SlideShare a Scribd company logo
1 https://www.pyforschool.com
COMPUTER SCIENCE – NEW (083)
CLASS - XII
Unit 2: Computer Networks (CN)
Revision Notes by https://www.pyforschool.com
IOT
Internet of things is essentially a platform where embedded devices are connected to the
internet, so they can collect and exchange data with each other. Examples are Smart Mobiles,
smart refrigerators, smart watches, smart fire alarm, smart door lock, medical sensors, fitness
trackers, smart security system
PUBLIC VS. PRIVATE CLOUD
Public Cloud
Public clouds are owned and operated by a third party. Accessed via the web, common public
clouds include Google, Microsoft Azure, AppEngine, and IBM’s Blue Cloud.
Benefits of public cloud computing are ease of access, low cost, and complete lack of
maintenance. Organizations frequently use public clouds for web-based email, online office
applications, storage, and testing and development environments.
Private Cloud
Private cloud owned exclusively by an organization and maintained on a private network with
hardware and software solely dedicated to a single business
Private clouds offer the security and customizable infrastructure not available on public clouds.
It is used by government agencies, financial institutions, and other businesses looking for
enhanced control over their cloud-based environment.
WIRED AND WIRELESS NETWORKS
A wired network uses cables to connect devices, such as laptop or desktop computers, to the
Internet or another network.
A wireless network allows devices to access your network resources from any location within
your wireless network's coverage area or from any Wi-Fi hotspot.
2 https://www.pyforschool.com
CONCEPT OF A CLIENT AND SERVER
In client server computing, the client requests a resource and the server provides that resource.
A server may serve multiple clients at the same time while a client is in contact with only one
server. Both the client and server usually communicate via a computer network.
NIC
A network interface card (NIC) is a hardware component without which a computer cannot be
connected over a network. It is a circuit board installed in a computer that provides a dedicated
network connection to the computer. It is also called network interface controller, network
adapter or LAN adapter.
SWITCH/HUB
A small hardware device that joins multiple computers together within a LAN.
REPEATER
An electronic device that amplifies the received signal and then retransmits it on the network
ROUTER
Network device that connects two networks with different protocols.
Router is a device that helps in decision making for data routes.
It works in network layer.
It has a dynamically updating routing table according to which it routes the data.
It can work on LANs and WANs.
It routes the data based on IP addresses.
ROUTING TABLE
In computer networking a routing table is a data table stored in a router that lists the routes to
particular network destinations.
ACCESS POINT
An access point is a device that creates a wireless local area network, usually in an office or
large building. An access point connects to a wired router, switch, or hub via an Ethernet cable,
and projects a Wi-Fi signal to a designated area.
3 https://www.pyforschool.com
AMPLITUDE MODULATION
A type of modulation where the amplitude of the carrier signal is modulated (changed) in
proportion to the message signal while the frequency and phase are kept constant.
FREQUENCY MODULATION
It is a type of modulation where the frequency of the carrier signal is modulated (changed) in
proportion to the message signal while the amplitude and phase are kept constant.
COLLISION IN WIRELESS NETWORKS
A network collision occurs when two or more devices attempt to transmit data over a network
at the same time.
Carrier Sense Multiple Access/with Collision Avoidance (CSMA/CA) works to avoid collisions
prior to their occurrence.
CSMA/CA increases network traffic as it requires sending out a signal to the network even
before transmitting any real data. This is to listen for any collision scenarios in the network and
to inform other devices not to transmit.
MAC ADDRESS
A media access control address (MAC address) is a unique identifier assigned to a network
interface controller (NIC) for use as a network address in communications within a network
segment. This use is common in Ethernet, Wi-Fi, and Bluetooth.
IPV4
IPv4 was the first version of IP. It was deployed for production in the ARPANET in 1983. Today it
is most widely used IP version. It is used to identify devices on a network using an addressing
system.
The IPv4 uses a 32-bit address scheme allowing to store 2^32 addresses which is more than 4
