0% found this document useful (0 votes)
56 views18 pages

Networking 2

Uploaded by

Dipanjana Paul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
56 views18 pages

Networking 2

Uploaded by

Dipanjana Paul
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 18
In This Chapter 11.1 Introduction 115. Internetworking Terms 11.2 Network Devices and Concepts 11.3 Network Protocols 11.6 Network Security Concepts 4 Wireless/Mobile ‘Computing Technologies ATR ees i ication. This revolution was possible only era is an age of technology and communication. This revolu cause of fee icvices protocols and related technologies. In this chapter, we shall talk it the most prevalently used network devices, various network protocols and communication oni ther than computers and wiring, many smooth functioning of a computer network, o| tt 0 i r €€S or specialized raters play important roles. In this section, we are discussing about Modem : allow you to combine the power of your computer A aL : global reach of the telephone system. Modem is a veo ne Peripher which allows a computer to send and receive digital ows you to connect ‘lephone lines or cable connections that carry _— 8 Come Sn st, ry, yer neTWOm ecoamiberecssincniin Denia, naa a in). Diet Wotton, gel daa of et tg nomen tom Ter hee te eel By node, ee oerntsegore inet 0 Som a rt ae Ramee teetetenean” Somat ne peed ie roa cal adres (48 bs) each NIC ewe c “ Re pnsal addres 6 on MAC jes (ein Access Conta Adie) 5 Mra ht and within te cOmpate Fg 1 ip tras be wadens tt are conned EXE 1 «compa etree 0 mo ay SST wee UN see a eae | me, | & = = i : te que 12.1) Internal moder (2) Estermal dem (c) 1122. Rus | Ethernet (tetas | Ethernet uss eter ‘RAS esos or Regier Jack 5-5 an eighties {oconmet computer on fel ares networks 1, LAN espoal TaNascieture develope by Xx Cap along wih DEC ar In te sar opelogy and sapartsdta tance ates of upto 10 Mp) The RS comacor ons very much sar to strand te tutti wer nan RIT a houses eight wires stead o Beet het LAN Fg 112 shows an B45 onc, io ick ad fo i 8 af even dnias (8431 cme, clin ek BS ees Cocormoent | 11.23 NIC (NeworkIneroce Cord) Inonler tbe prt ofa nee .# computer needs an interface to help establish « coneecit eerste wien ta te wrk al sr See tees Te ncteerkinterfacecard sa device that ia ntactecl we coc ov re orks St ae fe renin sy Sopcton nin eaten, utah [wc sot ay reer tt atch tos worn ha srs, ne as identifying it, which is| Sanig® physical address assent ‘arta er hn oa el). » (Sh cnac(et t t ‘ei eo ted pr es 2 Avner ss device tat ct angle he ial isdn — Deer mein oe ‘hen oad sa Sia have reed abou! the ACS Weprenious caper 4A Ethernet Card ‘heat Cards typeof NICcard While NICs the pec Network eras Ca which cold te lor diferent types network techno ike Etre, Token ig Fle channel Infibnd { Onthe other hand, theme! Cardia ype NC, hich specie Etheme technology [As mentioned earlier, theme isa LAN acters developed by Xerox Corp in aseociaton ‘hth DEC a Intel: Ethernet uses bus Star tpoogie andl an support daa nate aes OF ‘The computers that are pat of Ether ave onal a special cand called theme Card. An Ethemet card contains connections fr ster ena or Shles(orboth) Its designed arena ele theconsection willbe BNC! eslgned for tte pai Il ave 2 RS cnet Some het ed A bs + hardware dev db Ss epee Scr ected meso poe on tea ord sca com pl ee core en a hob ae cult cn a Jit pn ids an fe aged pve al era e oetsk pws use Hebe Be © Acne us eclampsia mow em on conned evi acti ‘xi tonto ae ted ke pce ond te nigh fs tor «ave hubs soy tc pata p om one cpr anther witout any ange as bond the meses in he eek nye tpt nde ae the Irom he ese cou) sk mnt tl nn et ae (ere Hy ill soc undo beret cs at an ed ar ating _ count 2214 ag 1.25: Sich Fe cterecun vee dt i a nd nw j Te cient vend re as pens ing, | occa ne er up Lanse Sra nie 9 8 Sd der wien, mares acy ee Pa amt wy a : ere eer men AN 7 Sh cn py Reet ay How a Switch functions rom the other ports the switch eHblihes 4 ey tee transecsion terminates the "Pot ore Fe eee jemreen the source and destination, and then connection gee aN Siocon te game vlc hb hse Bio #2 n place of the hubs uy Fe searcane PT roach aul be ikea pone aster with vate nes foe ean " Te nee Peron et tenlienesscrmctoe Towser | ay mle ae mt oe ae ‘ane time