DF - UNIT-2 Notes
DF - UNIT-2 Notes
In this Chapter
» Introduction to Computer INTRODUCTION TO COMPUTER NETWORKS
Networks We are living in a connected world. Information
» Evolution of Networking is being produced, exchanged, and traced across
» Types of Networks the globe in real time. It's possible as almost
» Network Devices everyone and everything in the digital world is
interconnected through one way or the other.
» Networking Topologies
» Identifying Nodes
in a Networked
Communication
» Internet, Web and the
Internet of Things
» Domain Name System
A group of two or more similar things or people interconnected with each other
is called network (Figure 10.1). Some of the examples of network in our everyday
life includes:
• Social network
Mobile network
• Network of computers
• Airlines, railway, banks, hospitals networks
A computer network (Figure 10.2) is an interconnection among two or more
computers or computing devices. Such interconnection allows computers to share
data and resources among each other. A basic network may connect a few
computers placed in a room.
The network size may vary from small to large depending on the number of
Networking
Device
EVOLUTION OF NETWORKING
In the 1960s a research project was commissioned by
Advanced Research Projects Agency Network (ARPANET)
in the U.S. Department of Defence to connect the
academic and research institutions located at different
places for scientific collaborations. The first message was
communicated between the University of California, Los
Angeles (UCLA) and Stanford Research Institute (SRI).
Slowly but gradually, more and more organisations
joined the ARPANET, and many independent smaller
networks were formed. Few of the milestones in the
magnificent journey of evolution of computer networks
is depicted in the timeline shown in Figure 10.3.
The idea of Advanced First version of Wi-fi
Research Project Agency TCP/IP introduced as (802.11) standard was
Network (ARPANET) is standard protocol on introduced
conceptualized ARPANET National Science
Roy Tomlinson develops Foundation brings
network messaging or connectivity to more
E-mail. Symbol @ people with its NSFNET
comes to mean "at" program
1961 1997
1982
1971 1986
1969 1983
1990
1974 Domain Name System
ARPANET became
introduced
functional by
connecting UCLA and
SRI
The term Internet was The Berners-Lee at
coined, CERN developed HTML
and URL, thus giving
First commercial use of birth to World Wide Web
ARPANET, was started (www)
in the name of Telenet
TYPES OF NETWORKS
There are various types of computer networks ranging
from network of handheld devices (like mobile phones
or tablets) connected through Wi-Fi or Bluetooth within
a single room to the millions of computers spread across
the globe. Some are connected wireless while others are
connected through wires.
Based on the geographical area covered and data
transfer rate, computer networks are broadly categorised
as:
• PAN ( Personal Area Network)
• LAN (Local Area Network)
• MAN (Metropolitan Area Network)
• WAN (Wide Area Network)
LAN 1
Networking LAN 3
Device
LAN 2
Internet
NETWORK DEVICES
To communicate data through different transmission
media and to configure networks with different
functionality, we require different devices like Modem,
Hub, Switch, Repeater, Router, Gateway, etc. Let us
explore them in detail.
Modem
Modem stands for ‘MOdulator DEModulator’. It refers to
a device used for conversion between analog signals and
digital bits. We know computers store and process data
in terms of 0s and 1s. However, to transmit data from
a sender to a receiver, or while browsing the internet,
digital data are converted to an analog signal and the
medium (be it free-space or a physical media) carries
the signal to the receiver. There are modems connected
to both the source and destination nodes. The modem
at the sender’s end acts as a modulator that converts
the digital data into analog signals. The modem at the
receiver’s end acts as a demodulator that converts
the analog signals into digital data for the destination
node to understand. Figure 10.8 shows connectivity
using a modem.
Analog Signal
Modulation Demodulation
Digital Signal Digital Signal
Demodulation Modulation
Telephone Line
Modem Modem
RJ45
RJ 45 or Registered Jack-45 is an
eight-pin connector (Figure 10.10)
that is used exclusively with
Ethernet cables for networking.
It is a standard networking
interface that can be seen at
the end of all network cables.
Basically, it is a small plastic plug
that fits into RJ-45 jacks of the
Figure 10.10: RJ 45
Ethernet cards present in various
computing devices.
Repeater
Data are carried in the form of signals over the cable.
These signals can travel a specified distance (usually
about 100 m). Signals lose their strength beyond this
limit and become weak. In such conditions, original An Internet service
signals need to be regenerated. provider (ISP) is any
A repeater is an analog device that works with signals organisation that
provides services
on the cables to which it is connected. The weakened
for accessing the
signal appearing on the cable is regenerated and put Internet.
back on the cable by a repeater.
