Grade - 10 Computer Engineering - Computer Networks
Grade - 10 Computer Engineering - Computer Networks
Computer Networks
(Grade 10)
Secondary Level
Computer Engineering
Government of Nepal
Ministry of Education, Science and Technology
Curriculum Development Centre
Sanothimi, Bhaktapur
Publisher : Government of Nepal
Ministry of Education, Science and Technology
Curriculum Development Centre
Sanothimi, Bhaktapur
© Publisher
The curriculum and curricular materials have been developed and revised on a regular basis
with the aim of making education objective-oriented, practical, relevant and job oriented. It is
necessary to instill the feelings of nationalism, national integrity and democratic spirit in
students and equip them with morality, discipline and self-reliance, creativity and
thoughtfulness. It is essential to develop in them the linguistic and mathematical skills,
knowledge of science, information and communication technology, environment, health and
population and life skills. it is also necessary to bring in them the feeling of preserving and
promoting arts and aesthetics, humanistic norms, values and ideals. It has become the need of
the present time to make them aware of respect for ethnicity, gender, disabilities, languages,
religions, cultures, regional diversity, human rights and social values so as to make them
capable of playing the role of responsible citizens with applied technical and vocational
knowledge and skills. This Learning Resource Material for Computer Engineering has been
developed in line with the Secondary Level Computer Engineering Curriculum with an aim
to facilitate the students in their study and learning on the subject by incorporating the
recommendations and feedback obtained from various schools, workshops and seminars,
interaction programs attended by teachers, students and parents.
In bringing out the learning resource material in this form, the contribution of the
Director General of CDC Dr. Lekhnath Poudel, Pro, Dr. Subarna Shakya, Bibha
Sthapit, Anil Barma, Bimal Thapa, Yogesh Parajuli, Bhuwan Panta, Asharam Suwal,
Shankar Yadav is highly acknowledged. The book is written by Rajendra Rokaya and
the subject matter of the book was edited by Badrinath Timalsina and Khilanath
Dhamala. CDC extends sincere thanks to all those who have contributed in developing
this book in this form.
This book is a supplimentary learning resource material for students and teachrs. In
addition they have to make use of other relevnt materials to ensure all the learning
outcomes set in the curriculum. The teachers, students and all other stakeholders are
expected to make constructive comments and suggestions to make it a more useful
learning resource material.
Content’s Elaboration
Computer
Network
Computer networks
have become
integral part of our
everyday lives. It’s
difficult to perform
our simple daily
routine tasks in the
absence of
computer network.
We use them to take cash from the bank local ATM. Whenever we send mail or
browse the web, we rely on the world’s largest computer network, the Internet.
Business Applications
Most of the business organizations have large numbers of computers to do different
types of works. In earlier days these computers were stand alone, isolated from
others, but at some point, management may have decided to connect these computers
to correlate information about entire company.
A business organization can easily share its resources with the help of computer
network and make all programs, equipment and data available to anyone on the
network without regard to the physical location of the resource and the user. A group
of office workers can share the single printer. Along with the hardware resources
such as printer, CD, scanner most of the business organizations can share data and
information. Such information may include customer records, inventories, financial
statements and others. So all small to large business organization needs computer
network computer network for the remote access of data and information by
stakeholders. Almost every business uses computers to complete daily tasks. From
making contact with clients to input data for reports, computers allow businesses a
more efficient way to manage affairs when compared to traditional paper and heap
of files.
Home Application
In earlier days the use of computer at home was just for playing games, watching
videos or word processing works. But due to the development of internet technology
the use of computer at home has been rapidly changed. The probable main reason
for having computer at home is for Internet access. Nowadays there are several
computing devices in home along with the computer such as smartphones, smart TV,
printers etc. people needs to connect these devices with each other for
communicating and sharing information. Computer network provides helps them to
communicate with each other. A home user can use computer network for
Accessing the remote information: People can have access to the information
on any subject either news, business, politics and many others by surfing the
Mobile Application
Mobile application is one of the growing concern of the computer network. People
are mostly using the mobile devices such as tablet, smart phones, PDAs (Personal
Digital Assistants), notebooks for computing. Many of these people have desktop or
laptop computer in their home still using these mobile devices because these devices
are easier to use and can be carried with ease with the feature of wireless connection.
(Tanenbaum, 2003)
Key Points
A computer network is a set of autonomous computers connected together
for the purpose of sharing resources.