billion addresses. Till date, it is considered the primary Internet Protocol and carries 94% of
Internet traffic.
IPV6
It is the most recent version of the Internet Protocol. Internet Engineer Taskforce initiated it in
early 1994. The design and development of that suite is now called IPv6.
4 https://www.pyforschool.com
This new IP address version is being deployed to fulfill the need for more Internet addresses. It
was aimed to resolve issues which are associated with IPv4. With 128-bit address space, it
allows 2^128 unique address space. IPv6 also called IPng (Internet Protocol next generation).
DNS (DOMAIN NAME SYSTEM)
The Internet's system for converting alphabetic names into numeric IP addresses. For example,
when a Web address (URL) is typed into a browser, DNS servers return the IP address of the
Web server associated with that name.
WEB URLS,
A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the
internet. It is also referred to as a web address. URLs consist of multiple parts -- including a
protocol and domain name -- that tell a web browser how and where to retrieve a resource.
2G
They used digital signals for transmissions of voice. 2G enabled the mobile systems to provide
paging, SMS, voicemail and fax services.
3G
The 3G technology adds multimedia facilities to 2G phones by allowing video, audio, and
graphics applications.
4G
4G provides better-than-TV quality images and video-links.
WIFI
Wireless Fidelity
TRACEROUTE
Traceroute is a command which can show you the path a packet of information takes from your
computer to one you specify. It will list all the routers it passes through until it reaches its
destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop'
from router to router takes.
PING
5 https://www.pyforschool.com
Ping is a computer network administration software utility used to test the reachability of a
host on an Internet Protocol network.
IPCONFIG
In computing, ipconfig is a console application of some operating systems that displays all
current TCP/IP network configuration values and refresh Dynamic Host Configuration Protocol
and Domain Name System settings.
NSLOOKUP
nslookup is a network administration command-line tool available in many computer operating
systems for querying the Domain Name System to obtain domain name or IP address mapping,
or other DNS records.
WHOIS
WHOIS is a query and response protocol that is widely used for querying databases that store
the registered users or assignees of an Internet resource, such as a domain name, an IP address
block or an autonomous system.
SPEED-TEST
The speed test can be conducted by an end-user to determine the upload and download speed
of a network. It can be a mobile data network or WIFI. There are several factors affecting speed
test, such as: Device, Network service, Servers
HTTPS
Hypertext Transfer Protocol Secure is a secure version of the HTTP protocol that uses the
SSL/TLS protocol for encryption and authentication.
TELNET
Telnet is the main internet protocol for creating a connection with a remote machine. It allows
you to connect to remote computers (called remote hosts) over a TCP/IP network (such as the
Internet).
HTTP
HTTP is the protocol that is used for transferring hypertext (i.e. text, graphic, image, sound,
video etc.) between two computers and is particularly used on the World Wide Web. It is a
6 https://www.pyforschool.com
TCP/IP based communication protocol and provides a standard for Web browsers and servers
to communicate.
FTP
It is used for transferring files from one system to another on the internet.
SCP
Secure copy protocol (SCP) is a means of securely transferring computer files between a local
host and a remote host or between two remote hosts.
SSH
SSH, also known as Secure Shell, is a network protocol that gives users, particularly system
administrators, a secure way to access a computer over an unsecured network.
POP
Post Office Protocol (POP) is a type of computer networking and Internet standard protocol
that extracts and retrieves email from a remote mail server for access by the host machine.
IMAP
The Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email
clients to retrieve email messages from a mail server over a TCP/IP connection.
SMTP
It allows transmission of email over the Internet.
VOIP
VoIP stands for voice over internet protocol. It enables the transfer of voice using packet
switched network rather than using public switched telephone network.
NFC
NFC or Near Field Communication is a protocol that helps two devices communicate wirelessly
when they are placed right next to each other—for instance, smartphones or smart watches.
----------------x---------------------x----------------x------------