Hub
An Ethernet hub (Figure 10.11) is a network device used
to connect different devices through wires. Data arriving
on any of the lines are sent out on all the others. The
limitation of Hub is that if data from two devices come
at the same time, they will collide.
Activity
1 2 3 4 5 6 7 8 Find and list a
few ISPs in your
region.
Switch
A switch is a networking device (Figure 10.12) that
plays a central role in a Local Area Network (LAN). Like
a hub, a network switch is used to connect multiple
computers or communicating devices. When data
arrives, the switch extracts the
destination address from the data
packet and looks it up in a table to
see where to send the packet. Thus,
it sends signals to only selected
devices instead of sending to all.
It can forward multiple packets at
the same time. A switch does not
forward the signals which are noisy
or corrupted. It drops such signals
and asks the sender to resend it. Figure 10.12: Cables connected to a network switch
Router
A router (Figure 10.13) is a network device that can
receive the data, analyse it and transmit it to other
networks. A router connects a local area network to the
internet. Compared to a hub or a switch, a router has
advanced capabilities as it can analyse the data being
carried over a network, decide/alter how it is packaged,
and send it to another network of a different type. For
example, data has been divided into packets of a certain
size. Suppose these packets are to be carried over a
different type of network which cannot handle bigger
packets. In such a case, the data is to be repackaged
as smaller packets and then sent over the network by
a router.
PC 4 PC 5 PC 4 PC 5
PC 1 PC 2 PC 3 PC 1 PC 2 PC 3
NETWORKING TOPOLOGIES
We have already discussed that a number of computing
devices are connected together to form a Local Area
Network (LAN), and interconnections among millions of
LANs forms the Internet. The arrangement of computers
and other peripherals in a network is called its topology.
Common network topologies are Mesh, Ring, Bus, Star
and Tree.
Mesh Topology
In this networking topology, each communicating
device is connected with every other device in the
network as shown in Figure 10.15. Such a network can
handle large amounts of traffic since multiple nodes
can transmit data simultaneously. Also, such networks
are more reliable in the sense that even if a node gets
down, it does not cause any break in the transmission
of data between other nodes. This topology is also
more secure as compared to other topologies because
each cable between two nodes carries different data.
However, wiring is complex and cabling cost is high in
creating such networks and there are many redundant
or unutilised connections.
Bus Topology
In bus topology (Figure 10.17), each communicating
device connects to a transmission medium, known as
bus. Data sent from a node are passed on to the bus
and hence are transmitted to the length of the bus in
both directions. That means, data can be received by
any of the nodes connected to the bus.
Bus
Activity 10.4
Explore how can you
find the MAC
IP Address
address of your
computer
IP address, also known as Internet Protocol address,
system. is also a unique address that can be used to uniquely
identify each node in a network. The IP addresses
http://www.ncert.nic.in/textbook/textbook.htm
URL
wikipedia.org 198.35.26.96
DNS Server
Instead of remembering IP addresses, we assign a
domain name to each IP. But, to access a web resource,
a browser needs to find out the IP address corresponding
to the domain name entered. Conversion of the domain
SUMMARY
• A computer network is an interconnection among
two or more computers or computing devices.
• A computer network allows computers to share
data and resources among each other.
• Networking devices are used to connect multiple
computers in different settings.
Security Aspects
In this Chapter
THREATS AND PREVENTION
» Threats and Prevention
Being alone is the most ideal situation for an
» Malware
individual in terms of security. It applies to
» Antivirus computers as well. A computer with no link to
» Spam an external device or computer is free from the
» HTTP vs HTTPS security threats arising otherwise. However,
» Firewall it is not an ideal solution for a human being
or a computer to stay aloof in order to mitigate
» Cookies
any security threats, as the world at present
» Hackers and Crackers is on its way to become fully connected. This
» Network Security Threats connectedness of various devices and computers
has brought into our focus the various network
threats and its prevention.
Network security is concerned with protection
of our device as well as data from illegitimate access
or misuse. Threats include all the ways in which
one can exploit any vulnerability or weakness in
a network or communication system in order to
cause harm or damage one’s reputation.
MALWARE
Malware is a short term used for MALicious softWARE.
It is any software developed with an intention to damage
hardware devices, steal data, or cause any other trouble
to the user. Various types of malware have been created
from time-to-time, and large-scale damages have been
inflicted. Many of these malware programs have been
identified and counter measures have been initiated.
However, different types of malware keep on coming on a
regular basis that compromise the security of computer
systems and cause intangible damages. Besides, each
year, malware incur financial damages worth billions
of dollars worldwide. Viruses, Worms, Ransomware,
Trojans, and Spyware are some of the kinds of malware.