Computer networks are used for business applications, home applications and
mobile applications.
Computer networks can share hardware such as printer, scanner, storage
location etc.
Software are also shared on the computer network.
Server computer are the powerful computers which provides services to the
client computers.
Client computer are less powerful computer on which user run applications.
Protocols are the set of rules that define the communication between two or
more devices over a network.
Students’ Assessment
Answer the following questions
Short-Answer Questions
a) Define protocol. Give some examples.
b) What is bandwidth?
c) How the bandwidth is measured in analog and digital devices?
d) List the types of communication channel?
Glossary
Ads: Advertisement
ATM: Automated Teller Machine
Autonomous: Independent, Self- Sufficient
CD: Compact Disk
Correlate: Connect, Link
Integral: Essential
Probable: Possible
Virtual: Simulated/ Not Real
Reference
Computer Network
https://www.techopedia.com/definition/25597/computer-network
Concept Draw Pro 11: http://www.conceptdraw.com/How-To-
Guide/metropolitan-area-networks
http://ecomputernotes.com/computernetworkingnotes/computer-
network/what-is-a-computer-network
https://www.techopedia.com/definition/5537/network
http://vfu.bg/en/e-Learning/Computer-Networks--Networking.pdf
Content’s Elaboration:
There are several types of computer networks. The classification of computer
networks is done on the basis of the geographical location and the numbers of
computer they have i.e. their size. The categories of computer network are:
a) Local Area Network (LAN)
b) Metropolitan Area Network(MAN)
c) Wide Area Network (WAN)
d) Wireless Network
e) Home networks
f) Internetworks
Features of LAN
Advantages of LAN
It has higher bandwidth.
Low cost
Easy configuration
Easy to manage
Advantages of MAN
It covers wider area than LAN.
MAN requires fewer resources in comparison to WAN.
Higher security.
Increases the efficiency of handling data.
Disadvantages of MAN
The large the network becomes difficult to manage.
Difficult to make system secure from hackers.
Wide Area Network(WAN): The computer network which is spreads all over the
world connecting hundreds thousands of computers. It is the largest network in the
world where several LANs and MANs are connected through satellite links or
microwave system. This network connects two or more computers generally across
a wide geographical area such as cities, districts and countries. Internet is the
example of WAN.
Advantages of WAN:
It covers large geographical area.
Ease update to the data and information.
Scope of activities are not limited.
Disadvantages of WAN:
The cost is higher.
More associated errors occurs.
Need to invest on good firewall system.
Features of Interworks:
Two or more different networks are connected.
Data communication is ensured among networks owned by different entity.
Devices such as router, gateway having capability to connect different
networks are needed for internetworking.
KEY POINTS
LAN is the smallest form of network.
MAN is larger than LAN and smaller than WAN.
WAN is the largest computer network.
Several homely used devices can be connected in home network.
Router, gateway devices are needed to connect internetworks.
Students’ Assessment:
Answer the following questions:
B. Short-Answer Questions:
a) Arrange the computer networks on the basis of their size.
b) Define LAN with its characteristics.
c) What is MAN? Mention any 3 characteristics.
d) What is internetworks?
C. Long Answer-Questions:
a) Compare and contrast between LAN and MAN?
b) Explain the LAN, MAN and WAN with figures.
c) Mention the characteristics of all types of networks.
Glossary
Bandwidth: number bits transferred through channel over period of time.
Convenience: easy/ suitable
Restricted: limited/ constrained
Stereos: sound systems, CD players.
Vicinity: locality, area, neighborhood
Reference
https://www.lifewire.com/lans-wans-and-other-area-networks-817376 By
Bradely Mitchell
www.webopedia.com
Computer Operator Google
https://www.webopedia.com/TERM/L/local_area_network_LAN.html
http://vfu.bg/en/e-Learning/Computer-Networks--Networking.pdf
http://www.eazynotes.com/notes/computer-networks/slides/types-of-
networks.pdf
Content’s Elaboration:
Each device connected in the computer is called node. And the physical arrangement
or the connection pattern of each device connected in the network is called network
topology. It also refers to the cabling structure or geographical structure of the LAN.
