0% found this document useful (0 votes)
29 views74 pages

Presentation On Computer Networking

Uploaded by

Sneha Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
29 views74 pages

Presentation On Computer Networking

Uploaded by

Sneha Malik
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 74

ARPANET

The Advanced Research Projects Agency Network


(ARPANET) was the world's first operational packet
switching network and the progenitor of what was to
become the global Internet. The network was initially
funded by the Advanced Research Projects Agency
(ARPA, later DARPA) within the U.S. Department of
Defense for use by its projects at universities and
research laboratories in the US. The packet switching of
the ARPANET was based on designs by British scientist
Donald Davies and Lawrence Roberts of the Lincoln
Laboratory.
In 1990, a mere 21 years after its creation, ARPANET,
with its slow data transmission lines, was disbanded by
the Department of Defence.
Internet
A means of connecting a computer to any other computer anywhere
in the world via dedicated routers and servers. When two computers
are connected over the Internet, they can send and receive all kinds
of information such as text, graphics, voice, video, and computer
programs. No one owns Internet, although several organizations the
world over collaborate in its functioning and development. The high-
speed, fiber-optic cables (called backbones) through which the bulk
of the Internet data travels are owned by telephone companies in
their respective countries. The Internet grew out of the Advanced
Research Projects Agency's Wide Area Network (called ARPANET).
The development of hypertext based technology (called World Wide
web, WWW, or just the Web) provided means of displaying text,
graphics, and animations, and easy search and navigation tools that
triggered Internet's explosive worldwide growth.
Switching Techniques
Apart from determining valid paths between sources
and destinations within an interconnection network, a
switching technique is needed that specifies how
messages are to be fragmented before passing them to
the network and how the resources along the path are
to be allocated. Furthermore, a switching technique
gives preconditions to be fulfilled before a fragment can
be moved on to the next network component.
Following are the different switching techniques:
Circuit switching
Message switching
Packet switching
Circuit Switching
In circuit switching when a connection is established, the origin-
node identifies the first intermediate node (node A) in the path to
the end-node and sends it a communication request signal. After
the first intermediate node receives this signal the process is
repeated as many times as needed to reach the end-node.
Afterwards, the end-node sends a communication acknowledge
signal to the origin node through all the intermediate nodes that
have been used in the communication request. Then, a full duplex
transmission
line, that it is going to be kept for the whole communication, is set-
up between the origin-node and the end-node. To release the
communication the origin-node sends a communication end signal
to the end-node. In Following figure shows that a connection in a
four-node circuit switching network
Message Switching
When a connection is established, the origin-node
identifies the first intermediate node in the path to
the end-node and sends it the whole message.
After receiving and storing this message, the first
intermediate node (node A) identifies the second
one (node B) and, when the transmission line is not
busy, the former sends the whole message (store-
and-forward philosophy). This process is repeated
up to the end-node.
Packet Switching based

Packet Switching based on Virtual Circuit: When a connection is established,


Packet Switching based on Datagram:
Comparison of Switching Techniques
If a connection (path) between the origin and the end
node is established at the beginning of a session we are
talking about circuit or packet (virtual circuit) switching. In
case it does not, we refer to message and packet
(datagram) switching. On the other hand, when
considering how a message is transmitted, if the whole
message is divided into pieces we have packet switching
(based either on virtual circuit or datagram) but if it does
not, we have circuit and message switching.
Transmission Media
The means through which data is transformed from one place to
another is called transmission or communication media. There are
two categories of transmission media used in computer
communications.
1. Bounded/Guided Media
2. Unbounded/Unguided Media
Bounded Media
Bounded media are the physical links through which signals are confined to
narrow path. These are also called guide media. Bounded media are made
up o a external conductor (Usually Copper) bounded by jacket material.
Bounded media are great for LABS because they offer high speed, good
security and low cast. However, some time they cannot be used due
distance communication.
Three common types of bounded media are used of the data transmission.
These are
1.Coaxial Cable 2. Twisted Pairs Cable 3. Fiber Optics Cable
Coaxial Cable

