Computer Network and Security Notes
Computer Network and Security Notes
Computer Networking
Network Devices
Network Topology
The Network Topology is the layout arrangement of the different devices in a
network. Common examples include Bus, Star, Mesh, Ring, and Daisy chain.
Network Topology
OSI Model
OSI stands for Open Systems Interconnection. It is a reference model that specifies
standards for communications protocols and also the functionalities of each layer. The
OSI has been developed by the International Organization For Standardization and it
is 7 layer architecture. Each layer of OSI has different functions and each layer has to
follow different protocols. The 7 layers are as follows:
Physical Layer
Data link Layer
Network Layer
Transport Layer
Session Layer
Presentation Layer
Application Layer
Protocol
A protocol is a set of rules or algorithms which define the way how two entities can
communicate across the network and there exists a different protocol defined at each
layer of the OSI model. A few such protocols are TCP, IP, UDP, ARP, DHCP, FTP,
and so on.
Unique Identifiers of Network
Hostname: Each device in the network is associated with a unique device name
known as Hostname. Type “hostname” in the command prompt(Administrator Mode)
and press ‘Enter’, this displays the hostname of your machine.
HostName
IP Address (Internet Protocol address): Also known as the Logical Address, the IP
Address is the network address of the system across the network. To identify each
device in the world-wide-web, the Internet Assigned Numbers Authority (IANA)
assigns an IPV4 (Version 4) address as a unique identifier to each device on the
Internet. The length of an IPv4 address is 32 bits, hence, we have 2 32 IP addresses
available. The length of an IPv6 address is 128 bits.
In Windows Type “ipconfig” in the command prompt and press ‘Enter’, this gives us
the IP address of the device. For Linux, Type “ifconfig” in the terminal and press
‘Enter’ this gives us the IP address of the device.
MAC Address (Media Access Control address): Also known as physical address,
the MAC Address is the unique identifier of each host and is associated with its NIC
(Network Interface Card). A MAC address is assigned to the NIC at the time of
manufacturing. The length of the MAC address is: 12-nibble/ 6 bytes/ 48 bits Type
“ipconfig/all” in the command prompt and press ‘Enter’, this gives us the MAC
address.
Port: A port can be referred to as a logical channel through which data can be
sent/received to an application. Any host may have multiple applications running, and
each of these applications is identified using the port number on which they are
running.
A port number is a 16-bit integer, hence, we have 2 16 ports available which are
categorized as shown below:
Port Types Range
List of Ports
Socket: The unique combination of IP address and Port number together is termed a
Socket.
Other Related Concepts
DNS Server: DNS stands for Domain Name System. DNS is basically a server that
translates web addresses or URLs (ex: www.google.com) into their corresponding IP
addresses. We don’t have to remember all the IP addresses of each and every
website. The command ‘nslookup’ gives you the IP address of the domain you are
looking for. This also provides information on our DNS Server. \
Computer Security – Overview
Last Updated : 24 Aug, 2022
Computer security refers to protecting and securing computers and their related data,
networks, software, hardware from unauthorized access, misuse, theft, information
loss, and other security issues. The Internet has made our lives easier and has provided
us with lots of advantages but it has also put our system’s security at risk of being
infected by a virus, of being hacked, information theft, damage to the system, and
much more.
Technology is growing day by day and the entire world is in its grasp. We cannot
imagine even a day without electronic devices around us. With the use of this growing
technology, invaders, hackers and thieves are trying to harm our computer’s security
for monetary gains, recognition purposes, ransom demands, bullying others, invading
into other businesses, organizations, etc. In order to protect our system from all these
risks, computer security is important.
In order to protect our system from the above-mentioned attacks, users should take
certain steps to ensure system security:
1. Always keep your Operating System up to date. Keeping it up to date reduces the
risk of their getting attacked by malware, viruses, etc.
2. Always use a secure network connection. One should always connect to a secure
network. Public wi-fi’s and unsecured networks should be avoided as they are at risk
of being attacked by the attacker.
3. Always install an Antivirus and keep it up to date. An antivirus is software that
scans your PC against viruses and isolates the infected file from other system files so
that they don’t get affected. Also, we should try to go for paid anti-viruses as they are
more secure.
4. Enable firewall. A firewall is a system designed to prevent unauthorized access
to/from a computer or even to a private network of computers. A firewall can be either
in hardware, software or a combination of both.
5. Use strong passwords. Always make strong passwords and different passwords for
all social media accounts so that they cannot be key logged, brute forced or detected
easily using dictionary attacks. A strong password is one that has 16 characters which
are a combination of upper case and lower case alphabets, numbers and special
characters. Also, keep changing your passwords regularly.
6. Don’t trust someone easily. You never know someone’s intention, so don’t trust
someone easily and end up giving your personal information to them. You don’t know
how they are going to use your information.
7. Keep your personal information hidden. Don’t post all your personal information
on social media. You never know who is spying on you. As in the real world, we try
to avoid talking to strangers and sharing anything with them. Similarly, social media
also have people whom you don’t know and if you share all your information on it
you may end up troubling yourself.
8. Don’t download attachments that come along with e-mails unless and until you
know that e-mail is from a genuine source. Mostly, these attachments contain malware
which, upon execution infect or harms your system.
9. Don’t purchase things online from anywhere. Make sure whenever you are
shopping online you are doing so from a well-known website. There are multiple
fraud websites that may steal your card information as soon as you checkout and you
may get bankrupt by them.
10. Learn about computer security and ethics. You should be well aware of the safe
computing and ethics of the computing world. Gaining appropriate knowledge is
always helpful in reducing cyber-crime.
11. If you are attacked, immediately inform the cyber cell so that they may take
appropriate action and also protect others from getting attacked by the same person.
Don’t hesitate to complain just because you think people may make your fun.
12. Don’t use pirated content. Often, people try to download pirated movies, videos or
web series in order to get them for free. These pirated content are at major risk of
being infected with viruses, worms, or malware, and when you download them you
end up compromising your system security.
Sample Questions
Summer-time is here and so is the time to skill-up! More than 5,000 learners have
now completed their journey from basics of DSA to advanced level development
programs such as Full-Stack, Backend Development, Data Science.
And why go anywhere else when our DSA to Development: Coding Guide will help
you master all this in a few months! Apply now to our DSA to Development
Program and our counsellors will connect with you for further guidance & support.