The basic network topologies are:
a) Bus or linear topology
b) Star topology
c) Ring topology
Bus or linear topology: It is the simplest of all network topology where all computers
are arranged in linear format. In this topology all nodes of network are connected to
the single cable by the help of connectors. The cable is backbone of the network and
called bus. Data are transmitted on network through bus using the address of
destination computers. The bus contains the terminator in each end and these
terminator are responsible for stopping the flow of data out of the bus. This topology
Students’ Assessment
Answer the following questions
A. Very Short-Answer Questions
a) How many types of network topologies are there?
b) In which topology token passing is done?
c) Name the topology where hub or switch is used?
d) Which topology has infinite loop?
e) What is the name of backbone in bus topology?
f) In which topology a node have two adjacent nodes?
B. Short Answers:
a) What is network topology? List its types.
b) Sketch the figure of star topology.
c) Write advantages and disadvantages of BUS topology?
d) Write advantages and disadvantages of token ring topology?
C. Long Answer-Questions:
a) What is star topology? Write its advantages and disadvantages.
b) Compare and contrast between star and ring topology?
c) Explain bus topology with figure.
d) Define Ring topology with figure.
e) How data is transmitted in it?
Reference
https://www.webopedia.com/quick_ref/topologies.asp
https://www.techopedia.com/definition/5538/network-topology
http://www.eazynotes.com/notes/computer-networks/slides/network-topologies-
handouts.pdf
https://www.studytonight.com/computer-networks/network-topology-types.php
Content’s Elaboration:
An IP (Internet Protocol) address is a logical numeric address that is assigned to
every single node in a TCP/IP based network. It is a unique identifier of a node
connected in TCP/IP network. The networks using TCP/IP protocol routes messages
based on the IP address of the destination. Generally a node have static or dynamic
IP address. Static refers to the IP address which remains permanent and a dynamic
IP address is a temporary address that is assigned each time a computer or device
accessed the internet.
IP (Internet Protocol) address is a numerical identification assigned to each of the
computers in a network. Although the actual IP address is stored in binary (0,1) form,
they are normally seen as “human-readable" numeric form.
There are two types of IP addresses: IPv4 and IPv6. An IPv4 address, for example,
192.168.1.153, has 4 octets separated by decimals. Which represents 8 bits (in
binary) of the address. The first octet represents the network address and the last
Key Features:
The packet sizes are limited to 64KB.
The address size of IP is limited to 32 bit addressing.
The IP header includes checksum.
IPsec support is optional.
It doesn’t supports multicasting.
In the above list, there are five classes. The first class is A and last is E. The first
three classes (A, B and C) are used to identify nodes such as workstations, routers,
The classes of the network are assigned on the basis of the size of network of any
organization. For instance, if a company required 1000 IP address, it would probably
assigned a range that falls within a class B network rather than A or C. The different
classes of IPv4 are discussed below:
Class A:
Class C:
The class C networks have 21 bits for network ID and bits (22,23 and 24 are set and
can’t be changed) and eight bits for the host ID. This means there can be
221=2,097,152 networks and 28=256 hosts in each network. Among 256 two cannot
be used because one is network address and another is network broadcast address so
there are 28-2=254 valid hosts in class C networks. The default subnet mask for class
C is 255.255.255.x. Its IP address format is:
110NNNNN.NNNNNNNN.NNNNNNNN.HHHHHHHH
Class D: The Class D IP addresses range from 224.0.0.0 to 239.255.255.255. It is
reserved for multicasting. In multicasting data is not destined for a particular host,
that is why there is no need to determine the host address. It doesn’t have any subnet
mask.
Class E: The Class E IP addresses range from240.0.0.0 to 255.255.255.254 and this
class IP is reserved for experimental purpose only. This class also don’t need subnet
mask.
Key Features:
IPv4 IPv6
Source and destination address are of Source and destination address are of
32 bits (4 bytes) long. 128 bits (16 bytes) long.
Broadcast address are used to send Multicast scoped addresses are used.
traffic to all nodes.
IP header includes checksum IP header doesn’t include checksum
IPv4 uses octal system separated by IPv6 uses hexadecimal system
decimal to represent IP address. separated by colons to represent IP
address.
Chances of private address collision No chances of private address collision
Sub netting: "Subnetting" is dividing a default address space into separate networks.
Sub netting enables the network administrator to further divide the host part of the
address into two or more subnets. In this case, a part of the host address is reserved
to identify the particular subnet. An IP address includes a network ID and a host ID.
Subnets are designed by accepting bits from the IP address's host part and using these
bits to assign a number of smaller sub-networks inside the original network.