tere allowing more guests to communicate Bball as modenvswitch. ingle device that can perform dual tasks of routers 11.26 Repeoter ae 29 Got Texrewar aed AfertenrcerTtensanmeclScaerssnou=ntiencttomt | Scien inen pans Ache Ssaelys aaa aa Sanmiigntiageyscmrt enews | I vc mane eee ee ae etic ori oon cee apnea | Richens toiomnemccuicnet oes Saateta sae ee eee, Linton ea) eer to erry ee eimai | cept ee ee) oo oe nee bridge isa device that networks together. Bride -mart enough tokner (tof the gateway.” Iwichcomputesareon which ie of th digo the only ston menage tt et fo the the det cs the bie eigen can hare 1128 tower i 1 < S A device hat works like 2 "i eae I» noden > name Sd a Perea neces Siccaicemmm| | ete epee ee emir Thee ropa oe Son's cote | | tna aga 11.210 WA Cord Syekciemscnmkns cts” he! 4 ear enc 1 WOR cand tr rl tober at ang en tess the trate bound to unknown denaselt |_| (OMOE Ree ca aaage | tral Lal vec Mpc eeiptatenn ones es a eet | | Oa) ans Pome cecei Ot pene tyr rarning ere | | mean peg) The st omen Wi ede wed maleate rove 90 roves al te eran dee ate of ners eskiop computers are PCT Espress Hep tal meving ending routes can Spot, an Nile maar the Papen ote of ating "Cad ston the motherboard CCC “awit in a destop computers that it allows y tg cut considering the Proxim OF vale eee 1d Componen's! Checks mr snot or csample, if 4 network connect the computer of thee buildings having, number of aes " a at Shiaee 8: epic cc per the 80 20 rl, server shouldbe ped in Bling A as i osts the maxima otk Devs 2 Here 2. Hci pienreectompnet Ie poy ‘herfcompte Si reeke aesany nan oe a For Connecting Ofices ond Desay oiteecr te Fer Bg on cg insated | @ Chens with NICS insted om : MiceKC : 40 @ Ci computes ce oe hen sper #020 rel, Office CP shold hese the see, fo ae the maxim rafal neg cabins Teese manimum number of computes a Network 05 software CChoote Twisted Poir when ia pemsotrvace. | © Router fr sated Inert ace 1 Len Cet = : ean, “= 2 Fay instalation ~ Easy to work with Bees Devened Ofc Stes Sip ete 3. No High Speed data requirements = It Gnesi NIC stalled ion ween + sol waves lng «abl teksto | Uw ata oe (amid dat ate 0 ME ie dec tat tet ot fac hii Bandwidth (IME) Secres eHub © Switches owners at each lection for WAN, | Teanaminion over a short range ee ate am Cn ye reed (the npr fctrs = a. ‘an. fepeates ave mainly wed for extending the; * used toe Analog tranceniesion, a my goed matwort, sen a i i a i oD anno — Repra sey ae head sc ried Saeco rs sea ib amt wpe ot lh a wtonment 80 percent ofthe taflcon network segment i Tol (det a here every 10m) 3 + Ssnnpible to interference and noise ior ryetescricnd he ape ae 1. Televison sgl distin has o take place @ArioTY — @ Cable TV 2 Lng distance telephone transmission has to aol 8 oo ees ee aa cored ee peer onc ieee cine eas mall Slinaty "7 108 Sos baione (roe ae Ror gauree compute yates 5 sam the meade emong ce required etna “ates rst) —— gE) Senses pees cd eo casenetelt 6 Loaders eee mete heen a Nae ‘re wt cto dav) i oreeeanae a pesntcment etn eee st rope ome es etl Att the manne |e ns oe a Tot enn ope tt cond one Oe seas non etc | Sennenohsemenn meme Ae ence syne Berra ee lene ee ee rem Sooo ee fee tered ery TE — Ober imporon factors 4 Health hazards involved os Ernie vroud tn de Bei arn eau tas are tn ot npc al Bc ve utr yaa a Ofer inate! Fon Pte pews oxy 2 aa Meine fie ras a ani tas i oe oul ea Choose Saelite when AL Tearsmisson has to take place overs lange area of Earth 2.Can be used for long distance Televi istrbution and Longdistance tebe transmission ‘her impotent foci + Expensive towers an eepeters Subject to interference such = pas tirplanes and ran Choose Intared when 4. You want o transmit without any eit hassles ~ no license needed ‘er important factors, 1 Cannot penetrate sli walls Ip bonco 5 ce end ee ee + Cine wat noo tl 2 ene sone the following questions onthe aie he enema: (Co Saget he owe ale eeu te ings (0 Were old ou sget he ponent ae? (o Sogest he ale pe at shal eal (ot abet rin tne alge thos th t= 90) (0) As per 80.20 rue the serve should be ‘computers. Thus, we suggest thatthe se COMPUTE CENCE yy 4 113 Network Protocols ral trata ape ec A Pa Aral ent orden on EE Te aan tant kaconmuscaon ROL RUSASSUME TD Aang Toner rt oxhunge Be Hen Bat AT Ot hat ty Eg