Class 12 Computer Networks One-Shot Revision Notes: Everything You Need for Your Exam!

1. Introduction: Why Computer Networks Matter

Hello, dear students! Imagine a massive global library where every book is instantly available to you at the touch of a button, or a busy post office where millions of letters reach their destination in the blink of an eye. That is exactly what a computer network does—it acts as the nervous system of our modern world.

In simple terms, a Computer Network is a group of computers connected so they can talk and share things. Academically, we define it as an interconnection of two or more computers or computing devices for the purpose of sharing data and resources.

Teacher’s Note: Why study this? Computer Networks is a high-yield, scoring section. The concepts are deeply logical, and once you understand the “why” behind the hardware, the “what” becomes easy to remember. Master this, and those 1-mark and 4-mark questions will feel like a breeze!

——————————————————————————–

2. The Evolution of Networking: From ARPANET to Internet

Modern networking didn’t just appear; it was built through decades of evolution. Pay close attention to the names here—they are exam favorites!

YearNetwork NameCore Purpose / Significance
1969ARPANETAdvanced Research Projects Agency Network. The first operational network, funded by the US Department of Defense to connect universities.
1985NSFNETNational Science Foundation Network. A more capable “backbone” network designed to promote advanced research and education.
1990The InternetThe result of connecting ARPANET, NSFNET, and various private networks into a worldwide system.

Exam Tip: Watch out for the “s”! It is Advanced Research Projects Agency Network. Missing that “s” in “Projects” is a common way to lose a half-mark in the board exams.

——————————————————————————–

3. Core Benefits: Why Do We Network?

We connect computers to make life easier and more efficient. Here are the four “Hardware & Heart” reasons:

  • Resource Sharing:
    • Hardware: Sharing one high-speed printer or scanner among 20 computers.
    • Software/Information: Sharing open-source files, reports, or central databases.
  • Reliability: Keeping copies of files on multiple machines (redundancy). If one computer crashes, your data is safe on another node.
  • Cost Efficiency: It is much cheaper to buy one expensive, high-quality laser printer and share it over a network than to buy 10 cheap individual printers.
  • Communication: Networks allow for the instant exchange of text, video, and audio (VoIP, Email, Chat).

Common Mistake: Students often categorize “sharing a PDF” as resource sharing but forget that “using a server’s processing power” is also a form of sharing. Remember: Resources = Hardware + Software + Data.

——————————————————————————–

4. Switching Techniques: How Data Finds Its Way

In a large network, there are many paths from the sender to the receiver. We use two main techniques:

  1. Circuit Switching: A dedicated, physical path is established for the entire duration of the communication. Example: A traditional telephone call.
  2. Packet Switching: Data is broken into small chunks called Packets. Each packet travels independently through the most optimum route. Example: Sending an email.

——————————————————————————–

5. Basic Terminology: Nodes, Servers, and Clients

  • Node (Workstation): Any device (PC, laptop, smartphone, printer) attached to a network that can send or receive data.
  • Server: A special, powerful computer that provides services (data, software, or hardware access) to other computers.
  • Client: A device that sends a request to the server to use its resources.

The Relationship Flow: [Client (Requester)] <——> [Communication Media] <——> [Server (Provider)]

——————————————————————————–

6. Measuring Capacity: Bandwidth and Data Transfer Rate (DTR)

We measure a network’s “speed” using these two metrics:

  • Bandwidth: The maximum amount of data that can be sent in one second (theoretical capacity).
  • Data Transfer Rate (DTR): The actual speed at which data moves from one location to another.

Topper’s Secret: The 1024 Rule Computers use binary logic. While “Kilo” usually means 1000, in networking units for DTR, we use:

  • 1 Kbps (Kilobits per second) = 1024 bits per second (bps)
  • 1 Mbps (Megabits per second) = 1024 Kbps
  • 1 Gbps (Gigabits per second) = 1024 Mbps

——————————————————————————–

7. Transmission Media – Part 1: Guided (Wired)

Guided media use physical paths (cables).