Sub netting allows an organization to add sub-networks without the need to acquire
a new network number via the Internet service provider (ISP).
Sub netting helps to reduce the network traffic and conceals network complexity.
Sub netting is essential when a single network number has to be allocated over
numerous segments of a local area network (LAN).
Key Points
Computer Networks : Grade 10 31
IPv4 address classes can be listed as:
IP address is a unique numeric address assigned to each node in network.
IPv4 is the fourth version of Internet Protocol which uses 4 octet separated
by dots (.).
Those each octet contains 8 bits so IPv4 address length is 32bits.
IPv6 is also called Internet Protocol Next Generation (IPng).
It uses 128 bit hexadecimal system for addressing unlike 32 bit octet
addressing of IPv4.
An IPv6 address is represented as eight groups of four hexadecimal digits,
each group representing 16 bits (two octets, a group sometimes also called a
hextet).
Sub net divide default address space into several sub networks.
Subnetting is the strategy used to partition a single physical network into
more than one smaller logical sub-networks (subnets).
Students’ Assessment
Answer the following questions
A. Very short answer Questions
a) How many classes of IPv4 are there?
b) List the names of IPv4 classes.
c) How many bits does IPv4 contains?
Short Answer-Questions:
a) What an IP address?
b) Define static and dynamic IP?
c) Define subnetting?
d) List the characteristics of IPv4.
e) List the characteristics of IPv6.
Reference:
https://www.techopedia.com/definition/5367/internet-protocol-version-4-ipv4
https://www.webopedia.com/DidYouKnow/Internet/ipv6_ipv4_difference.h
tml
https://www.techopedia.com/definition/5367/internet-protocol-version-4-
ipv4
https://www.tutorialspoint.com/ipv4/ipv4_address_classes.htm
http://whatis.techtarget.com/definition/IPv4-address-class
Content Elaboration:
Network architecture
describes how network is
organized and the computers
on the network interact and
communicate with each other.
The major types of network
architecture are: Client server
and peer to peer
Client server network
architecture: The client server
network architecture consists at least one server and one or more client computers
Advantages
It covers larger geographical area.
Its cabling structure may vary from simplex to complicated one.
The network traffic is reduced in client server mode.
The security management is centralized to the server.
Backup of data is centralized.
Disadvantages:
Too many requests from the client may hang/breakdown the server.
In this system if the server fails the whole network goes down.
Initial setup of client server model is expensive.
Professional technical IT person are needed to maintain the servers and other
technical detail of networks.
Disadvantages:
As whole system is decentralized, it is difficult to administrate.
The network architecture is less secure.
Data recovery and backup is very difficult since each client need its own
backup.
Software:
Network Operating System (NOS): The collection of program responsible for
managing all the hardware and software resources in computer network is called
network operating system Eg. Linux, Windows server 2012.
Key Points:
Network architecture describes how the computer on the network interact and
communicate.
The client server network architecture consists at least one server and one or
more client computers connected in the network.
In peer to peer architecture each computers has equal roles and responsibility.
Hub is a device which connects nodes in LAN and broadcast message to all
connected nodes.
Switch is intelligent hub which sends message to destination node only
instead of broadcasting to all nodes.
Router is a device which determines best path for forwarding data packets.
Router is also responsible for connecting two different networks having
similar protocols.
Gateway is the device which connects networks having dissimilar protocols.
Students’ Assessment
Answer the following questions
Glossary:
Consist: contain
Expensive: costly
Dissimilar: different
Reference:
http://ccm.net/faq/2761-what-is-network-architecture
https://www.techopedia.com/definition/454/peer-to-peer-architecture-p2p-
architecture
https://www.webopedia.com/TERM/C/client_server_architecture.html
https://www.britannica.com/technology/client-server-architecture
Content Elaboration:
The Open Systems Interconnection (OSI) Model is a conceptual and logical layout
that defines network communication used by systems open to interconnection and
communication with other systems.
The model is broken into seven subcomponents, or layers, each of which represents
a conceptual collection of services provided to the layers above and below it. The
OSI Model defines a logical network and effectively describes computer packet
transfer by using different layer protocols also referred to as the seven-layer OSI
Model or the seven-layer model.
The OSI Model was developed by the International Organization for Standardization
(ISO) in 1978. While working on a network framework, ISO decided to develop the
seven-layer model.
