KEMBAR78
Computer Networking | PDF | Computer Network | Network Topology
0% found this document useful (0 votes)
32 views7 pages

Computer Networking

This document provides an overview of communication and network concepts, including definitions of networks, data communication, and various transmission media such as twisted pair cables, coaxial cables, and optical fibers. It also discusses network devices, types of networks, network topologies, and communication protocols, highlighting their functions and advantages/disadvantages. Additionally, it covers modern communication technologies like GSM, CDMA, and 3G, emphasizing their significance in mobile communication.

Uploaded by

aditridubey1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views7 pages

Computer Networking

This document provides an overview of communication and network concepts, including definitions of networks, data communication, and various transmission media such as twisted pair cables, coaxial cables, and optical fibers. It also discusses network devices, types of networks, network topologies, and communication protocols, highlighting their functions and advantages/disadvantages. Additionally, it covers modern communication technologies like GSM, CDMA, and 3G, emphasizing their significance in mobile communication.

Uploaded by

aditridubey1
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOC, PDF, TXT or read online on Scribd
You are on page 1/ 7

COMPUTER SCIENCE ASHWANI SIR

Communication and Network Concepts


Network: A network is defined as a interconnected collection of autonomous computers. Two computers are said
to be interconnected if they are capable of exchanging information.
Need for Networking : 1:To share computer files. 2: To enable different computers to communicate with each other.
3: To share I/O devices.4: To improve communication speed and accuracy.
Data Communication: The purpose of data communication is to transport data from one agent to another. The
data is transmitted from source to destination through a transmission medium in the form of electromagnetic
waves. The transmission media can be a physical connection (wires) or simply air. The former is called guided
media and the latter is known as unguided media. The guided media provides a direct link between the two
communication devices and therefore, it is also known as point to point communication however, multi point
guided transaction is also possible where several communicating device share the same transmission medium.
Data Communication system mainly consist of five basic components Speaker, Telephone,Telephone lines and listener.
#ARPANET: Advanced research project agency network, was first computer network in which computer s of US
Defense were connected with the computers of different universities to travel data.
Communication Channel and Transmission Media: A communication channel refers to a path ,a line or a link
that interconnect a source from which data is sent to it’s destination. Thus a channel is a data highway which
carries the data or signals from the source to destination. Some popular communication channels are given below.
1: Twisted Pair Cable: A twisted pair is an inexpensive transmission media. It consist of two insulated copper
wires twisted in spiral pattern one pair acts as single communication link #Advantages: Low Cost, Flexible
#Disadvantages: High Attenuation ,Low speed , Low Bandwidth and noise Interferences
2: Coaxial Cable : A co axial cable is made up of central copper wire surrounded by a conductive sleeve separated
by a insulator. The inner core carries the signal and the shield provides the ground. The co axial cable is an all
purpose transmission medium in the sense that it can be used in a wide variety of applications such as long
distance telephone, television ,transmission network etc. There are two types of coaxial cables Base band (can carry voice,
data or video on a single channel at a very high speed) and Broad band (Can carry multiple signals at a time ).
#Advantages: Optimum price (More than twisted pair but less than optical fiber) , attenuation is less than
twisted pair cable, Low noise Interferences.
#Disadvantages: Low speed and low Bandwidth as compared to the optical fiber.
3: Optical fiber : An optical fiber is a thin strand of light conducting glass or plastic fiber. It consists of thin
strands of glass or glass like material, which are so constructed that they carry light from one source at one end of
the fiber to a detector at the other end. The light sources used are either light emitting diodes (LEDS) or laser
diodes. The bandwidth of the medium is very high LED is 120-150 mbps. It has complete immunity to noise and
transmit data with negligible loss.
#ADVANTAGES : 1: Optical fiber has the capacity to carry voice, video and data at extremely high speed.
2: It offers low bit error rates.
3: Zero electrical interference and complete electrical isolation(major advantage of optical fiber systems).
4: It is not possible to have branch lines by taping off a fiber, which is an added advantage for data security .
#DISADVANTAGES: 1: Installation problem. 2: Cost is High.
MICROWAVE TRANSMISSION: Microwave signals are also used to transmit data and voice over long
distances through air without any wire or cable. The signals are transmitted through directional parabolic antennas
placed on tops of buildings, towers, or hills so that the terrain does not block the line of sight. Microwave
communication is used when it is not possible to communicate through ground due to fading of signals that cannot
be amplified without noise or rugged terrain such as desert, sea, hills etc.
INFRARED TRANSMISSION: It is a new development in data communications. Similar to microwave
transmission, it also discards wiring altogether. There are point-to-point infrared links that are used to replace cable
between adjacent buildings. A high-intensity modulated infrared beam is bounced off the ceiling of an office,
which scatters around the room. A data-communicating device using a simple solid-state detector can receive it.

COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 1


COMPUTER SCIENCE ASHWANI SIR
This device can also bounce its own data against the ceiling through a solid-state infrared emitter and broadcast it
to all other devices in the office. In this way sufficient area can be covered with little of power consumption. Thus,
the cost of cabling is avoided. The infrared signals are highly susceptible to high intensity light and the neighbors
can overhear the data also. This poses a serious threat to data security.
:Transmission modes:
Simplex: In this mode of transmission, the data or signal is sent always in one direction. A keyboard attached to a
computer can also sent data to the computer.
Half Duplex: half duplex mode allows transmission in either direction but not simultaneously. This mode is also known as
two way alternate. For example the transmission of data to and from a hard disk is done in half duplex mode.
Full Duplex: This mode allows transmission in both direction simultaneously. Special purpose telephone lines
provide this capability.
:Data Communication Terminology:
#Baud: The term baud or baud rate describes the signaling interval on a line.
#Baud Rate: The baud rate is the measure of the modulation rate the number of discrete signaling per second not
of the data transfer rate.
#Bit Rate: The bit rate is related to the speed of a device the speed at which bimary digits can be transferred over a
communication channel.
#Bandwidth: Bandwidth means the capacity of medium to transmit a signal. It is the amount of information that
can be transmitted through a cable.
#Data transfer Rate: A data transfer rate is the amount of data that move from one place to another in a given
time usually in second’s time. :NETWORK DEVICES:
#Modem: Modem ( Modulator/Demodulator ) is a computer peripheral used to connect computer through
telephone lines. It converts digital signals to analog and vice versa. Two types of modems are there
1: Internal modem 2: External modem
#Ethernet Card: Ethernet card is LAN developed by Xerox Corp
#Repeater: A repeater is an electronic device that receives a signal, clean it from the unnecessary noise,
regenerate it and retransmits it at a higher power level, or to the other side of an obstruction, so that the signal can
cover longer distances without degradation. In most twisted pair Ethernet configurations, repeaters are required for
cable which runs longer than 100 meters.
#HUB A network hub contains multiple ports. When a packet arrives at one port, it is copied unmodified to all
ports of the hub for transmission. The destination address in the frame is not changed to a broadcast address
#Bridges: .A bridge is a device which is used to connect several two LAN which are having different types of
cables.
Bridges come in three basic types: Local bridges: Directly connect local area networks (LANs)
Remote bridges: Can be used to create a wide area network (WAN) link between LANs. Remote bridges, where
the connecting link is slower than the end networks, largely have been replaced with routers.Wireless bridges: Can
be used to join LANs or connect remote stations to LANs
#Switches: A network device which is used to segment network is called bridge.
#Routers A router is a networking device that forwards packets between networks using information in protocol
headers and forwarding tables to determine the best next router for each packet.
#Gateway: A gateway is a device used to connect dissimilar networks.
#Multiplexer : A Multiplexer is a device that allows a single communication channel to carry simultaneously data
transmitted from many terminals.
TYPES OF NETWORKS:
Common types of computer networks may be identified by their scale.
Personal area network: A personal area network (PAN) is a computer network used for communication among
computer and different information technological devices close to one person. Some examples of devices that are

COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 2


COMPUTER SCIENCE ASHWANI SIR
used in a PAN are personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game
consoles. A PAN may include wired and wireless connections between devices. The reach of a PAN typically
extends to 10 meters.[2] Wired PAN network is usually constructed with USB and Firewire while wireless with
Bluetooth and Infrared.
#Local area network: A local area network (LAN) is a network that connects computers and devices in a
limited geographical area such as home, school, computer laboratory, office building, or closely positioned group
of buildings. Each computer or device on the network is a node.
#Metropolitan area network : A metropolitan area network (MAN) is a network that connects two or more
local area networks or campus area networks together but does not extend beyond the boundaries of the immediate
town/city. Routers, switches and hubs are connected to create a metropolitan area network.
#Wide area network: A wide area network (WAN) is a computer network that covers a large geographic area
such as a city, country, or spans even intercontinental distances, using a communications channel that combines
many types of media such as telephone lines, cables, and air waves. A WAN often uses transmission facilities
provided by common carriers, such as telephone companies. WAN technologies generally function at the lower
three layers of the OSI reference model: the physical layer, the data link layer, and the network layer.
#Internetwork : An Internetwork is the connection of two or more distinct computer networks via a common
routing technology. The result is called an internetwork (often shortened to internet).
#Internet : The Internet is a global system of interconnected governmental, academic, public, and private
computer networks. It is based on the networking technologies of the Internet Protocol Suite. It is the successor
of the Advanced Research Projects Agency Network (ARPANET) developed by DARPA of the U.S.
Department of Defense. The Internet is also the communications backbone underlying the World Wide Web
(WWW). The 'Internet' is most commonly spelled with a capital 'I' as a proper noun, for historical reasons and to
distinguish it from other generic internetworks.
#NETWORK TOPOLOGYIES: The pattern of interconnection of nodes in a network is called network
topology. Some common topologies are
Linear or bus topology: Linear topology is a topology in which one wire is laid out and all computers are
attached through it.
Advantages: 1: Short cable length and simple wiring layout. 2: Easy to extend. 3: Resilient Architecture.
Disadvantages: 1: Fault diagnose is difficult. 2: Fault isolation is difficult. 3:Repeater configuration
Star topology: In star topology all computers are directly connected to the server.
Advantages: 1: Ease of service. 2:One device per connection 3: Simple access protocols.
Disadvantages: 1: Long cable length. 2: difficult to expand. 3: Central node dependency.
Ring topology: In ring topology each computer is connected to its previous and next computer.
Advantages: 1:Short cable length. 2: No wiring closets required. 3:Suitable for optical fibre.
Disadvantages: 1: Node failure causes network failure 2: Difficult to diagnose fault.
3: Reconfiguration is difficult.
Hierarchical ( Tree topology): in tree topology all computers are connected in the form of a inverted tree.
Graph Topology : In graph topology all computers are connected in any manner .A link may or may not connect two or more nodes.
Mesh Topology : Each node must be connected to more than one node so that an alternative path is available in
case of the host is down or too busy.
Communication Protocols: A protocol is a set of rules governing data format, timing, sequencing ,access control
and error control to initiate and maintain communication.
Common protocols: IP (Internet Protocol) UDP (User Datagram Protocol)
TCP (Transmission Control Protocol) DHCP (Dynamic Host Configuration Protocol)
HTTP (Hypertext Transfer Protocol) FTP (File Transfer Protocol)
Telnet (Telnet Remote Protocol) SSH (Secure Shell Remote Protocol)
POP3 (Post Office Protocol 3) SMTP (Simple Mail Transfer Protocol)
IMAP (Internet Message Access Protocol) SOAP (Simple Object Access Protocol)
COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 3
COMPUTER SCIENCE ASHWANI SIR
PPP (Point-to-Point Protocol) RFB (Remote Framebuffer Protocol)
Transmission Control Protocol (TCP)
Breaks data into packets that the network can handle efficiently.Verifies that all the packets arrive at their
destination. Reassemble the data.
Hypertext Transfer Protocol (HTTP) is an Application Layer protocol for distributed, collaborative, hypermedia
information systems. HTTP is a request/response standard typical of client-server computing. In HTTP, web
browsers or spiders typically act as clients, while an application running on the computer hosting the web site acts
as a server. The client, which submits HTTP requests, is also referred to as the user agent. The responding server,
which stores or creates resources such as HTML files and images, may be called the origin server.
SLIP (Serial Line Internet Protocol): SLIP is a protocol that allows a computer to use the Internet Protocol with
a standard voice grade telephone line and a high-speed modem. SLIP is an older protocol that is being superseded
by PPP.
PPP (Point-to Point Protocol) :PPP allows a computer to use the TCP/IP protocol and to be connected directly to
the net using a standard voice telephone line and high-speed modem.
SMTP (Simple Mail Transfer Protocol): SMTP is a simple ASCII protocol. The Internet mail system work
because of SMTP, Simple Mail Transfer Protocol. SMTP is a part of the TCP/IP suite of protocols. SMTP is a
protocol or set of rules that enables electronic mail to move smoothly through the Internet.
IMAP (Internet Mail Access Protocol): IMAP was designed to help the user who uses multiple computers,
perhaps a workstation in the office, a PC at home and a laptop on the road. The basic idea behind IMAP is for the
E-mail server to maintain a central repository that can be accessed from any machine.
Remote Login (Telnet) : Logging means to connect to a host computer or public access site. Remote login means
to connect the network at a remote station without any network. This remote login takes place through Telnet.
Telnet is a network application that is used to login to one computer on the Internet from another. It is similar to
establishing a conventional dial-up connection between two computers using modem and dial up telephone lines.
However, telnet connections use the Internet and not the telephone network. A telnet session is established by
using Telnet client software.
GSM (Global System for Mobile Communication): The first generations of cellular phones were analog, but the
current generation is digital, using packet radio. Digital transmission has several advantages over along for mobile
communication.
First, voice, data and fax can be integrated into a single system.
Second, as better speech compression algorithms are discovered, less bandwidth will be needed per channel.
Third, error-correcting codes can be used to improve transmission quality.
Finally, digital signals can be encrypted for security. GSM is basically circuit switched.
CDMA: This is another wireless channel. CDMA is completely different from all different from all the other
allocation techniques. CDMA divides the channel into frequency bands and assigning those statically (FDM) or on
demand (Wave division multiplexing), With the owner using band indefinitely. CDMA allows each station to
transmit over the entire frequency spectrum all the time.
Wireless Local Loop (WLL): WLL is a system that connects subscribers to the public switched telephone
network (PSTN) using radio signals as substitute for copper for all or part of the connection between the
subscriber and the switch. This includes cordless access system; proprietary fixed ratio access and fixed cellular
systems.
3 G (3rd Generation): The wireless world is experiencing a revolution; with the imminent introduction of 3 rd
generation (3 G) technology based on Wide Code Division Multiple Access (W-CDMA) 3 G system will provide
access, by means of one or more radio links, to a wide range of telecommunication service supported by the fixed
telecommunication network and to other service that are specific to mobile users. A range of mobile terminal types
will be encompassed, linking to terrestrial and/or satellite-based networks, and the terminal; may be designed for
mobile or fixed use.

COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 4


COMPUTER SCIENCE ASHWANI SIR
Short Massage Service (SMS): The Short Massage Service (SMS) is ability to send and receive text massage to
and from mobile telephones. The text can comprise of words or number or an alphanumeric combination. SMS
was created when it was incorporated into GSM digital mobile phone standard.
Concept of Security: Now days a person can be working on the stand-alone computer or in the network
environment. So, it is possible that the same file may be shared among several users. This involves the various
safety guards in the operating system.
 Safety from any accidental damage caused by the user of the file.
 Safety from any accidental damage caused by the owner of the file.
 Privacy, if needed, with access by either the owner of the files or a specified user or group of users.
 Safety from the hardware and software malfunctioning..
Protection : In multi-user environment the file protection is necessary because multiple users share a file. The
protection mechanism must provide controlled access by restricting the types of the files, which can be made.
Access is permitted depending upon several factors. The several mechanisms to support the protection are:
Authorization: the user request passes the matrix he is allowed access, otherwise he is denied access to some parts
of the database. : Through this you can ensure that only a given user, terminal or other resource, can access data to
which permission has been granted to read, write or alter. Thus a matrix can be created to indicate which users
have access to which file, records or fields. If user request passes through the matrix he is not allowed to access,
otherwise he is denied access to some part of database.
Authentication : This process verifies that a person or object he, she, or it claims to be. This could be achieved by
asking some standard questions and getting answers of them; if the answer match with those on the system, the
person or object is authenticated.
Password Protection: In this method the password is associated with each file. Just as a password is required to
access a computer system, access to each file will be controlled by a password. The main disadvantage of this
method is that a separate password is associated with different file; the numbers of password that need to be
remembered are quite large, making the scheme impractical.
Access List : The second approach is to make access dependent on the identify of the user. Various users may
need different types of access to a file or directory. An access list can be associated with each file and directory,
specifying the user name and the type of access for each user. When a user request access to a particular file, the
operating system checks the access list associated with each file, if that user is listed for the requested access, the
access is allowed, otherwise, a protection violation occurs and the user job is denied access to the file.
#Cyber Law: In internet the communication technology all the legal and regulatory aspects are called cyber law.
These are the rules made by internet Security Council.
#Firewall: A firewall is a computer system or group of computer system that reinforce the information security
between two networks. All information passing between these two networks goes through the firewall this makes
the firewall an ideal point for implementing the filtering monitoring and logging of session between one network
and other.
#Cookies: A cookies is a small file that a web server can store on your machine. It’s purpose is to allow a web
server to personalize a web page.
#Hackers: Hackers are people who enjoy exploring the details of programmable system. The hacker is a computer
user breaching a system’s security and stealing valuable information.
#Crackers: These individuals are generally responsible for breaking into networks , cracking password in website
and programs and generally causing havoc throughout the internet.
#e-mail: Sending and receiving mails through computer is called e-mail or electronic mail. It is an electronic
transmission of text and graphics.
Advantages of e-mail Disadvantages of e-mail
Waste reduction Hasty medium
Low cost Hardware required
Speed
COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 5
COMPUTER SCIENCE ASHWANI SIR
Record maintenance
#Internet Addressing : Domain Name System
This addressing scheme assigns name and numbers to identify the computers on the Internet. The names are called
domain names and the numbers are called IP addresses. Every computer systems on the Internet have both a
domain name and IP address.
Domain name system (DNS) is a distributed database system for translating computer name like
htpp://www.Microsoft.com/IE into a numeric IP address like 202.54.1.130 and vice-versa.
A domain name is way to identify and locate computers connected to the Internet. No two organizations can have
the same domain name. A domain name always contains two or more components separated by period, called
“dots”.
The computer of server on the Internet is also known as a host, and its IP address, is called the host address.
#Network File System (NFS): It describes how files are organized and retrieved. It depends upon the operating
system used by the network.
#Backbone network: Backbone network is a network which connects several LAN’s to form a WAN.
#Client/Server Architecture: In client server architecture one computer is server and others are clients. Clients
sends their requests to the server and server fulfill their request.
#Network Switching techniques:
Circuit switching: In circuit switching first of all complete physical connection is established between source and
destination then the data is transmitted. Ex telephone lines.
Message switching: In message switching technique first of all data is transmitted from source switching office
where it is stored in it’s hard disk and then is transmitted to the next switching office or to the destination.