MediumSpeed/DistanceProsConsBest Used For
Twisted PairUp to 1 Gbps (100m)Inexpensive, flexible, easy to install.Low bandwidth; not suitable for broadband applications.Home/Office LANs.
Coaxial CableHigh FrequencyDurable, carries multi-channel signals (Broadband).If the main cable fails, the whole network dies.Cable TV and Broadband.
Optical FiberExtremely HighImmune to electrical noise, very secure, high speed.Very expensive; difficult to install or solder/join.Long-distance backbones.

Deep Dive: Optical Fiber Construction

  1. Core: The glass/plastic center where light travels.
  2. Cladding: Reflects the light pulses back into the core.
  3. Protective Coating: The outer layer that prevents physical damage.

——————————————————————————–

8. Transmission Media – Part 2: Unguided (Wireless)

Wireless media transmit data through the air using electromagnetic waves.

  • Bluetooth: Short distance (up to 10m). Used for PAN. Example: Wireless Earbuds.
  • Infrared: Very short distance. Requires Line of Sight (cannot penetrate walls). Example: TV Remote.
  • Microwave: High-frequency radio signals. Requires Line of Sight. Covers up to 100km. Example: Satellite links.
  • Radio Link: Omnidirectional (spreads in all directions). Can travel through buildings but affected by weather. Example: AM/FM Radio.
  • Satellite: Stationed 22,300 miles above Earth. Excellent for global multimedia transmission. Example: GPS or ATM networks.

——————————————————————————–

9. Networking Devices: The Hardware Heroes

  • Modem (Modulator/Demodulator): Converts digital bits to analog signals for telephone lines and vice versa.
  • Ethernet Card (NIC): A physical card that provides a unique MAC address and a port for connection.
  • RJ45: The 8-pin plastic plug used with Ethernet cables.
  • Repeater: Boosts/Amplifies weak signals to prevent data loss over long distances.
  • Router: The “GPS” of the network. It finds the shortest/best path for data packets between different networks.
  • Gateway: A “Translator.” It connects two dissimilar networks (different protocols).

The Intelligent Upgrade: Hub vs. Switch

  • Hub: A “Dumb” device. It broadcasts data to all connected ports, causing traffic congestion and collisions.
  • Switch: An “Intelligent Hub.” It reads the MAC address of the destination and sends data only to the intended port.

Topper’s Secret: In Case Study questions, always suggest a Switch over a Hub to minimize collisions, and a Gateway when connecting a local office to a completely different external system!

——————————————————————————–

10. Types of Networks (Geographical Scale)

TypeFull FormRangeOwnershipExample
PANPersonal AreaUp to 10-30mIndividualBluetooth phone to earbuds
LANLocal Area1m to 5kmSingle OrgSchool Lab or Office
MANMetropolitan5km to 50kmConsortiumCable TV network in a city
WANWide Area1000km+Global/NatlThe Internet

——————————————————————————–

11. Network Topologies: The Physical Layout

  • Bus (Linear): All nodes connect to a single backbone cable. [Terminator]--[Node]--[Backbone]--[Node]--[Terminator]
    • Pro: Easy to install. Con: Backbone failure kills the whole network.
  • Star: Nodes connect to a central Hub/Switch. [Node]--[Hub]--[Node]
    • Pro: Reliable (one node failure doesn’t affect others). Con: Central hub failure is fatal.
  • Ring: Nodes form a closed circle. [Node]--[Node]--[Node]--[Node]
    • Pro: No central server needed. Con: One node failure breaks the ring.
  • Tree (Star-Bus): Hierarchical structure. Stars connected by a bus.
    • Best for: Large organizations with hierarchical data flow.
  • Mesh: Every node is connected to every other node.
    • Best for: Critical long-distance networks where you need a “backup route” (Robustness).