More Related Content

What's hot (20)

PPTX
Basics of computer networks
Rubal Sagwal
 
PDF
Network cables
javaidsameer123
 
PPTX
Introduction to Computer Networking
shankars73
 
PPTX
Tipos de cabos
Gonçalo
 
PDF
Data communication lab manual
Nafe Singh Yadav
 
PPT
Bnc Connectors
Manish Yadav
 
PPTX
Ethernet - LAN
Adeel Rasheed
 
PPTX
Layer 2 and Layer 3 Switches - Features and Applications.pptx
VERSITRONINC
 
PPTX
Network Troubleshooting
Joy Sarker
 
PPTX
SYBSC IT COMPUTER NETWORKS UNIT V Process to-Process Delivery
Arti Parab Academics
 
PPTX
Subnet Masks
swascher
 
PPTX
Computer networking devices
Rajesh Sadhukha
 
PPT
Explaining ip address
MohsinHusenManasiya
 
PPTX
Trouble shooting pada jaringan lan dan solusinya
afandi_latif
 
DOCX
Straight through ethernet cable color coding
Melchor Maravillas
 
PPT
SOHO Network Setup Tutorial
junaidahmedsaba
 
PPTX
Networking devices
Mubassir Ambekar
 
PPTX
IP Address
Rahul P
 
PPT
Addressing
Gichelle Amon
 
Basics of computer networks
Rubal Sagwal
 
Network cables
javaidsameer123
 
Introduction to Computer Networking
shankars73
 
Tipos de cabos
Gonçalo
 
Data communication lab manual
Nafe Singh Yadav
 
Bnc Connectors
Manish Yadav
 
Ethernet - LAN
Adeel Rasheed
 
Layer 2 and Layer 3 Switches - Features and Applications.pptx
VERSITRONINC
 
Network Troubleshooting
Joy Sarker
 
SYBSC IT COMPUTER NETWORKS UNIT V Process to-Process Delivery
Arti Parab Academics
 
Subnet Masks
swascher
 
Computer networking devices
Rajesh Sadhukha
 
Explaining ip address
MohsinHusenManasiya
 
Trouble shooting pada jaringan lan dan solusinya
afandi_latif
 
Straight through ethernet cable color coding
Melchor Maravillas
 
SOHO Network Setup Tutorial
junaidahmedsaba
 
Networking devices
Mubassir Ambekar
 
IP Address
Rahul P
 
Addressing
Gichelle Amon
 

Similar to Computer networks - CBSE New Syllabus (083) Class - XII (20)

PPTX
computer network lesson class 12 CN Part 1.pptx
Amit Mishra
 
PDF
Data Communication Class Note
Abul Kalam Robin
 
PPT
CS1308 - 02/08/10
Megan Goldner Martinez
 
PPT
Computer network and email basic concepts
Md Irfan Ansari
 
PPT
Terminology-slides-converted for notes.ppt
nithya438196
 
PPT
Terminology-slides-converted notes for.ppt
nithya438196
 
PPTX
TELECOMMUNICATION AND NETWORK topologies
nawaabajitsingh
 
PPTX
LIS3353 SP12 Week 11
Amanda Case
 
PDF
Introduction to networking
Mohsen Sarakbi
 
PDF
Note1
nehrumariya
 
PPTX
Training_Network_2 computer network.pptx
yogeshragav0822
 
PPT
network fundamentals
Sithu PM
 
PPTX
Computer Networks Part 1.pptx
zjjsjsnn
 
PPTX
COMPUTER NETWORKS.pptx
varunvigneshprabhaka
 
PPTX
Networking devices
Ravi KC
 
PPT
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
Yahya Electone
 
PPTX
Computer Networks
Mark Rotondella
 
PDF
Computer networks
MDHASNAIN23
 
PPTX
E business 2014 l06
kchanaka3
 
PPT
1 introduction-to-computer-networking
Priya Manik
 
computer network lesson class 12 CN Part 1.pptx
Amit Mishra
 
Data Communication Class Note
Abul Kalam Robin
 
CS1308 - 02/08/10
Megan Goldner Martinez
 
Computer network and email basic concepts
Md Irfan Ansari
 
Terminology-slides-converted for notes.ppt
nithya438196
 
Terminology-slides-converted notes for.ppt
nithya438196
 
TELECOMMUNICATION AND NETWORK topologies
nawaabajitsingh
 
LIS3353 SP12 Week 11
Amanda Case
 
Introduction to networking
Mohsen Sarakbi
 
Training_Network_2 computer network.pptx
yogeshragav0822
 
network fundamentals
Sithu PM
 
Computer Networks Part 1.pptx
zjjsjsnn
 
COMPUTER NETWORKS.pptx
varunvigneshprabhaka
 
Networking devices
Ravi KC
 
I N T R O T O C O M P U T E R N E T W O R K S ( N E W)
Yahya Electone
 
Computer Networks
Mark Rotondella
 
Computer networks
MDHASNAIN23
 
E business 2014 l06
kchanaka3
 
1 introduction-to-computer-networking
Priya Manik
 
Ad

More from Deepak Singh (20)