Packet switching: In packet switching technique data is sent in the form of small packets of fixed size first of all
data is transmitted from source switching office where it is stored in it’s primary memory so that it can be stored or
retrieved very fast and then is transmitted to the next switching office or to the destination.
#Internet Service Provider( ISP): Internet Service Provider( ISP) worldwide offers various options and packages
to access internet. ( BSNL ,SATYAM ,AIRTEL etc.)
#Web Server: A web server is a server that responds to the request made by the web browsers.
#Web Site: A location on a net server is called a Web Site. It is a Collection of web pages.
#Web Page: Any page of web site is called web page It is a page containing hyper text.
#Web Browser: A web browser is a WWW client which makes a request from server navigates through the web
and displays the results.
Hyper Text Markup Language (HTML) : HTML, or hyper Text Markup Language is designed to specify the
logical organization of a document, with important hypertext extensions. This choice was made because the same
HTML document may be viewed by many different “browsers”, to very different abilities.
HTML instructions divide the text of a document into blocks called elements. These can be divided into two broad
categories – those that define how the BODY of the document is to be displayed by the browser, and those that
define information ‘about’ the document, such as the title or relationship to other documents.
It is a language used to design web pages.
Dynamic HTML (DHTML) : To define it, “Dynamic HTML” is typically used to describe the combination of
HTML, style sheets and scripts that allows documents to be animated.
Scripts can be executed in the browser like HTML. This means that data can be manipulated, formatted and
changed dynamically at the client side without too much support from the server. User interaction can now be
handled by the client itself.
Extended Markup Language (XML) :XML is not just a more extensible version or HTML. In fact, XML is not a
version of HTML at all. Whereas HTML is a specific markup language that is used to encode information for
presentation within Web browsers, XML is a specification for designing markup language. In other words, XML is
meta-language. This means that HTML, which was written as a specific application of SGML, could be redesigned
as an n application of XML. In fact, it is already being designed an XML application called XHTML.
COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 6
COMPUTER SCIENCE ASHWANI SIR
Chat Service: Online textual talk is called chatting.
#Video Conferencing: Video Conferencing is talking to another person using microphone and speakers connected
to your computer Sending your image and sound to one or more people and receiving picture and voice back.
#Newsgroup: A discussion forum in a the network news system.
#Web Scripting: Script is a list of command embedded in a web page. Scripts are interpreted and executed by a
certain program or scripting engine.
Types of script: scripts are of two types.
#Client side script : Client side scripting enables interaction within a web page.The client side scripts are
downloded at the client end and then interpreted and excecuted by trhe browser.
Example: VBScript, JavaScript, Hypertext Preprocessor( PHP)
#Server side script :Server side scripting enables copletion or carrying out a task at the server end and then
sending the result to the client end.
Example: PHP(Hypertext Preprocessor) , Pearl,ASP(Active Server Page), JSP(Java server page).
#Computer Virus : Computer Virus is a malicious program that requires a host and is designed to make a system
sick ,just like a real virus
# Characteristics of a Computer Virus. 1: It is able to replicate. 2: It requires a host program as a carrier.
3: It is activated by external action. 4: It’s replication activity is limited to the system.
#Damage Caused by a virus: 1: It can destroy File allocation table(FAT).
2: It can create bad sectors on the disk and can decrease the space of hard disk .
3: Can delete specific executable files. 4: Can cause the system to hang.
#Trojan Horses: Trojan horse is a code hidden in a program such as a game or spreadsheet that looks safe to run
but has hidden side effects.
#Worms: A worm is a program designed to replicate. Most of the worms disrupt services and creates system management
problem.
#Spam:Spam are the junk e-mails or junk newsgroup postings.Unsolicited usually commercial e-mail sent to a large number of address.
#How to avoid Spam mails: 1: Create a filter that finds and does something to e-mail that you suspect is a spam.
2: Do not register your true id to sign up for things on internet.
#Guidelines for Virus Prevenntion: 1:Never use a “foreign” disk or CD without scanning it for viruses.
2:Always scan files downloaded from internet and other sources. 3:Use licensed software.
4:Make regular bakeups. 5:Install and use antivirus software. 6:Keep antivirus software up to date.
Toppers of Year 2018
SHOBHIT NARAYAN TRIPATHI KCM 99
(No other student scored 99 marks in the distt.)
MOHD SAAD PMS 98 HIMANSHU KASHYAP KCM 98
VANSHIKA AGARWAL ST. MARY’S 98 NANDNI VASHISHTH ST. MARY’S 98
SIDDHI AGARWAL SSCA 97 ATISHAY JAIN PMS 97
ANANYA AGARWAL PMS 96 VERNIKA VASHISHTHA KCM 96
ZEBA KHURSHEED ST. MARY’S 96 MOHD ANAS KCM 96
AKSHAT JAIN PMS 96 NIKHIL MITTAL PMS 95
KAVYA SACHDEVA ST. MARY’S 95 ABHAY BHARADWAJ PMS 95
PUSHKAR CHAUHAN GNPS 95 SHIVANSH BHARADWAJ PMS 95
AMAN RASTOGI KCM 94 MOHAN KRISHNA GUPTA PMS 94
MUSKAN GUPTA GNPS 94 MUSKAN SAXENA KCM 94
RIYA AGARWAL SSPS 94 DUSHYANT KUMAR KV 93
ADITYA DIXIT PMS 92 GEETIKA GUPTA ST. MARY’S 92
HRITHIK CHANDOK KCM 93 DUSHYANT KV 93
MOHD ANAS GNPS 91 GUL NAQVI ST. MARY’S 91
DURGANCE GAUR SSPS 90 ANKIT KUMAR RSD 90
HARDIK BHARADWAJ KCM 90 AKASNSHA BHATNAGAR ST. MARY’S 90
MANSI DEOL ST. MARY’S 90
AND MANY MORE…..

COMPUTER SCIENCE BY ASHWANI SIR ( MOB: 9319021577 , 8923877776) 7

You might also like