Virus
The term computer virus was coined by Fred Cohen in
1985 and has been borrowed from biological science
with almost similar meaning and behavior, the only
difference is that the victim is a computer system and
the virus is a malicious software. A virus is a piece of
software code created to perform malicious activities
and hamper resources of a computer system like CPU
time, memory, personal files, or sensitive information.
Mimicking the behaviour of a biological virus, the
computer virus spreads on contact with another system,
i.e. a computer virus infects other computer systems
that it comes into contact with by copying or inserting
its code into the computer programs or software
(executable files). A virus remains dormant on a system
and is activated as soon as the infected file is opened
(executed) by a user.
Viruses behave differently, depending upon the
reason or motivation behind their creation. Some of
the most common intentions or motives behind viruses
include stealing passwords or data, corrupting files,
spamming the user’s email contacts, and even taking
control of the user’s machine. Some well-known viruses
include CryptoLocker, ILOVEYOU, MyDoom, Sasser
and Netsky, Slammer, Stuxnet, etc.
Worms
The Worm is also a malware that incurs unexpected or
damaging behaviour on an infected computer system.
The major difference between a worm and a virus is that
Trojan
Since the ancient Greeks could not infiltrate the city
of Troy using traditional warfare methods, they gifted
the king of Troy with a big wooden horse with hidden
soldiers inside and eventually defeated them. Borrowing
Spyware
It is a type of malware that spies on a person or an
organisation by gathering information about them,
without the knowledge of the user. It records and sends
the collected information to an external entity without
consent or knowledge of the user.
Spyware usually tracks internet usage data and sells
them to advertisers. They can also be used to track and
capture credit card or bank account information, login
and password information or user’s personal identity.
Adware
An Adware is a malware that is created to generate
revenue for its developer. An adware displays
online advertisements using pop-ups, web pages, or
installation screens. Once an adware has infected a
substantial number of computer systems, it generates
revenue either by displaying advertisements or using
“pay per click” mechanism to charge its clients against
the number of clicks on their displayed ads. Adware
Combating Malware
Common signs of some malware infection include the
following:
ANTIVIRUS
Antivirus is a software, also known as anti-malware.
Initially, antivirus software was developed to detect
and remove viruses only and hence the name anti-
virus. However, with time it has evolved and now comes
bundled with the prevention, detection, and removal of
a wide range of malware.
Methods of Malware Identification used by
Antivirus
(A) Signature-based detection
In this method, an antivirus works with the help of
a signature database known as “Virus Definition File
(VDF)”. This file consists of virus signatures and is
updated continuously on a real-time basis. This makes
the regular update of the antivirus software a must. If
there is an antivirus software with an outdated VDF, it
is as good as having no antivirus software installed, as
Virus Signature the new malware will infect the system without getting
A virus signature detected. This method also fails to detect malware that
is a consecutive has an ability to change its signature (polymorphic) and
sequence of bytes that the malware that has some portion of its code encrypted.
is commonly found
in a certain malware (B) Sandbox detection
sample. That means
In this method, a new application or file is executed
it’s contained within
the malware or the in a virtual environment (sandbox) and its behavioural
infected file and not in fingerprint is observed for a possible malware. Depending
unaffected files.
on its behaviour, the antivirus engine determines if it
is a potential threat or not and proceeds accordingly.
Although this method is a little slow, it is very safe as
the new unknown application is not given access to
actual resources of the system.
(C) Data mining techniques
This method employs various data mining and machine
learning techniques to classify the behaviour of a file as
either benign or malicious.
(D) Heuristics
Often, a malware infection follows a certain pattern.
Here, the source code of a suspected program is
compared to viruses that are already known and are
in the heuristic database. If the majority of the source
code matches with any code in the heuristic database,
the code is flagged as a possible threat.
(E) Real-time protection
Some malware remains dormant or gets activated after
some time. Such malware needs to be checked on a real-
time basis. In this technique, the anti-malware software
keeps running in the background and observes the
behavior of an application or file for any suspicious
activity while it is being executed i.e. when it resides in
the active (main) memory of the computer system.
SPAM
Spam is a broad term and applies to various digital
platforms like messaging, forums, chatting, emailing,
advertisement, etc. However, the widely recognised
form is email spam. Depending on their requirements,
organisations or individuals buy or create a mailing
list (list of email addresses) and repeatedly send
advertisement links and invitation emails to a large
number of users. This creates unnecessary junk in the
inbox of the receiver’s email and often tricks a user into
buying something or downloading a paid software or
malware.