PDF
Chpater29 operation-on-file
Deepak Singh
 
PDF
Chapter28 data-file-handling
Deepak Singh
 
PDF
Chapter27 polymorphism-virtual-function-abstract-class
Deepak Singh
 
PDF
Chapter26 inheritance-ii
Deepak Singh
 
PDF
Chapter25 inheritance-i
Deepak Singh
 
PDF
Chapter24 operator-overloading
Deepak Singh
 
PDF
Chapter23 friend-function-friend-class
Deepak Singh
 
PDF
Chapter22 static-class-member-example
Deepak Singh
 
PDF
Chapter21 separate-header-and-implementation-files
Deepak Singh
 
PDF
Chapter20 class-example-program
Deepak Singh
 
PDF
Chapter19 constructor-and-destructor
Deepak Singh
 
PDF
Chapter18 class-and-objects
Deepak Singh
 
PDF
Chapter17 oop
Deepak Singh
 
PDF
Chapter16 pointer
Deepak Singh
 
PDF
Chapter15 structure
Deepak Singh
 
PDF
Chapter13 two-dimensional-array
Deepak Singh
 
PDF
Chapter12 array-single-dimension
Deepak Singh
 
PDF
Chapter 11 Function
Deepak Singh
 
PDF
Chapter 10 Library Function
Deepak Singh
 
PDF
Chapter 9 - Loops in C++
Deepak Singh
 
Chpater29 operation-on-file
Deepak Singh
 
Chapter28 data-file-handling
Deepak Singh
 
Chapter27 polymorphism-virtual-function-abstract-class
Deepak Singh
 
Chapter26 inheritance-ii
Deepak Singh
 
Chapter25 inheritance-i
Deepak Singh
 
Chapter24 operator-overloading
Deepak Singh
 
Chapter23 friend-function-friend-class
Deepak Singh
 
Chapter22 static-class-member-example
Deepak Singh
 
Chapter21 separate-header-and-implementation-files
Deepak Singh
 
Chapter20 class-example-program
Deepak Singh
 
Chapter19 constructor-and-destructor
Deepak Singh
 
Chapter18 class-and-objects
Deepak Singh
 
Chapter17 oop
Deepak Singh
 
Chapter16 pointer
Deepak Singh
 
Chapter15 structure
Deepak Singh
 
Chapter13 two-dimensional-array
Deepak Singh
 
Chapter12 array-single-dimension
Deepak Singh
 
Chapter 11 Function
Deepak Singh
 
Chapter 10 Library Function
Deepak Singh
 
Chapter 9 - Loops in C++
Deepak Singh
 
Ad

Recently uploaded (20)

PPTX
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
PDF
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
PDF
Virat Kohli- the Pride of Indian cricket
kushpar147
 
PPTX
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
DOCX
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
PPTX
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
PPTX
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
PPTX
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
PDF
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
PDF
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
PPTX
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PPTX
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
PPTX
Basics and rules of probability with real-life uses
ravatkaran694
 
PPTX
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
PPTX
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
PPTX
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
PPTX
Electrophysiology_of_Heart. Electrophysiology studies in Cardiovascular syste...
Rajshri Ghogare
 
PDF
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
PDF
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
PDF
My Thoughts On Q&A- A Novel By Vikas Swarup
Niharika
 
Python-Application-in-Drug-Design by R D Jawarkar.pptx
Rahul Jawarkar
 
TOP 10 AI TOOLS YOU MUST LEARN TO SURVIVE IN 2025 AND ABOVE
digilearnings.com
 
Virat Kohli- the Pride of Indian cricket
kushpar147
 
ENGLISH 8 WEEK 3 Q1 - Analyzing the linguistic, historical, andor biographica...
OliverOllet
 
pgdei-UNIT -V Neurological Disorders & developmental disabilities
JELLA VISHNU DURGA PRASAD
 
Sonnet 130_ My Mistress’ Eyes Are Nothing Like the Sun By William Shakespear...
DhatriParmar
 