Si outa ben pe for benthic aan cag pun Now mopine he confsion and chaos. To 200i i thy ma thant aig an No ec yi Aust alk then hele gp ing nae san 0 om Ts cmon to ral woul yay Temumuieaon proc or Aad ‘ tpptoets fon dein mesg oma His Neverthe fw van Wend pun every tie we watt something on Tote conpue, Sone mat concn networking prteas fev bong duran ow T1321 HT fees Toner Pst attain oe protec wih teh aie foros riesocn oye ee torn win nc SSE eretietbem metre’: secpoue aoe ee eee oc. Soren ‘that used by Intemet Mail and Multipurpose Internet Mail und video we) on ee ee ealisariniatd allowing basichyper-media access to resources available from fairy stint tems te we diverse applications and simplifying the implementation of | s2v#s!s For bromes tat Trroroco: Prt toma ‘enae mec ae ne tome ——— “ard the set of responses gm HTTPS (HypersTorsler Protocol Secure) eee or IS pte) pee frat imey e ee Fae 18 os Nore -Aluaslock or Np anda pac the adress bar Sine an ‘One ofthe original services onthe Interne was eid ali far 7 ee Shrem to another. It goes by te name which and fore z ‘andar fr transfering les over the late. Fle f any ype an be anafered eough i [FTP offers these advantages (Ts very useful to tafe files om one eS an organization to another (ip This an effective way to get geographically dispersed to co-operate on 8 projet (i) 1s potent and popula way 6 share oma st jst the name ofthe protecaitisals th name ofa progam or command. Ise the command By pi Fowed by the addres of another tan pres ene FTP works clientserver process. You give the command fp sing a emote adress sch asthe flowing: The punning on yoursysem scl! toan FT proses sets 5 server on newday horizon com. You ss commands tothe ip proces at newday, and it responds appropri # (rnsision Cota rseeenet Pe TCP is Iyer ef pro In Man eamplc A ype sation seg ma 3c of commands which nema Sender ofthe message ho TCrnP works a a ombinan of 0 nee Protea os TCP eran oman uth eco Sen on re ning tnt atgran ee ent ef he mah TCP al PE hat they al sve corel 1 (ie tandes Pte ‘ded rhe eg a ‘icin FP ‘io promote sang ffs Ieompterpavoms ado fea Imo a sora eo «ooned nr fomsarations “to rant dt ealy and ‘cry Ft ough le Seiya astern enn may oo by rier to understand what this meag its useful look fn thei protocl for mad Ts defines se ed to another eg, commands to spec who the ‘Sit and then the text ofthe message, procs: TCP Ceansmisston Control Protocl) and rough the thre aes rack ofthat “Rog any message isto large for one int sever datagrams, and make sure —— conn oe a 6 parece: Fearon este nT See vermmioamerstecre’™ Et my era =. Na jsnncomes ioe Ole woe ean ae ‘Sone meee fray mS Tending stepson’ the EAE Beng sng mt pip them with an ade whee eS, yer Warspor. fe, fr actual delves” Mh jer the packets atthe destination by map Sed by the IP adress Sometimes ere She packers, amber ‘Se and passes them on “© Mapping, IP dos its est 0 de ‘lestnan addres. Destination ie poston te pce aio eyed “¢ ralnowdgement Once te packets reach 10 the destination compute, TC gq area ncaang pokes sos he and ae ag See ten Final tbe message constructed by arranging te mae Fae rand dived othe oppestion enti by the port rant, 1134 SuPer Sp or dering SUP (Serial Line Iteret Protoco) Rests ee Serial Lie I LIP was test prea fr reaying IP pockets over dialup nes dt ‘Siptson ier, bt ie le. There eno Suppor for dynamic addres aig Eni ting or maipleing diferent protocols over «single link. SLIP has bee ag sspplanied by PPP PPP (Poin Yo Poet Protocols) PP the Inert Standard for ransmision of P pach pic tits hen to spate pyc connec hough 3 ine You one PE (emect one ofan to aother For example an established ntetween | ‘fs and acetal lc allows ter lcs to transfer dato the the nea PPP aliowsintopesity among he ete acc sere of erent Allows muliperetwerk comastonpotoclo ue the same phy sa ‘Onc the det inks exablsed ne of many of several Network Control Protocl (NM tan betsel wo tanpor ral rs prorat se The 1 Col Pesca ED. [Permits the transport of TP packets over PPP ink see Fig. 116), PPP suppor ‘Syncvorised and uneychrnted les S [romr-ro-pone pore he rosin Pama ES aa SE Fue 1.8 es —s ft cae Ale et camp yrs eer ad one ter med war rors swe ie one were oveniow Tin? proses the aio fon evo computer Boh et an EETPrP provides a form of