Coaxial cable is very common & widely used commutation media. For example
TV wire is usually coaxial. Coaxial cable gets its name because it contains two
conductors that are parallel to each other. The center conductor in the cable is
usually copper. The copper can be either a solid wire or stranded martial.
Outside this central Conductor is a non-conductive material. It is usually white,
plastic material used to separate the inner Conductor form the outer Conductor.
The other Conductor is a fine mesh made from Copper. It is used to help shield
the cable form EMI. Outside the copper mesh is the final protective cover.
Characteristics of Coaxial Cable
1. Low cost
2. Easy to install
3. Up to 10Mbps capacity
4. Medium immunity form EMI
5. Medium of attenuation
Advantages
6. Inexpensive
7. Easy to wire
8. Easy to expand
9. Moderate level of EMI immunity
Disadvantages
Single cable failure can take down an entire network
Twisted Pair Cable
The most popular network cabling is Twisted pair. It is light weight,
easy to install, inexpensive and support many different types of
network. It also supports the speed of 100 mps. Twisted pair cabling
is made of pairs of solid or stranded copper twisted along each
other.
Category 5
This is the highest rating for UTP cable and can support up to 100mps.
UTP cables consist of 2 or 4 pairs of twisted cable.
Cable with 2 pair use RJ-11 connector and 4 pair cable use RJ-45 connector.
Characteristics of UTP
Low cost
Easy to install
High speed capacity
High attenuation
Effective to EMI
100 meter limit
Advantages of UTP
Easy installation
Capable of high speed for LAN
Low cost
Disadvantages of UTP
Short distance due to attenuation
Fiber Optics

Fiber optic cable uses electrical signals to transmit data. It uses light. In fiber optic cable
light only moves in one direction for two way communication to take place a second
connection must be made between the two devices. It is actually two stands of cable. Each
stand is responsible for one direction of communication. A
laser at one device sends pulse of light through this cable to other device. These pulses
translated into “1’s” and “0’s” at the other end. In the center of fiber cable is a glass stand
or core. The light from the laser moves through this glass to the
other device around the internal core is a reflective material known as CLADDING. No light
escapes the glass core because of this reflective cladding. Fiber optic cable has bandwidth
more than 2 gbps (Gigabytes per Second)
Characteristics Of Fiber Optic Cable:
 Expensive
 Very hard to install
 Capable of extremely high speed
 Extremely low attenuation
 No EMI interference
Advantages Of Fiber Optic Cable:
Fast
Low attenuation
No EMI interference
Disadvantages Fiber Optics:
Very costly
Hard to install
Unbounded / Unguided media

Unbounded / Unguided media or wireless media doesn't


use any physical connectors between the two devices
communicating. Usually the transmission is send through
the atmosphere but sometime it can be just across the
rule. Wireless media is used when a physical obstruction or
distance blocks are used with normal cable media. The
three types of wireless media are:
•Radio Waves
•Micro Waves
•Infrared Waves
Radio waves

It has frequency between 10 K Hz to 1 G Hz. Radio waves has the


following types.
• Short Waves
• VHF (Very High Frequency)
• UHF (Ultra High Frequency)
Short Waves
There are different types of antennas used for radio waves. Radio
waves transmission can be divided into following categories.
Low Power, Single Frequency.
High Power, Single Frequency
Micro Waves
Micro waves travels at high frequency than radio waves and provide through put
as a wireless network media. Micro wave transmission requires the sender to be
inside
of the receiver. Following are the types of Micro waves.
• Terrestrial Micro waves
• Satellite Micro waves
Terrestrial Micro waves

Terrestrial Micro waves are used are used to transmit wireless signals
across a few miles. Terrestrial system requires that direct parabolic
antennas can be pointed to each other. These systems operate in a low
Giga Hertz range.
Characteristics of Terrestrial Micro waves
• Moderate to high cost.
• Moderately difficult installation
• 1 M bps to 10 M bps capacity
• Variable attenuation
• Low immunity to EMI
Satellite Micro Waves

The main problem with aero wave communication is the curvature


of the earth, mountains
Characteristics Satellite Micro Waves
• High cost
• Extremely difficult and hare installation.
• Variable attenuation.
• Low immunity to EMI
• High security needed because a signal send to satellite is
broadcasts through all receivers with in satellite.