Cleaning Validation Ppt Pharmaceutical validation
Ms. Ashatai Patil
 
Top 10 AI Tools, Like ChatGPT. You Must Learn In 2025
Digilearnings
 
Module 2: Public Health History [Tutorial Slides]
JonathanHallett4
 
Tips for Writing the Research Title with Examples
Thelma Villaflores
 
20250924 Navigating the Future: How to tell the difference between an emergen...
McGuinness Institute
 
PROTIEN ENERGY MALNUTRITION: NURSING MANAGEMENT.pptx
PRADEEP ABOTHU
 
Basics and rules of probability with real-life uses
ravatkaran694
 
Continental Accounting in Odoo 18 - Odoo Slides
Celine George
 
How to Track Skills & Contracts Using Odoo 18 Employee
Celine George
 
LDP-2 UNIT 4 Presentation for practical.pptx
abhaypanchal2525
 
Electrophysiology_of_Heart. Electrophysiology studies in Cardiovascular syste...
Rajshri Ghogare
 
The Minister of Tourism, Culture and Creative Arts, Abla Dzifa Gomashie has e...
nservice241
 
Antianginal agents, Definition, Classification, MOA.pdf
Prerana Jadhav
 
My Thoughts On Q&A- A Novel By Vikas Swarup
Niharika
 

Computer networks - CBSE New Syllabus (083) Class - XII

  • 1. 1 https://www.pyforschool.com COMPUTER SCIENCE – NEW (083) CLASS - XII Unit 2: Computer Networks (CN) Revision Notes by https://www.pyforschool.com IOT Internet of things is essentially a platform where embedded devices are connected to the internet, so they can collect and exchange data with each other. Examples are Smart Mobiles, smart refrigerators, smart watches, smart fire alarm, smart door lock, medical sensors, fitness trackers, smart security system PUBLIC VS. PRIVATE CLOUD Public Cloud Public clouds are owned and operated by a third party. Accessed via the web, common public clouds include Google, Microsoft Azure, AppEngine, and IBM’s Blue Cloud. Benefits of public cloud computing are ease of access, low cost, and complete lack of maintenance. Organizations frequently use public clouds for web-based email, online office applications, storage, and testing and development environments. Private Cloud Private cloud owned exclusively by an organization and maintained on a private network with hardware and software solely dedicated to a single business Private clouds offer the security and customizable infrastructure not available on public clouds. It is used by government agencies, financial institutions, and other businesses looking for enhanced control over their cloud-based environment. WIRED AND WIRELESS NETWORKS A wired network uses cables to connect devices, such as laptop or desktop computers, to the Internet or another network. A wireless network allows devices to access your network resources from any location within your wireless network's coverage area or from any Wi-Fi hotspot.
  • 2. 2 https://www.pyforschool.com CONCEPT OF A CLIENT AND SERVER In client server computing, the client requests a resource and the server provides that resource. A server may serve multiple clients at the same time while a client is in contact with only one server. Both the client and server usually communicate via a computer network. NIC A network interface card (NIC) is a hardware component without which a computer cannot be connected over a network. It is a circuit board installed in a computer that provides a dedicated network connection to the computer. It is also called network interface controller, network adapter or LAN adapter. SWITCH/HUB A small hardware device that joins multiple computers together within a LAN. REPEATER An electronic device that amplifies the received signal and then retransmits it on the network ROUTER Network device that connects two networks with different protocols. Router is a device that helps in decision making for data routes. It works in network layer. It has a dynamically updating routing table according to which it routes the data. It can work on LANs and WANs. It routes the data based on IP addresses. ROUTING TABLE In computer networking a routing table is a data table stored in a router that lists the routes to particular network destinations. ACCESS POINT An access point is a device that creates a wireless local area network, usually in an office or large building. An access point connects to a wired router, switch, or hub via an Ethernet cable, and projects a Wi-Fi signal to a designated area.
  • 3. 3 https://www.pyforschool.com AMPLITUDE MODULATION A type of modulation where the amplitude of the carrier signal is modulated (changed) in proportion to the message signal while the frequency and phase are kept constant. FREQUENCY MODULATION It is a type of modulation where the frequency of the carrier signal is modulated (changed) in proportion to the message signal while the amplitude and phase are kept constant. COLLISION IN WIRELESS NETWORKS A network collision occurs when two or more devices attempt to transmit data over a network at the same time. Carrier Sense Multiple Access/with Collision Avoidance (CSMA/CA) works to avoid collisions prior to their occurrence. CSMA/CA increases network traffic as it requires sending out a signal to the network even before transmitting any real data. This is to listen for any collision scenarios in the network and to inform other devices not to transmit. MAC ADDRESS A media access control address (MAC address) is a unique identifier assigned to a network interface controller (NIC) for use as a network address in communications within a network segment. This use is common in Ethernet, Wi-Fi, and Bluetooth. IPV4 IPv4 was the first version of IP. It was deployed for production in the ARPANET in 1983. Today it is most widely used IP version. It is used to identify devices on a network using an addressing system. The IPv4 uses a 32-bit address scheme allowing to store 2^32 addresses which is more than 4 billion addresses. Till date, it is considered the primary Internet Protocol and carries 94% of Internet traffic. IPV6 It is the most recent version of the Internet Protocol. Internet Engineer Taskforce initiated it in early 1994. The design and development of that suite is now called IPv6.