ie ae i> The home user's compute has service provider (SP) ‘Seman ink tothe Internet even if i via & ooo ior home ef sompue son thing ie (IP dan) at which can be protocols vsed in Emel asc» protocol fem snd toms ued tech en of «communication ‘Sha ode © prope tans infomation. order del wth your emall You must cereal Chent 6 setae all ae tie ‘Sfometion with cach ater wing any of ESine be MAP. POPS Sone neat ee iy talk about these ISIAP tr Ma A Pra nda prota orang ml rom oa "IMAM is chester ptr i whch ema seed and el for the set By intone server IMAP hls thems an Be ray dee As ees only "fata ander th wore wellness conetion sch at 4 oder. Only st read spe ea esp thn t wil be downoad om the TN cele and mune aes of abou oy the Server, tant sgt dite aes wl ee ele a Peete ncaa a oat it mete ie oe ee et a a ot tae ea ce el aaa aera i le te gae srao th chaeetomnee Se cleat tee rt pont a ee a te a Te ea a ae Pre: ‘COMPUTER sciice A ry a “11.4 Wireless/Mobile Computing Technologies Lat ow ak tot varus elope and ee 8 FF wi ‘computing. 1. GSM (Global System for Mobile) 5M is shor for Global System for Maile commas hier of telndeg apneic The GSS SAN omy Ta Ce igcraa phones wasesablihed in Europe in MSH them Sse etdhasaow rome beineratoal sande ‘vecheneatae (5M is mle communion standard tat used to wansmitmobie seb Wes dsl sa replacement forthe ft grncraton 16 analog {65s nee commana [ved the way forthe second generation (2G) networks. GSM is able to tanser aoe felservie lke Data calls nd SMS (Shr Mesapng Sere). tah GSM digtizesand compresses voice dats then sendsit down a thannel with other streams of user data each i its own time AJ STE S Slot GSM systems ae encypion 0 make pho cls TE rere Secure, GSM opertes in the ID-MEz and 1800-MPiz bands in Sows ype need Eiropeund Ad and inthe 900M (ometines fered to etmnncoheees = 25186 bad in the United Sates — Whot ie Si cod Th SM Suse ely Modal -iachip cad the size of fir cl. oe tmp es ay een! a ove £0 milion GSM (Gal Sue fr Moe) mole phones nme about 70 percent of the mobile handset market. 7% ‘A SIMs cul ain conpster chip that ves celular devices urigue phone one IWharmencry erdata and applcatons) proceso nthe att o inact wit bee {Curent SIMs typically hve 160 256K of memory, which provides pleny of rom fsa Jhundred of personal phone numbers, text messages and other data | 2, WLL Wireless in Local Loop) Wireless in Local Loop (WL refers to techno fest technology implementation where the subse esossed tothe nent exchange through a radio link instead of physical copper wits [Local loop is rt ine from a subscriber's phone to the | local central office (LCO) In areas where Iv cighbeyetoe ia ny cece) rote sealer Ge ema et ecard Seer Milmenrinime nares armament ‘connect subscribers to the local central office PPE Wee toe nk end of LM 3. GPRS [General Packet Rodio Senice) wees | cits ores wae cn 5 none Camiason fo en - a ow does GPRS work 2 rst be aware of Bw leg yoo 2 tae 0 vo Pockets and sents Saiyan sae incon ean dt eh 6 te a qavon 1 spit nto smal wa ‘rch the netrk over he nse CO eee sat ieoembled at the rected 116, 26, 36, 4G ond $6 Neto “Tee "Gin wireless networks ees othe i “ever” ofthe underying res newer ‘Technically generations ae deine as flows 1Gretoths (NM. CNet AMPS TACS)arconierd be th taal et ‘which started early 1980. There were aio Wephone systems eve efor rt 1G networks ‘Tre conceived arc detigned pur si liana ta Srrsices wth the possible exeption of bln modens in ee adsl). x SM, CDMAOne, AMPS) ae hf digi cellular systems launched erly 1 let inp Sur quality, better security and Niger leap GM apport cicuitawatched data (CSD) allng uses a ple Gintup sta calls digitally, 50 thatthe netwos swehing Sttion eceves actual ones and eons ter tan Be ces tam analog modem, 2G offered oe cal ab messagesand Timed mobile interne (GPRS, CDMA2000 19) ae he esaned ‘versions of 2G networks wit hori aa uptoabot JOU Kits GPRS olered the fit almay-on daa service sors (UMTS FOD and TOD, COMAROI 1 EVDO, CD¥A000 3x, TD-SCDMA. Ar WCDM14, EDGE, IMT-2000 DECT are newer ells networks that hve data rates of S45 and more. 36 ofered voice elt and multimedia messages and dats servers The UN's IMT-2000 standard quires stationary spends of Mbps and mobile speeds of 38ikbps fora "wae" 36, 0 alleor {G networls 4G aa