP isfora client connectedtothat regional ISP, thenthepacketisdelivered, otherwise,
packet issent tothebackbone.
Backbone
• ThebackbonenetworksareconnectedtoRegional ISP’ swith alargenumberof
routersthroughhighspeedfiberoptics.
• ThebackbonesareconnectedtoNetwork AccessPoint (NAP),sothat packets
travel acrossdifferentbackbones.
• Thepackettraversesdifferent backbonesuntil it reachesthe backboneofregional
ISP forwhich it isdestined.
12.Whatisdomainname?Explainthedifferentdomainnameextensionsandtheirmeaning.
• Adomainnameisahuman-friendlyname fora deviceonthe Internet.
• Domainnamegivesanidentitytoall the websites, whichexistontheInternet.

13.GivethestepsforconnectingbiometricattendancesystemtotheInternet.
14.Givethestepstocheckyourcomputer'sIPaddress.

You might also like