Debdeep Dan Xi-A Sci It-802 Project

Download as pptx, pdf, or txt
Download as pptx, pdf, or txt
You are on page 1of 28

DAV PUBLIC SCHOOL,

MIDNAPORE
PRACTICAL FILE
SESSION – 2021-2022
SUBJECT – IT-802
NAME-DEBDEEP
DAN

CLASS - XI SEC – A

ROLL NO – 14
TABLE OF CONTENTS
1) INTERNET AND NETWORKING ---------- 4-23
2) DATABASE (DBMS) ---------- 24-27
3) Types of Network ---------- 28-10
4) Internet Working Devices ---------- 11-13
5) Internet Applications ---------- 14-16
6) Malwares ---------- 17
7) Network Security Tools & Services ---------- 18-19
---------- 20-23
ACKNOWLEDGEMENT
I would like to express my special thanks of gratitude to my teacher (Mr. Mayunk
Raha) as well as our principal (Mr. Banamali Biswal) who gave me the golden
opportunity to do this wonderful project on the topic Internet & Networking, which
needed me to do a lot of Research and I came to know about so many new things, I
am really thankful to them.
Secondly, I would also like to thank my parents and friends who helped me a lot in
finalizing this project within the limited time frame.
EVOLUTION OF INTERNET
In 1876 Bell came forward with the concept of communication through telephone lines leading to development
of Public Switched Telephone Network (PSTN) in 1877. It opened the new frontiers allowing several homes to
connect through telephone lines. In the late 1950s, all the military communications started using telephone
networks setting up dedicated connections between the two parties. This dedicated connection made use of
technology called circuit switching. The connection consisted of several intermediary lines and switching offices
enroute .At the peak of the cold war, the US Department of Defense (DoD) realized the need to establish fault-
tolerant networks that would not fail at the time of nuclear war and could survive a single point failure in the
network. Paul Baran along with Donald Davies and Len Kleinrock came forward with the idea of digital packet
switching in which the message to be transmitted is divided into small chunks called packets. Unlike circuit
switching in which resources are reserved along the dedicated path of communication, packet switching is
based on link sharing.
This led to the development of Advanced Research Projects Agency Network (ARPANET) in 1969. ARPANET
made use of technology called digital packet switching. Need for communication between various
heterogeneous networks led to the development of TCP/IP (Transmission Control Protocol/Internet Protocol) in
1970. Along with several smaller networks, another large network called NSFNET was developed in 1984 by
NSF, U.S. National Science Foundation for research and education purposes. The standardization of the core
protocols (IPv4 and IPv6) lis an activity of the Internet Engineering Task Force (IETF), To maintain
interoperability, the principal name spaces of the Internet are administered by the Internet Corporation for
Assigned Names and Numbers (ICANN). Several government and private organizations, collectively called
Internet Service Providers (ISPs) joined hands to provide connectivity for the Internet. The Internet made it
possible to exchange information and communicate with remote nodes.
COMPONENTS OF NETWORK
• Servers −Servers are high-configuration • Clients − Clients are computers that request
computers that manage the resources of the and receive service from the servers to access
network. The network operating system is and use the network resources.
typically installed in the server
Peers − Peers are computers that provide as well as Connecting Devices − Connecting devices act as
receive services from other peers in a workgroup middleware between networks or computers, by
network The peers may be software processes, binding the network media together. Some of the
hardware devices. In other words, it is the peers that common connecting devices
communicate by using the protocol to talk to each other.
Transmission Media − Transmission media are the channels through which
data is transferred from one device to another in a network. Transmission
media may be guided media like coaxial cable maybe unguided media like
microwaves
Topology:- The arrangement (also called layout) of nodes in a network is called network topology.
There are broadly two types of topologies broadcast and point to point. In broadcast topology, all
nodes share the same physical link. When one node transmits, all nodes receive. Broadcast
topologies are mainly bus and ring. In point to point topology, every pair of nodes has a dedicated
link. Popular point to point topologies are star and mesh.