Infrared
Infrared frequencies are just below visible light. These high frequencies
allow high sped data transmission. This technology is similar to the use of a
remote control for a TV. Infrared transmission can be affected by objects
obstructing sender or receiver. These transmissions fall into two categories.
• Point to point
• Broadcast

Point to Point

Point to point infrared transmission signal directly between two systems.


Many lap top system use point to point transmission. These systems
require direct alignment between many devices.
Characteristics of Point to point
• Wide range of cost
• Moderately easy installation.
• 100 k bps to 16 Mb of capacity.
• Variable attenuation.
• High immunity to EMI
Broad Cast
These infrared transmission use sprayed
signal, one broad cast in all directions
instead of direct beam. This help to
reduce the problems of proper alignment
and abstraction. It also allows multiple
receiver of signal
Characteristics of Broad Cast
• In expensive.
• Single installation.
• 1M bps capacity.
• Variable attenuation.
Network Devices
Modem

A modem (modulator-demodulator) is a device that modulates an


analog carrier signal to encode digital information, and also
demodulates such a carrier signal to decode the transmitted
information. The goal is to produce a signal that can be transmitted
easily and decoded to reproduce the original digital data. Modems
can be used over any means of transmitting analog signals, from
light emitting diodes to radio. The most familiar example is a voice
band modem that turns the digital data of a personal computer into
modulated electrical signals in the voice frequency range of a
telephone channel. These signals can be transmitted over
telephone lines and demodulated by another modem at the
receiver side to recover the digital data.
The device that accomplishes modulation – demodulation process
is called a modem. It is known that the electrical and sound signals
are analog - which continuously vary with time.

Equipments (DTE) are connected through modem and Telephone line.


The modems are the Data Circuit Terminating Equipments (DCE). DTE
creates a digital signal and modulates using the modem. Then the
signals relayed through an interface. The second modem at the
receiving end demodulates into a form that the computer can accept.
A modem that has extra functions such as automatic answering and
dialing is called intelligent Modems.
RJ-45 Connector
Short for Registered Jack-45, an eight-
wire connector used commonly to
connect computers onto a local-area
networks (LAN), especially Ethernets.
RJ-45 connectors look similar to the
ubiquitous RJ-11 connectors used for
connecting telephone equipment, but
they are somewhat wider.
Ethernet Card : An Ethernet card is one kind of network adapter. These
adapters support the Ethernet standard for high-speed network
connections via cables. Ethernet cards are sometimes known as
network interface cards (NICs). Ethernet cards may operate at different
network speeds depending on the protocol standard they support. Old
Ethernet cards were capable only of the 10 Mbps maximum speed
offered by Ethernet originally. Modern Ethernet adapters all support
the 100 Mbps Fast Ethernet standard and an increasing number now
also offer Gigabit Ethernet support at 1 Gbps (1000 Mbps).
Hub

A common connection point for devices in a


network. Hubs are commonly used to connect
segments of a LAN. A hub contains multiple ports.
When a packet arrives at one port, it is copied to
the other ports so that all segments of the LAN
can see all packets.
A passive hub serves simply as a conduit for the data, enabling it to
go from one device (or segment) to another.

A intelligent hubs include additional features that enables an


administrator to monitor the traffic passing through the hub and to
configure each port in the hub. Intelligent hubs are also called
manageable hubs.

A third type of hub, called a switching hub, actually reads the


destination address of each packet and then forwards the packet to
the correct port.
Switch

A network switch or switching hub is a computer networking device


that connects network segments or network devices. The term
commonly refers to a multi-port network bridge that processes and
routes data at the data link layer (layer 2) of the OSI model.
Switches that additionally process data at the network layer (layer
3) and above are often referred to as layer-3 switches or
multilayer switches.
Gateway
A gateway is a network point that acts
as an entrance to another network. On
the Internet, a node or stopping point
can be either a gateway node or a host
(end-point) node. Both the computers
of Internet users and the computers
that serve pages to users are host
nodes. The computers that control
traffic within your company's network
or at your local Internet service provider
(ISP) are gateway nodes.