——————————————————————————–

12. MAC vs. IP Addresses: Identifying the Nodes

To send data, we need two addresses:

FeatureMAC AddressIP Address
Full FormMedia Access ControlInternet Protocol
TypePhysical / Hardware AddressLogical / Software Address
Size48-bit (6 bytes)IPv4: 32-bit | IPv6: 128-bit
PermanencePermanent (Set by manufacturer)Temporary (Can be static or dynamic)
FormatHexadecimal (e.g., 05:C2:59…)Dotted Decimal (e.g., 192.168.1.1)

Topper’s Secret: A MAC Address is split into two: The first 24 bits are the Manufacturer ID, and the last 24 bits are the Unique Serial Number.

——————————————————————————–

13. Network Protocols & DNS

  • TCP/IP: The fundamental language of the internet.
  • HTTP/HTTPS: For web browsing. (S = Secure/Encrypted).
  • FTP: For file transfers.
  • VoIP: Voice calls over internet (e.g., WhatsApp).

Mnemonics to Remember:

  • SMTP: Sending Mail To People.
  • POP3: Post Office Protocol (Used for receiving email).

Domain Name System (DNS) Resolution Steps:

  1. You type google.com (Domain Name).
  2. Browser asks the Operating System for the IP.
  3. OS checks its “host file.”
  4. If not found, it asks the DNS Server.
  5. DNS Server maps the name to a numeric IP (e.g., 172.217.1.1) and returns it.

——————————————————————————–

14. Web Services & Network Security

  • XML: Extensible Markup Language. Used for structuring and transmitting data (human and machine-readable).
  • IoT (Internet of Things): Devices like smart ACs, cars, and cameras connecting to the internet.
  • Firewall: A barrier (hardware/software) that prevents unauthorized access to a private network.
  • Cookies: Small text files stored on your computer to remember login details or preferences.
  • Trojan Horse: Malware that looks like a useful program but grants unauthorized access. Crucial point: Unlike viruses, Trojans do not self-replicate.
  • Hacker vs. Cracker:
    • Hacker: Someone who finds weaknesses to help/fix (White Hat).
    • Cracker: Someone who breaks in for criminal gain (Black Hat).
  • Cyber Law: Legal framework dealing with internet usage, privacy, and intellectual property.

——————————————————————————–

MANDATORY EXAM PREP SECTIONS

15. Quick Revision Sheet

  • ARPANET: Advanced Research Projects Agency Network.
  • Repeater: Amplifies weak signals.
  • Gateway: Connects Dissimilar networks.
  • Switch: Uses MAC Addresses to send data intelligently.
  • IPv4 vs IPv6: 32-bit vs 128-bit.
  • MAC Address: 48-bit (24 Manufacturer ID + 24 Serial).
  • Topologies: Star is most common; Mesh is most robust.
  • DTR: 1 Mbps = 1024 Kbps.

16. Previous Year Questions (PYQs)

  • 1 Mark: Expand NSFNET. (National Science Foundation Network).
  • 2 Marks: Difference between MAC and IP Address. (Physical vs Logical).
  • 4 Marks (Case Study): “Suggest the best topology and cable for a multi-office setup where Building A (100 computers) is 2km away from Building B.”
    • Ans: Star topology for Building A. Optical Fiber for the 2km distance.

17. Most Expected Questions

  1. Explain the breakdown of the 48 bits in a MAC address.
  2. Differentiate between Circuit Switching and Packet Switching.
  3. Why is Optical Fiber preferred for broadband? (Source keyword: High bandwidth, immune to noise).
  4. Explain the role of a DNS server in domain name resolution.
  5. What is the difference between a Hacker and a Cracker?

18. Practice MCQs

  1. Which device is used to connect dissimilar networks?
    • a) Hub b) Router c) Gateway d) Switch
    • Ans: (c) Gateway.
  2. Which protocol is used for sending emails?
    • a) FTP b) SMTP c) POP3 d) HTTP
    • Ans: (b) SMTP (Sending Mail To People).

[1 Mark]

1. Expand RJ45. (Ans: Registered Jack-45).

2. What is the size of an IPv6 address? (Ans: 128-bit).

[2 Marks] 3. Difference between Hub and Switch. (Refer to table in Section 6). 4. Why is Optical Fiber preferred for broadband? (Ans: High bandwidth and immunity to EMI).