The OSI Model works in a hierarchy, assigning tasks to all seven layers. Each layer
is responsible for performing assigned tasks and transferring completed tasks to the
(source: www.freecnnstudyguide.com)
PHYSICAL LAYER
The physical layer, the lowest layer or first layer of the OSI model, is concerned with
the transmission and reception of the unstructured raw bit stream over a physical
medium. It describes the electrical/optical, mechanical, and functional interfaces to
the physical medium, and carries the signals for all of the higher layers. It activates,
maintains and deactivates the physical link between systems (host and switch for
example). Essentially this layer puts the data on the physical media as bits and
receives it in the same way. Hubs work at this layer.
Characteristics:
Responsible for electrical, light or radio signals.
This is the hardware layer of OSI layer.
Device like repeaters, hub, cables, Ethernet work on this layer.
Protocols like RS232, ATM, FDDI, Ethernet work on this layer.
Characteristics:
Data link layer is divided into two layers: Media Access Control (MAC) layer
and Logical Link Control (LLC).
MAC (Media Access Control) address is the part of layer 2 (data link layer)
Devices like switch work at this layer.
Functions:
It convert electrical signals into frames.
Manages data errors form the physical layer.
Responsible for establishing and terminating logical link between two nodes.
Encodes and decodes electrical signals into bits.
Converts electronic signals into frames.
Functions:
Responsible for routing and forwarding data packets.
Routes the data packets to the destination.
Logical-physical address mapping occurs in this layer.
Characteristics:
Message segmentation occurs in this layer.
Message acknowledgement i.e. provide reliable end to end message delivery
with acknowledgements.
Message traffic control occurs in this layer.
Multiplexes several message streams or sessions onto one logical link.
Protocols like SPX, TCP and UDP work here.
Functions:
Responsible for the transparent transfer of data between end systems.
Responsible for end to end error recovery and flow control.
Responsible for complete data transfer.
SESSION LAYER
The session layer allows session establishment between processes running on
different stations. In a host, different applications or even different instances of the
same application might request data from across the network. It is the Sessions
layer’s responsibility to keep the data from each session separate. It is responsible
for setting up, managing and tearing down sessions. It also provides dialog control
and coordinates communication between the systems.
Characteristics:
It establish, maintain and terminate the session.
Protocols like NFS, NetBios names, RPC, SQL work at this layer.
PRESENTATION LAYER
The presentation layer formats the data to be presented to the application layer. It
can be viewed as the translator for the network. This layer may translate data from a
format used by the application layer into a common format at the sending station,
then translate the common format to a format known to the application layer at the
receiving station.
As the name suggest, this layer presents data to the Application layer. The
Presentation Layer is responsible for data translation and encoding. It will take the
data from the Application layer and translate it into a generic format for transfer
across the network. At the receiving end the Presentation layer takes in generically
formatted data and translates into the format recognized by the Application layer. An
example of this is an EBCDIC to ASCII translation. The OSI model has protocol
standards that define how data should be formatted. This layer is also involved in
data compression, decompression, encryption, and decryption.
Characteristics:
Character code translation for example, ASCII to EBCDIC
Presents data in specific format to application layer.
Data encryption and decryption for security purpose is done in this layer.
Functions:
Responsible for data representation on screen.
Responsible for compression, decompression, encryption and decryption of
data.
Data semantics and syntax.
Characteristics:
It supports applications, apps and end use processes.
This layer works on protocols like Telnet, FTP, HTTP.
Functions:
Responsible for resource sharing and device redirection.
Remoter file access.
Network management.
Responsible for application services for file transfers, e-mail and other
network software services.
KEY POINTS
OSI reference model is a seven layer conceptual model developed by ISO in
1984.
OSI model describes standards for inter computer communication.
In Application layer network applications such mail web, etc. works.
Datagrams are called Upper layer data in application, presentation and
session layer.
Presentation layer prepares the data to be presented in application layer from
lower layer.
Session layer controls the dialogs between the computers. It
Transport layer provides transparent transfer of data.
TCP (Transmission Control Protocol) and UDP (User Datagram Protocol)
protocol are operated in transport layer.
Datagrams are called segments in transport layer.
Routers are operated in network layer.
Network layer provides connection between hosts on different networks.