about aster Inet pede ites improvement malas rt at aici sya tecnica eee ane eons om rota fa Ta ome (Ce at aos envoy ree ed alae oo mg, Se a a oes ane Sone aioe ‘Ceci nang ed ‘Any where, Glabal mobility solution me In ntegeated ester wl be capable to provide 100 Map for prec trees pee Wh scales treaty eh en th eninnd Ce Nn uty od wa gly ine po retin nt a soy i HDTV) steamed mulineis. Underneath 4G will use coe IETE (Long Ter Evelutio) et 5G is the ith generation of wireless communication technologies ar data networks, SG networks a lo data ce networks tht ako supper aD (SGnetworks promi to provide specdsof upto 100 astites per cond Seog 0 4 100 tnes aster than 46 neewors Comporion of Wires Conmuncaton Tecnotges fuereibpe [2 pe cy [Amine | Dit rach) tee | ig ed igh cs edate | Sree | gk a & Pra Thieme | Insert eras | {SM5) the ransmision of sho ott text messages to and from 4 tess Message must bene longer than some xed namie 204 contain no images or graphics its mle dena? #7 Mesage Seve Cote (SMSC) which mason 2 5MS Request othe home lacation AO GONE Once the HLR soe mevose Sr C82 tote SSC wih tee Soon oon whee state's cr toon re aing i te most fata erations YO Sob an PY est ee ype 2 message On YOU screen, bythe repent then the seo Conferencing “he next dimension in Intemet communicate TR opone People who have lied wie Teo compression handwar, acts fo llme Binary telephone line, and videophone sofware ean aa ee , weipreson of vee ino dala packets Dt canbe tient Hane Sri'nes converted back into oie a the other end Dal never 50 ia networks (LANS), have alvajs wild pudketawebed ‘Riocnation betecen to communicating temirl or example « PC from» wet server or one compute seni an email espe fan The mest common protocol use for communicating on te pack Ione protocol or. Vel lows forthe amis ove ang. withthe sme pacet-fched networks and provides an aeatve fro thick nse inc letra patho vcs ough aaa 11.42 Connecting Wirelessly to Intent : WIFL ‘These days you can also connec Intent wiley Tro mo Interne wirelessly ae vito di tty ease tanter pte, tee 2 matsp tae me ony For os TO Rc rear» wnat ea? Bn G55, eupie 4 ad 8 WERE Hotspots. A hotspot fe that offers 'A sspot a ver es Wen cee The poe cn se 2 Wey Phone or other sabe poral i= 10S Feet through a WiF Hotspot Hotspots 2 PT Poca (eho ei, tes aor #0 Tpoksres and restaurants ec) with fey Febesed wiles Inieret aces, Tere ae WHF! Trapani thousands oflcatos around the worl Figure 117 shows a WiFi Network Wireless LAN (WLAN). When you ces TAN called Wiles LAN ot fo more devices in LAN th aLANDy conecting devices using Wi WLAN, So, WLAN ia wireless connection that, anh aces points and Fouts 19 MaKe a connecion -— COMPUTER SCENCE py ia “ § a then ne coment Le derma gnensbre (ig 1 7sancxample of WLAN. Acro clea et a ane LAN), ts eae tan LAN =e fi) Widor Sendai wides gin eemorcations sytem. WIMAX Provide broadband ing ‘sccess (BWA) upto 30 es (5 km) for fed stations 14310 miles 6:5 ky frase Gators nce he WI winds local area network standards limited in most cass egy 10.300 fet (30-100. Fe.) Wi omen ae Winax repuizes 2 tower called WiMer Base Sune aT rss ee ee Ad eee tee sing 2 standard wired high-speed Src Bot op =r ime evar oe(wae that bandwidth among customers via wire, it amos Ink to coabih wets Win Spend ena errant a inert onmecnny eeo aa: oil mtn he Wate ree ® Fe (0 Mo oe 5 www (World Wide Web) word wide web (WW) is eof prota 1 Sosy docu on heehee teats” WWW also species a way—the hype Te ol (TTP) ~10 request a senda ypemeda dane Te (eet cn a aloe ee ex nerwones = exnetworking Terms and Co ps section, We AE 01g 0 dws ‘os ineetoning en and one, ‘pr discussion with WWW, ation of ext aut, inags and eins) ove the noon ww tutes Lets 0 wo ve Took at varios atibutes tht hae contributed othe sucess of WWW Userfrendly.WIVW resources can work easly with mos Interet browsers which are ery user friendly. uisimedia Documents Information onthe We, whch maybe graphics, auto ideo, [Tnimatons and Text viewed in page. esa dace onthe Infere! that ar tito text pls any ofthese multimedia elements, WWW allows and supports the Internet srs 10 ate [esing servers is based en oi tenses St the ter examples of URLs sre i dress, the serves heaag a EE nme sn a re Soins nl oF a ile aerate cients cf URLS A fics cme eae