In the network for an enterprise, a computer server acting as a


gateway node is often also acting as a proxy server and a firewall
server. A gateway is often associated with both a router, which
knows where to direct a given packet of data that arrives at the
gateway, and a switch, which furnishes the actual path in and out of
the gateway for a given packet.
Different Types of Computer Networks
PAN - Personal Area Network
A personal area network - PAN - is a
computer network organized around an
individual person. Personal area
networks typically involve a mobile
computer, a cell phone and/or a
handheld computing device such as a
PDA. You can use these networks to
transfer files including email and
calendar appointments, digital photos
and music.
Personal area networks can be constructed with cables or wirelessly.
USB and FireWire technologies often link together a wired PAN while
wireless PANs typically use Bluetooth or sometimes infrared
connections. Bluetooth PANs are also called piconets. Personal area
networks generally cover a range of less than 10 meters (about 30
feet).
LAN - Local Area Network

A local area network (LAN) supplies


networking capability to a group of
computers in close proximity to each other
such as in an office building, a school, or a
home. A LAN is useful for sharing resources
like files, printers, games or other
applications. A LAN in turn often connects
to other LANs, and to the Internet or other
WAN.

Most local area networks are built with relatively inexpensive


hardware such as Ethernet cables, network adapters, and hubs.
Wireless LAN and other more advanced LAN hardware options also
exist.
MAN - Metropolitan Area Network
A metropolitan area network (MAN) is
a network that interconnects users
with computer resources in a
geographic area or region larger than
that covered by even a large local area
network (LAN) but smaller than the
area covered by a wide area network
(WAN). The term is applied to the
interconnection of networks in a city
into a single larger network (which may
then also offer efficient connection to a
wide area network). It is also used to
mean the interconnection of several
local area networks by bridging them
with backbone lines. The latter usage
is also sometimes referred to as a
campus network.
WAN - Wide Area Network

As the term implies, a WAN


spans a large physical
distance. The Internet is the
largest WAN, spanning the
Earth. A WAN is a
geographically-dispersed
collection of LANs. A network
device called a router
connects LANs to a WAN. In
IP networking, the router
maintains both a LAN
address and a WAN address.
A WAN differs from a LAN in several important ways. Most WANs
(like the Internet) are not owned by any one organization but rather
exist under collective or distributed ownership and management.
WANs tend to use technology like ATM, Frame Relay and X.25 for
connectivity over the longer distances.
Topology in Network Design
Think of a topology as a network's virtual shape or structure. This
shape does not necessarily correspond to the actual physical
layout of the devices on the network.
For example, the computers on a home LAN may be arranged in a
circle in a family room, but it would be highly unlikely to find a ring
topology there. Network topologies are categorized into the
following basic types:
• Bus
• Ring
• Star
Bus Topology

Collision in Bus
This animation starts with machine 2 and machine 5 both trying to transmit simultaneously.

Bus using Hub


An Ethernet hub changes the topology from a 'bus' to a 'star wired bus', here's how it
works
To overcome the problem of collisions and other effects on network speed, a switch is used.

Bus networks (not to be confused with the system bus of a


computer) use a common backbone to connect all devices. A single
cable, the backbone functions as a shared communication medium
that devices attach or tap into with an interface connector. A device
wanting to communicate with another device on the network sends
a broadcast message onto the wire that all other devices see, but
only the intended recipient actually accepts and processes the
message.
Ring Topology

Token Ring Operation using a Hub

In a ring network, every device has exactly two neighbors for


communication purposes. All messages travel through a ring in the
same direction (either "clockwise" or "counter clockwise"). A failure
in any cable or device breaks the loop and can take down the entire
network. To implement a ring network, one typically uses FDDI,
SONET, or Token Ring technology. Ring topologies are found in some
office buildings or school campuses.
Star Topology

Many home networks use the star


topology. A star network features a
central connection point called a "hub
node“ that may be a network hub,
switch or router. Devices typically
connect to the hub with Unshielded
Twisted Pair (UTP) Ethernet.