Bus Topology In bus topology, there is a long cable, called Ring Topology In ring topology, all the devices are attached
backbone cable (or simply backbone), that connects various through a cable in the form of ring. The message to be
nodes through a connector called tap. In this, a message sent by communicated is transmitted in one direction, thereby, relaying
one is received by all devices connected to backbone cable. the message to the intended recipient.
In mesh topology, every node is connected with In Star Topology, all the devices are connected to
every other node in the network. Because of the central controller called hub communication
dedicated point to point connection between between any two devices takes place through the
every possible pair of nodes, this provides secure hub responsible for relaying messages. star network
data transfer without any traffic problem. can be easily installed and configured.
Tree Topology - Tree topology is a hybrid topology using a combination of star and bus topology.
Backbone cable in a bus topology acts like the stem of the tree, and star networks (and even
individual nodes) are connected to the main backbone cable like the branches of tree ,damage to a
segment of a network laid using tree topology will not affect other segments. installation and
configuration is difficult as compared to other topologies. Also, if the backbone cable is damaged, the
entire network communication is disrupted.

NOD
ES
NOD NOD
ES ES
TYPES OF NETWORK
On the basis of geographical span, network can be broadly categorized as PAN, LAN,
MAN, and WAN.

PAN - A personal area network (PAN) is a computer network used for communication among
computer and devices close to one person. Some examples of devices that are used in a PAN are
personal computers, printers, fax machines, telephones, PDAs, scanners, and even video game
consoles. A PAN may include wired and wireless devices. The reach of a PAN typically extends to 10
meters.
MAN stands for Metropolitan Area Network. It may be WAN- Wide Area Network .Typically a WAN spans a
owned by a single organization or by many individuals segment of about 1000 Km. They are used for long
or organizations. These networks are used to establish distance communication and are well suited for
links within a city, and span an area of radius up to 50 connecting remote areas. It connects various local and
Km. For example, a cable television network within a metropolitan area networks.
city.
LAN stands for Local Area Network. Local Area networks are private networks and can span a radius
of up to 1 Km. They are generally established within a building or campus. LANs operate at a speed in
the range 10 Mbps to 1 Gbps.
INTERNET WORKING DEVICES
Creation of a network requires various network devices, each of which plays a specific role in the
network.
HUB - Unlike a repeater which connects two cables,
Repeater - With increase in distance, a signal may become
weak and distorted. A repeater is used to restore the input
a hub connects several lines, also called, cable
signal to its original form, so that it can travel a larger segments. A hub comprises several input/output
distance. Thus, it is placed between two cable segments (I/O) ports, each of which connects to a single cable
A bridge is a multiport device used for connecting two or more
LAN, possibly operating at different speeds. Thus, a bridge Switch connect two or more LAN segments, switches are used
may be used to produce bigger LAN by combining smaller to connect individual nodes in the network with each other.
LANs. A bridge enables devices on one LAN segment to Each node within network is connected to a unique port in the
communicate with the devices on another LAN segment. switch. On receiving the incoming data frame, it forwards it to
Unlike hubs, they are intelligent devices which exercise only a single line connecting to the destination node. All the
discretion while forwarding data to the outgoing line leading to nodes connected through switch forms only one LAN.
the destination
Routers are used for connecting various networks (LAN or Gateway connects networks based on different protocol
WAN) with each other. A router transmits data from technologies to communicate with each other. Data coming from
incoming network to another network. A router maintains a one network operating on one protocol is converted according to
routing table of various networks. Based on the destination the protocol of the outgoing network, and then forwarded. Thus
address, the router determines to which network the incoming a gateway may be thought of as a router equipped with software
packet should be transmitted. for protocol conversion
INTERNET APPLICATIONS
Internet application does something
for end users. It is generally not
concerned with how data is actually
transmitted between the hosts.