eee by the following * 4 ‘com See a 5 sag ptree compa Ie dont aw ete ein eg a: fous coo ert asim sett tit a i) Say Be see nec a New ead (a) Some rowan Bk Gl Crom: or Mi ing, can csp les in jst boot any me ft ole comenen types of rvers. Tobe 12 liste the types of servers you say ow Avstaia Gk Denmack fo India se New Zealand Te and bnery Tr het we organized) | TSA DNS Sever rear Sesh ay The Domain Name Sytem (ONS) he et and vary le hte eg i dress of domain name, ss Sr Sed. Wen a int ype a doa ane Yer nee, maint oe ‘ey i set to DNS ere, whch wil ats meaiadacamens on the Word Wise MO ees Se ‘ADIN serve is a computer ee at ont Pubic P addres ana tease Reroute are organized in ierareiol cowmure sx fC Wy eons It vith servers using special protocols - aS to added features conan N mm dnabee 012 ONS VOTER ib 2 natch pte eee ther connected DNS servers. This “OWS Sevag eer issiewstarng vette soa eek Soeetah ta a ey server, it sends the DNS 1 ot ae IP addres is found oF er CHS ac rtengee Year bss Yok ihe RSS sl el" ‘eshnarig preweaning Hes cece pecs Joes not exist at all Bren fohen the domain name is typed wrong ord ee om nr made an everlasting impresion on ararco go a foours oT orners. Neb20 eae gai ek se en = fia a ext noice are ecard are widely use by poop: sme me — ‘9 Foatook © Words be le eae $ proc Twit 6 Diss © YouTube “en owe 113 On en Perio a =" Web Poge Fiske = Tredocuments residing on web siesarecled webpages The [Wee Pact F ae ‘web pages use HTTP/HTTPs protocols. loaton 003 wa a —. err may ae sich Irom scien | ured aon he ain Se better understanding, Let us discuss th a hos incrose the ae of parcpaton of wes elie web and ec ite & wie 1. HOM PAce It iathe oplevel web poge of web site When» web-sites pods : line ona home pages iplaye. sees dtl provi ttf anal hier meine 21 Wen PORTAL Iisa website, which hotter web words eh pe ee acetate na uch er prec fas hyperikstomany ther we ses yccking upon © = ap web les eanbe pene ww jabocom an ee Lom eaage | wb 30 are www.indatimes.com, www Khoj com, etc ‘Web.30 ithe newest version ofthe tert Web 0 comes with ore da ad com ‘A sek poral alo offer abroad ary of resources and ser rams en aoe nor Web 3.0aimsat combining ne nop he iil liens AE tri sat interests sharing ess and information), sack mime reac (at) and Blckhane. 3aste poe inellast apps over kere Web 30 combines 2D and: AD to cea immersive user experiences, People ean alto access WS Biles ceitsh Hsien M0 using a much wider ‘ange of devices iluding smartphones compuers and Reade Hee Hesbenls sioner ct towing web wove tation osc sn hgh leon content on thinker edly aaa tn he The computer system providing the web-hosting s knowns 4 We 0 les inmenive we epee on -web-server or the web host. ee . wes Hostine ° hat more interactivity and eee an Basically, the web hosts allow their customers to place web ot © Web jory greater security and privacy ditlerent parts of the world. Seapets: wee ee ne cic acti fics mpage ype cep dv web sons, Sc menue | 159 i Which sintains constant, high speed connections to the iv saul A pt wien ina spec language called HTML oF p Towser how to display et pcre and backbone of internet rot cent er Sunita inh nor on ee .. ee ee Se ropes ne er naa ee 8 design the layout of a document and 1 document including tet hore 2.0/3.0 Adspay the contents ofa hyperent document “2 document interact clement ia , ots how 0 3h media and new page yout 20 Serr medi The nga hat pps ands, called tage tat et ous ete sin ma meet ee Ts CS 4 : = a a You contol the presentation of _ COMPUTER SCE my te containing structured inormatien, oon, ig. a Han x te lg oy strc na eu. The XML See Seemine XML aly # met ange Forde a eeepc ee pen ey eee a Macbook dy espn pe cc Ni cot at changes ac ie its vewed For eam, eva dierent age depen on any numer of parameter sae {© Time of day Lorwanic wae NT (amie conning ‘ecralages “HTML refers 0 2 combination of web PATNA. CSS Java that is used to ulimedia content sciptsina web page is known as web-scriping Asif of commands that are embeded n cb page and renee axa progsam or sxpting engine. Scripts may be writen fora ve msg pres 3 kcal cputes oto generate we Ps ee [écrvrr ‘soe ho coi nett 9 et Canoga which septs ae writen ae sh a8 VBS, Jap, ASP. Nore ool See nt ews =H Soe Si Sp side srting ete Se tem se ene