Nowadays, email services like Gmail, Hotmail, etc.
have an automatic spam detection algorithm that filters
emails and makes things easier for the end users. A
user can also mark an undetected unsolicited email as
“spam”, thereby ensuring that such type of email is not
delivered into the inbox as normal email in future.
LAN
WAN
Firewall
Denial of Service
Denial of Service (DoS) is a scenario, wherein an attacker
(Hacker) limits or stops an authorised user to access
a service, device, or any such resource by overloading
that resource with illegitimate requests. The DoS attack
floods the victim resource with traffic, making the
resource appear busy. If attackers carry out a DoS attack
on a website, they will flood it with a very large number
of network packets by using different IP addresses.
This way, the web server would be overloaded and will
not be able to provide service to a legitimate user. The
users will think that the website is not working, causing
damage to the victim’s organisation. Same way, DoS
attacks can be done on resources like email servers,
network storage, disrupting connection between
two machines or disrupting the state of information
(resetting of sessions).
If a DoS attack makes a server crash, the server or
resource can be restarted to recover from the attack.
However, a flooding attack is difficult to recover from,
as there can be some genuine legitimate requests in it
as well.
A variant of DoS, known as Distributed Denial of
Service (DDoS) is an attack, where the flooded requests
come from compromised computer (Zombies) systems
distributed across the globe or over a very large area.
The attacker installs a malicious software known as Bot
on the Zombie machines, which gives it control over
these machines. Depending upon the requirement and
availability, the attacker activates a network of these
Zombie computers known as Bot-Net to carry out the
DDoS attack. While as a simple DoS attack may be
countered by blocking requests or network packets from
a single source, DDoS is very difficult to resolve, as the
attack is carried from multiple distributed locations.
Intrusion Problems
Network Intrusion refers to any unauthorised activity
on a computer network. These activities may involve
unauthorised use of network resources (DoS) or
threatening the security of the network and the data.
Network intrusion is a very serious problem and the
network administrator needs to devise strategy and
implement various security measures to protect the
network. We have already discussed some of the
intrusion attacks such as DoS, Trojans, and Worms.
The remaining attacks are briefly discussed below.
(A) Asymmetric Routing
The attacker tends to avoid detection by sending the
intrusion packets through multiple paths, thereby
bypassing the network intrusion sensors.
(B) Buffer Overflow Attacks
In this attack, the attacker overwrites certain memory
areas of the computers within the network with code
(set of commands) that will be executed later when the
buffer overflow (programming error) occurs. Once the
malicious code is executed, an attacker can initiate a
DoS attack or gain access to the network.
(C) Traffic Flooding
It is one of the most trivial methods of network intrusion.
It involves flooding the network intrusion detection
system with message packets. This huge load leaves the
network detection system incapable of monitoring the
packets adequately. The hacker takes advantage of this
congested and chaotic network environment to sneak
into the system undetected.
Snooping
URL Snooping
Snooping means secretly listening to a conversation.
It is a software In the context of networking, it refers to the process of
package that secret capture and analysis of network traffic. It is a
downloads and stores
a web stream as a file, computer program or utility that has a network traffic
that can be viewed monitoring capability. In this attack, the hacker taps or
or used later. The listens to a channel of communication by picking all of
common online video the traffic passing through it. Once the network packets
downloaders use the are analysed by the snooping device or software, it
same techniques to
reproduces the exact traffic packets and places them
download videos from
the Web. back in the channel, as if nothing has happened. So,
if the data that is being sent over the network is not
encrypted, it is vulnerable to snooping and eventually
SUMMARY
• Malware is a software developed with an intention
to damage computer hardware, software, steal
data, or cause any other trouble to a user.
• A virus is a piece of software code created
to perform malicious activities and hamper
resources of a computer system.
• The Worm is also a malware that incurs
unexpected or damaging behaviour on an infected
computer system.
• Worms are standalone programs that are capable
of working on its own.
• Ransomware is a type of malware that targets
user data.
• Ransomware either blocks the user from
accessing their own data or threatens to publish
their personal data online and demands ransom
payment against the same.
• Trojan is a malware, that looks like a legitimate
software and once it tricks a user into installing
it, it acts pretty much like a virus or a worm.
• Spyware records and sends the collected
information to an external entity without the
consent or knowledge of a user.
• An adware displays unwanted online
advertisements using pop-ups, web pages, or
installation screens.
• A keylogger makes logs of daily keyboard usage
and may send it to an external entity as well.
• The on-screen keyboard is an application software
that uses a fixed QWERTY key layout.
• Online virtual keyboard is a web-based or a
standalone software with a randomised key
layout every time it is used.
• A malware can take many routes to reach your
computer, which include: Downloaded from the