  • 4. 4 https://www.pyforschool.com This new IP address version is being deployed to fulfill the need for more Internet addresses. It was aimed to resolve issues which are associated with IPv4. With 128-bit address space, it allows 2^128 unique address space. IPv6 also called IPng (Internet Protocol next generation). DNS (DOMAIN NAME SYSTEM) The Internet's system for converting alphabetic names into numeric IP addresses. For example, when a Web address (URL) is typed into a browser, DNS servers return the IP address of the Web server associated with that name. WEB URLS, A URL (Uniform Resource Locator) is a unique identifier used to locate a resource on the internet. It is also referred to as a web address. URLs consist of multiple parts -- including a protocol and domain name -- that tell a web browser how and where to retrieve a resource. 2G They used digital signals for transmissions of voice. 2G enabled the mobile systems to provide paging, SMS, voicemail and fax services. 3G The 3G technology adds multimedia facilities to 2G phones by allowing video, audio, and graphics applications. 4G 4G provides better-than-TV quality images and video-links. WIFI Wireless Fidelity TRACEROUTE Traceroute is a command which can show you the path a packet of information takes from your computer to one you specify. It will list all the routers it passes through until it reaches its destination, or fails to and is discarded. In addition to this, it will tell you how long each 'hop' from router to router takes. PING
  • 5. 5 https://www.pyforschool.com Ping is a computer network administration software utility used to test the reachability of a host on an Internet Protocol network. IPCONFIG In computing, ipconfig is a console application of some operating systems that displays all current TCP/IP network configuration values and refresh Dynamic Host Configuration Protocol and Domain Name System settings. NSLOOKUP nslookup is a network administration command-line tool available in many computer operating systems for querying the Domain Name System to obtain domain name or IP address mapping, or other DNS records. WHOIS WHOIS is a query and response protocol that is widely used for querying databases that store the registered users or assignees of an Internet resource, such as a domain name, an IP address block or an autonomous system. SPEED-TEST The speed test can be conducted by an end-user to determine the upload and download speed of a network. It can be a mobile data network or WIFI. There are several factors affecting speed test, such as: Device, Network service, Servers HTTPS Hypertext Transfer Protocol Secure is a secure version of the HTTP protocol that uses the SSL/TLS protocol for encryption and authentication. TELNET Telnet is the main internet protocol for creating a connection with a remote machine. It allows you to connect to remote computers (called remote hosts) over a TCP/IP network (such as the Internet). HTTP HTTP is the protocol that is used for transferring hypertext (i.e. text, graphic, image, sound, video etc.) between two computers and is particularly used on the World Wide Web. It is a
  • 6. 6 https://www.pyforschool.com TCP/IP based communication protocol and provides a standard for Web browsers and servers to communicate. FTP It is used for transferring files from one system to another on the internet. SCP Secure copy protocol (SCP) is a means of securely transferring computer files between a local host and a remote host or between two remote hosts. SSH SSH, also known as Secure Shell, is a network protocol that gives users, particularly system administrators, a secure way to access a computer over an unsecured network. POP Post Office Protocol (POP) is a type of computer networking and Internet standard protocol that extracts and retrieves email from a remote mail server for access by the host machine. IMAP The Internet Message Access Protocol (IMAP) is an Internet standard protocol used by email clients to retrieve email messages from a mail server over a TCP/IP connection. SMTP It allows transmission of email over the Internet. VOIP VoIP stands for voice over internet protocol. It enables the transfer of voice using packet switched network rather than using public switched telephone network. NFC NFC or Near Field Communication is a protocol that helps two devices communicate wirelessly when they are placed right next to each other—for instance, smartphones or smart watches. ----------------x---------------------x----------------x------------