[4 Mark Case-Based Question] Scenario: A company has 4 blocks: HR (25 PCs), Admin (120 PCs), Sales (30 PCs), and Tech (40 PCs). Distance between Admin and HR is 150m.

• Q1: Where should the Server be placed?

    ◦ Ans: Admin Block (it has the maximum number of computers).

• Q2: Which device is needed between Admin and HR?

    ◦ Ans: A Repeater. Standard Ethernet cables have a limit of 80-100m. Since the distance is 150m, a repeater is needed to regenerate the signal.

——————————————————————————–

15. Most Expected Questions & Practice MCQs

Expected Short Answer Questions:

1. Explain the “modulator” and “demodulator” roles of a modem.

2. Why is Star Topology considered most reliable?

3. What is the difference between a MAC address and an IP address?

4. How does DNS work? Use an analogy.

5. Define “Snooping” in network security.

6. What is the use of a Gateway?

7. Differentiate between SMTP and POP3.

8. What is a “Terminator” in Bus Topology?

9. Explain the structure of an Optical Fiber cable.

10. What is a VPN and why is it used?

Practice MCQs:

1. Which device is an “Intelligent Hub”? (A) Hub (B) Switch (C) Repeater (D) Gateway. Ans: B.

2. Standard distance limit for a Repeater on copper wire is: (A) 10m (B) 50m (C) 100m (D) 1km. Ans: C.

3. Which protocol is used for voice calls over the web? (A) FTP (B) VoIP (C) HTTP (D) SMTP. Ans: B.

4. The “S” in HTTPS stands for: (A) Simple (B) System (C) Secure (D) Software. Ans: C.

5. A web address is also known as a: (A) UTP (B) URL (C) NIC (D) MAC. Ans: B.

6. Which topology uses a “Backbone” cable? (A) Star (B) Bus (C) Tree (D) Mesh. Ans: B.

7. Size of an IPv4 address is: (A) 48-bit (B) 64-bit (C) 32-bit (D) 128-bit. Ans: C.

8. Malware that looks like a game but steals data is a: (A) Cookie (B) DoS (C) Trojan (D) Firewall. Ans: C.

9. Which network covers a city? (A) LAN (B) MAN (C) WAN (D) PAN. Ans: B.

10. A device that connects two different protocols is: (A) Router (B) Bridge (C) Gateway (D) Switch. Ans: C.

——————————————————————————–

16. Quick Revision Sheet (Cheatsheet)

• Acronyms: NIC (Network Interface Card), MAC (Media Access Control), HTTP (Hypertext Transfer Protocol), DNS (Domain Name System).

• MAC: 48-bit, permanent, hexadecimal.

• IP: 32-bit (v4) or 128-bit (v6), logical, decimal/hex.

• Bus Topology: Cheap, single cable, hard to find faults.

• Star Topology: Most common, needs more cable, easy to troubleshoot.

• Media Speed: Fiber > Coaxial > Twisted Pair.

——————————————————————————–

17. Conclusion & FAQs

You’ve got this! Focus on the tables and mnemonics. If you remember that a Switch is “Smart” and Fiber uses “Light,” you’re already halfway to an A+.

FAQs:

1. Can I change my MAC address? Theoretically no; it is hard-coded into the NIC by the manufacturer.

2. Is the Internet and WWW the same? No! Internet is the hardware (roads); WWW is the content (the cars/buildings).

3. Does a Repeater speed up the internet? No, it regenerates a weak signal so it can travel further without failing.

4. What is the difference between bits and Bytes? Bits (small ‘b’) measure speed; Bytes (capital ‘B’) measure file size. 8 bits = 1 Byte.

5. Is a Firewall hardware or software? It can be both!

6. Which topology is best for a small room? Star is the most common and reliable for a small lab.

Good luck with your exams! Stay focused!

Leave a Reply

Your email address will not be published. Required fields are marked *