Students’ Evaluation
Answer the following questions:
1. Very Short Answer-Questions.
a) What does OSI stands for?
b) How many layers are there in OSI reference model?
c) What are datagrams called in layer 7?
d) What are datagrams called in layer 4?
e) Routers work at which layer of OSI mode?
f) In which layer does switch work?
g) Who developed OSI reference model?
2. Short Answer-Questions:
a) What is OSI reference model?
b) List the layers of OSI reference model.
c) Which layer is responsible for encryption and decryption?
d) What is the function of Network Layer?
e) Describe the function of Presentation layer?
f) At which layer of OSI model is a path decision made based upon IP address?
3. Long Answer-Questions
Describe all the layers of OSI reference model?
Explain the function of each layers of OSI reference model?
What is the job of transport layer under OSI reference model?
Reference:
https://www.techopedia.com/2/27094/networks/an-introduction-to-the-osi-model
http://searchnetworking.techtarget.com/definition/OSI
https://www.techopedia.com/definition/24961/osi-protocols
https://www.webopedia.com/quick_ref/OSI_Layers.asp
Content Elaboration
Network is one of the sensible and important aspects of human life, in the absence
of which the simple routine task is difficult to complete. Now the world cannot be
imagined without the networks. Different types are used by different organizations
Cryptography concept
The word cryptography is derived from Greek work Kryptos which means “secret”
and graphein, means "writing”. If the data and information are transmitted as they
are over the network, the intruders or hackers may access and misuse it. So the data
and information should be converted into the secret writing which is called
cryptography. ". Cryptography is the process of conversion of data into a secret code
for transmission over the public network. Cryptography is a method of storing and
transmitting data in a particular form so that only those for whom it is intended can
read and process it.
The art of protecting information by transforming it (encrypting it) into an
unreadable format, called cipher text. Only those who possess a secret key can
decipher (or decrypt) the message into plain text.
Firewalls
A firewall is a network security device that monitors incoming and outgoing network
traffic and decides whether to allow or block specific traffic based on a defined set
of security rules. Firewalls can be implemented as both hardware and software, or a
combination of both. Network firewalls are frequently used to prevent
unauthorized Internet users from accessing private networks connected to the
Internet, especially intranets. All messages entering or leaving the intranet pass
through the firewall, which examines each message and blocks those that do not meet
the specified security criteria.
Advantages:
It monitors incoming and outgoing data from the network.
It blocks the harmful packets from being entering the network.
It maintains the security of private network.
It protects computer from unauthorized remote access.
Firewall make online gaming safer.
Firewall can be hardware or software.
Web Security
Today’s most of the work is web based. Either that is communication or
transportation, medicine, shopping, etc we need to access different websites in order
to complete them. Web sites are unfortunately prone to security risks. And so are
any networks to which web servers are connected. Setting aside risks created by
employee use or misuse of network resources, the web server and the site it hosts
present most serious sources of security risk. Web security is the process of securing
confidential data stored online from unauthorized access and modification.
Web security commonly known as cyber security includes the mechanism of
protecting the information by preventing, detecting and responding to attacks.
Advantages:
Enhanced security: when the network is connected to through VPN the data
is kept secured and encrypted which provides security.
Remote control: The information can be accessed remotely even from home
or from any other place.
Unlock websites and bypass filters: VPNs are great for accessing blocked
websites or for bypassing internet filters.
Better performance: The bandwidth and efficiency of the network can be
generally increased once VPN is implemented.
Reduce Cost: The maintenance cost is very low when VPN is created.
Key Points
Network security refers to protection of computer network and network
resources and information from unauthorized access, misuse, modification.
Cryptography is the process of converting the plain text into chipper text for
transmission over public network.
Digital signature is a digital identity of a sender which electronically uniquely
identifies the sender.
A firewall is a network security device that monitors incoming and outgoing
network traffic.
Students’ Assessment
Answer the following questions
C. Long Answers-Questions
a) What is network security?
b) Define cryptography.
c) What is digital signature? Explain about its implication.
d) Write short notes on web security and virtual private network.
e) Define web security with its importance.
Glossary
Disclose: To open up
Integrity: the quality of being fair.
Prone: suffer from something
Reference
https://www.techopedia.com/definition/24783/network-security
https://www.webopedia.com/TERM/C/cryptography.html
https://www.techopedia.com/definition/5426/digital-signature
https://www.techopedia.com/definition/5426/digital-signature
56 Computer Networks : Grade 10