set a wh te ane eso eee raninginforton 8 per he regimens ert ean tel foe a popular served 4 Se or SP a oe poring Cie do ond Seva Sde Sepng cing te bs fn he ue and en Sie Tacipt code downloaded ond ened ihc en a om Services ae secure they dona hae ace fies an databases Browser dependent Affected by the processing speed of wees Network Security Concepts The netwoehing es endless pombe ad oppor Chnveninc uth conenentandendesbenets eet el Bass rere Whe ensuring tor su ters an programe gin 28 Icha ae setup ese a tows tht they ae sis Une ‘stetaon encrypt oma cds ames Prleion Methods Bs) Tuner or etc the ent essa An used Th preston eta gna 1. Authorization Asthriation determine i use a eae erauring tthe user's coe awa OF Authorization is prior by ing he AL heshe is snide a —— COMME SCE 2. Auhesbcoton pthntinton en ot he wet eit am er nd vlating the gat an authority (tre vad pagan Py rato gals rmedaspannrcin ste auioried risk yp eg 2: Bone Sens a eee ey ee wf of tert Te Meet pg Secengaraecta pray king Frcs weg a en ‘Fol vase npn th ena nd treo contrat of ee et re tory pre Peete ee pts wich cans ch rege eae [Sete ecpeieton'y curt ea eIA el ee promi ve eect is an authentic user Authenticstioninyg 11.6.1. Reloted Terms wo led Tet us now ak about some terms related tot, some terms ested to network ean Cooties In web terminologies cookies ae used to determine your web _[Co0%t" fase. Cookies ae actully sal text les tht ate tented and Coles 2 meses aw Sfored an yout bromsig devo (uch as jour computer, ee Vronas toa Webbe Smartphone iad) th wesc You ae visting tostore yous 3° ed see an aati it iste cpg ie: Use hse oh, ‘ea Debles mak the wer experience mot eficent and carom "a Sn sccksisaimemage vento Web imowserby a Web server The bowser stores the meses Stesfe Te mesage then set back othe sever cach Hime the browser requests a page fom th ‘Hackers and Crackers es bem a ee Matematica re voha vc nyege SN asi the ear Bonde fo ey pain eect apes ays, _ 1 | on on cpetow a bs seurk on el hey tere! nde Wed Nae a Sper renin ena ri col aceon ois TT Act ond IT (mend Ae 2008 i cot on a lt to Oe ch yA é shh Trae ltd lve UNCTTRAD lng eel rercr 200s pcm pope yar aa ova ae iy cero rods Wh he Cover eo roe egal race ‘The Act os later amended in December 206 trough the IT Amendment) At, 2008 t provided sditional focus on Information Sein. It ha aed several new sections on Efencts inlucing Cyber Terorsm and Daa Proton. The Information Techaology ‘Kmendoent Act, 2008 (TF Act 208) came i fore rom Oxober27, 208 onwards Major of TF ACF (2008) included sjres _Authetaton of can ord ig tes ges eal cg Document get pal engin Decent eed pet By any am the gonermem ay be sped elon rm The maxim penal or ay dae compote ool ste Be tpt coe Che ltd cach he da ol ade din Bene At TOS Boer ols Eee Act 11 he eve Bark da Ad 14 treet be amended aga th wih eT Act tend it i fees TT Act has again buen amended in BB. The 22 amendmen te Social med paoos ust ence grater dle wih spc othe ne ‘onthe pater Online platoons mast et 2 ia oe citing cnet wi (lawl an ing etn Ss eee cee Soci, naaien tae naan cele haere Se oriain ‘aust educate uses about the te tin ontop op eto paces set i gy a ae oem cee See crane ore a Cyber Crimes ‘crimes commited with the use of "eC any ns OMS er re mn im Sr thine aera (ber Crimes are diferent from conversions nes rit nance a someon ~ erste o ces) alter change na eS hentonlieaditee sc "hy Seemann ecren mes rene cae Sete ccareaery ower me Eto acing Heigl ties is sly widerstood to Seecetacenqrs sem ond tres Wher withthe inten hc Sears ie pater ongad RSS sets eee crs woe rad Seeseecrecptnontnne ccrorc tors mye 5.0 Prepay, Forograpy i porto te steer nny se op ; sconces oy wind yee Le jos ado oped by eau wal re types of wise ae Tr File inlclors~ atach themaces 2 progam fe 2b Hoot sto Viruses ~ ntl thems ee 4 Maco ise ~ net dala fa" OT RMN ce rg dk Meet viruses are peed by Salama 6 Its replication ability is ited othe (sua sytem. oral Comput: vrs mv om emp tmp by ching mets lesa rte of dss and date. These dee tt mcs ete el sche ane program ht nb downline Vir un cbt to male your mand ca at Many hese “lot ato bs FA ed ote cmpon fan ei fst ad sectors am the disk, destroying part of programs and lcrease the space an aed dik by duping fle. "nat spec treks onthe ks forma