Some distributed applications that require


well-defined application level protocols:
•Sending and receiving email
•Searching and browsing information
archives
•Copying files between computers
•Conducting financial transactions
•Navigating (in your car, smart scooter,
smart bike, or other)
•Playing interactive games
•Video and music streaming
•Chat or voice communication (direct
messaging, video conferencing)
MALWARES
Worm - Often received via network, and it Eavesdropping - The act of secretly or stealthily
automatically keeps on creating several copies listening to the private conversation or
of itself on the hard disk thereby flooding the communications of others without their
hard disk. When a worm is received as an email consent. Eavesdropping is done through
attachment, it is automatically forwarded to the telephone lines, cellular networks, email, and
recipients leading to network congestion. Thus, a instant messaging.
worm may crash the system and entire network.
For example, Code Red Worm which makes
more than 2,50,000 copies of itself in
approximately 9 hours.
Trojan Horse - is a code that appears to be Virus - A software code that may harm your
desirable and useful but ends up harming the system by overwriting or corrupting the system
system. Trojan horse can attach itself with a safe files. A computer virus is similar in action to
application. For example, it may be attached to viruses in our body which replicate themselves
any game downloaded over the Internet. Such
an application when executed creates a and affect body cells. The affected part is called
backdoor in the system through which a hacker the infected area. A computer virus may make
can access the system. The hacker can monitor several copies of it by inserting its code onto
all the activity performed on the system. For the system programs, files or boot sector of
example, in the late 1990s, Trojan Horse named hard drives and thereby may corrupt them. E.g
Sub7 was created which took advantage of -boot sector virus, file infector virus
security flaws of earlier version browsers
Types Of malwares
NETWORK SECURITY TOOLS AND SERVICES
Firewalls :- A firewall aims at protecting the
internal network of an organization, home, or
individual from malicious traffic from external
networks. A router or a computer (often dedicated
to serve as a firewall) may be installed between
external network and internal network for this
purpose. Firewall inspects the network traffic and
allows only that data to pass through the network
that does not violate the security constraint.
Hardware firewalls in the form of a router prevents
malicious software from entering your network
from outside the network. However, software
firewalls installed on personal computers prevent
unauthorized access or malwares from gaining
access to personal computers. Network firewalls
may also encrypt the incoming data by converting
it to non-readable format, thus, adding further
protection.
Network layer security :- TCP/IP protocols
may be secured with cryptographic methods
and security protocol like Secure Sockets
Layer (SSL) .

Password Manager :- A software application


that helps a user store and organize
passwords. Password managers usually
store passwords encrypted, requiring the
user to create a master password; a single,
ideally very strong password which grants
the user access to their entire password
database from top to bottom.
Anti-virus - A software that aims to protect your system against malicious and potentially unwanted
programs. It is responsible for detecting these malicious programs by searching for them, and
removing them to keep the system protected. The software operates by maintaining a database of
malware definitions, which are automatically updated. It searches for any malicious program by
scanning the files against the stored malware definitions for a match. In case of a match, they are
declared as potentially harmful, and are disabled and removed depending upon anti-virus software
settings..
Cyber Laws - The laws for systematic use of e-resources, for example, e-business, and serve as a
measure against illegal cyber-crime. Various cyber laws have also been enacted to prevent cyber-
crimes and take action against those involved in such crimes. These laws define the action that would
be taken against people committing the offences. For cyber security, an amendment in IT Act 2000
named Information Technology Amendment Act,2008 was also introduced. The act also defines
offences and penalties for cyber-crime. Cyber police are responsible for detecting such crimes and
taking the necessary measure against it according to the IT Act.
DATABASE MANAGEMENT SYSTEM (DBMS)

1) CREATING DATABASE AND CREATING TABLE 2) ENTERING VALUES INTO TABLE ‘MYSCHOOL’
3)SHOW ALL INFORMATION IN TABLE 4) DISPLAY StudentID, Programming_Score, Maths_Score

5) RECORDS OF STUDENTS WITH StudentID 6) SELECTS RECORDS OF STUDENTS WITH


BIT2016003 – BIT2016005 Maths_Score below 70
7) INSERT SIXTH RECORD WITH StudentID=BIT2016006,
Firstname=Gabriela, Surname=Yeboah,
Maths_Score=82, French_Score==79, 8) DELETE STUDENT WHOSE StudentID = BIT2016004
Programming_Score=58

9)REMOVE ‘Surname’ COLUMN FROM TABLE 10) SET French_Score=79 FOR StudentID=BIT2016002
11) REMOVE ‘STUDENT’ TABLE FROM DATABASE

12) REMOVE ‘MySchool’ DATABASE FROM


COMPUTER

You might also like