he nie dik, Se spies and aed dat es causing oat finery 1 asco he site hangs Batt doeint pod any shou or mose movement {Asn horses code halen na program uch aba game or sreadhes that ok safe fo ran buts hin ade effects When te programa ak Wt anes fo incon asthe wer expec ba astty Wt dating damaging o aeinginormaton i te background ie broxran nt own and dows ak ree Bost Fegan zo tock Ancxample ta Tj horse woul Bea seoutale that whe excu PopS uP with an ure of Santa Cay a 2 caption sang “Mery . Tn the backgrouna ats le oull be deen Ne oF prong other lous acho —_ ha my Je: The program may perform any va Sommers sn eg ene wo ta Bema ce Sen ‘Srtrittsa network worm, ica replicate across communication links forms are programe at run independently and travel SOmputer to comput Herre cetmtone Worms mary have potions of themselves runing on many i Tec eens dona charge ter pogams although they may cary oer eget Soe 11.7.4 Spom Spam refers to econ unk mallor junk newsgroup pontings. Some people define sper, oe gurally ar any urclcied ei. Merriam Webster dictonay defines gen a trea uly commercial act ge numer of eres ‘cing Seam {© One-way toelp avoid Spam or nk ma ito crete a Sram ie Oa fndvend doo voreting ciel thet you 2 a spe Som (9 Actes rt ge youre with oe it on po things he ne The (Paco sar tema ars with ether compas tha then send ou spe N75. Mohere Maha anual term for any pice svar that has malcontent. So Tare Aho atypetoware Tease reais alate whch ual) Me (9 Sepa Spar arte sear that seat tach wih our smpute san ‘ach asa cb rower and seaily colt intrmaton alo wes scien sth Pevorts ps taking cman se ‘Adware Adware refer to unaned softeae that pay advertisement popup BS es aces Sr tg cy terme when ame See Ue sorta any saftare on ses omg (memes aor 2 ype of stare thet mater + amps Soe te ecg enypton and demands oncom 1 arb Reon Kage ns er esac © __ wrens 45 Nemo Security Threats ‘onpusrs oF COMPUT Networks ae also pone some tas anc atc as-Sncsred 1 sop S#OOPin fer to opening ad lang honk ils in wnethorzed mane secping ma vole Many pe oft suchas gaming acre uaorized wy. seen nrving sreore ee ema or Seem aoariad chs cphisatd snoping softwar nay vee- meng leprae Presede Inv ang maton ena Fe WW oP tmesdopping * Eavesdropping 1s alse sna to amooping, When some ne Hstens 10 2 eonvceston fat they af 0t pati eavesdropping Formal you can say that the ) wit Spam 2 : ———_ 78 wrt Anivirus Sofware ‘An antivir i pecially Fs licous stare rom try on your compute and ops ormaijanamaar tn re ect and prevent malate 08 Your ey ie Thay scene or mil tecques detect and i ten a= = eS — Bao 2 paged ste designed 0 detec 0 vs ay re purer tpop an ter devs mee Ihr ice nepus ay fom cell Segham tcompuerdatace nena nai (eterna somos 2 Oueng (Ler Us Revise Se Amt RS Ble tcc wit ce compere pi © 1155 (gi Ja) ehine cameo, wch cmon sd : oe aya co rs von ce ee or = | 50 ep oesepeticla foe $ Aree scarnstuiomitasupsibinemmactornecce eee Te anna A gona is @ device thar connec ssimilr eras a fStop nde z a oer hoes PTs hse ¢ eeceene i en vy eee Seater sane erg al an irae nyse E 9 Br ata ren ns Mtr cmc pee es eee) emo ert msg wads cre on ain ca 2 ev me a aa ee 5 Oe sen Smet ol pm ae {AoC fect et fee ay —_ foe of whine eg = Te as ur 0) tl th ay ae em ‘can't nae oma er ch ‘we Bo ve hl repo he ea mae eee {a Unter Lor ee ne ar eh ret one bert rt enone sre called @ We Sie Adc ats HT HTP called Wb age or acre ree nth ac Fm pi emer ated Preval ot ne ron eh eee a ok fe SE Leer are melo reams ek se reer crs eee need ence et camper bes nt a ig ek eB em ° (t Router {e Broodcast device (6) Unkaat dence (Males device W) None of the above 2. Newark device hot eget ad etait whe gn (Mose i) Has (0 Reger Beige 4 Nebr device which connect nates linia es me rec) (Hat Roser (0 be (9 Caeway 5. Ntrork device which conection reea) one (meer 0 BE (away 6 Neoworks devices tat ens th dt oer apni sh ough connie hope (eth Roe (0 nage cneway () Modulation Demodulaton ( Modulation Demancing {6} Modulator Demodulator {@) Model Demodulator Soc es ata eves on toh? evice roadcnts ny at (0 Router (0 Seich eal ree 9. Wiech device titers data pacha elses fo ane ht ee dt (Router osnaeh ‘om (a Bridge M. Which device elligent wt ee e re more itigent we ing SNP ie (0 Router (@ See ie . ' |

You might also like