Compared to the bus topology, a star network generally requires


more cable, but a failure in any star network cable will only take
down one computer's network access and not the entire LAN. (If
the hub fails, however, the entire network also fails.)
Network Protocol
A computer communication protocol is a description of the rules
computers must follow to communicate with each other.
TCP/IP
TCP/IP is the communication protocol for communication between
computers on the Internet.TCP/IP stands for Transmission Control
Protocol / Internet Protocol.TCP/IP defines how electronic devices
(like computers) should be connected to the Internet, and how data
should be transmitted between them. Inside the TCP/IP standard
there are several protocols for handling data communication:
TCP (Transmission Control Protocol) communication between
applications
UDP (User Datagram Protocol) simple communication between
applications
IP (Internet Protocol) communication between computers
ICMP (Internet Control Message Protocol) for errors and statistics
DHCP (Dynamic Host Configuration Protocol) for dynamic addressing
TCP
If one application wants to communicate with another via TCP, it
sends a communication request. This request must be sent to an
exact address. After a "handshake" between the two applications,
TCP will set up a "full-duplex“ communication between the two
applications.The "fullduplex“ communication will occupy the
communication line between the two computers until it is closed
by one of the two applications.
IP
IP is for communication between computers.IP is a "connection-
less" communication protocol. IP does not occupy the
communication line between two computers. IP reduces the need
for network lines. Each line can be used for communication
between many different computers at the same time. With IP,
messages (or other data) are broken up into small independent
"packets" and sent between computers via the Internet.IP is
responsible for "routing" each packet to the correct destination.
FTP Short for File Transfer Protocol, the protocol for exchanging files
over the Internet. FTP works in the same way as HTTP for transferring
Web pages from a server to a user's browser and SMTP for
transferring electronic mail across the Internet in that, like these
technologies, FTP uses the Internet's TCP/IP protocols to enable data
transfer. FTP is most commonly used to download a file from a server
using the Internet or to upload a file to a server (e.g., uploading a
Web page file to a server).
Telnet A terminal emulation program for TCP/IP networks such as the
Internet. The Telnet program runs on your computer and connects
your PC to a server on the network. You can then enter commands
through the Telnet program and they will be executed as if you were
entering them directly on the server console. This enables you to
control the server and communicate with other servers on the
network. To start a Telnet session, you must log in to a server by
entering a valid username and password. Telnet is a common way to
remotely control Web servers.
PPP Point-to-Point Protocol, a method of connecting a computer to
the Internet. PPP is more stable than the older SLIP protocol and
provides error checking features. Working in the data link layer of the
OSI model, PPP sends the computer's TCP/IP packets to a server that
puts them onto the Internet.
GSM
Short for Global System for Mobile Communications, one of the
leading digital cellular systems. GSM uses narrowband TDMA, which
allows eight simultaneous calls on the same radio frequency.GSM
was first introduced in 1991. As of the end of 1997, GSM service was
available in more than 100 countries and has become the de facto
standard in Europe and Asia.
CDMA
Short for Code-Division Multiple Access, a digital cellular technology
that uses spread-spectrum techniques. Unlike competing systems,
such as GSM, that use TDMA, CDMA does not assign a specific
frequency to each user. Instead, every channel uses the full available
spectrum.
Individual conversations are encoded with a pseudo-random digital
sequence. CDMA consistently provides better capacity for voice and
data communications than other commercial mobile technologies,
allowing more subscribers to connect at any given time, and it is the
common platform on which 3G technologies are built.
GPRS
Short for General Packet Radio Service, a standard for wireless
communications which runs at speeds up to 115 kilobits per second,
compared with current GSM (Global System for Mobile
Communications) systems' 9.6 kilobits.GPRS, which supports a wide
range of bandwidths, is an efficient use of limited bandwidth and is
particularly suited for sending and receiving small bursts of data,
such as e-mail and Web browsing, as well as large volumes of data.
WLL Wireless local loop (WLL), is a term for the use of a wireless
communications link as the "last mile / first mile" connection for
delivering plain old telephone service (POTS) and/or broadband
Internet to telecommunications customers. Various types of WLL
systems and technologies exist.
3G
3G is an ITU specification for the third generation (analog cellular
was the first generation, digital PCS the second) of mobile
communications technology. 3G promises increased bandwidth, up
to 384 Kbps when a device is stationary or moving at pedestrian
speed, 128 Kbps in a car, and 2 Mbps in fixed applications. 3G will
work over wireless air interfaces such as GSM, TDMA, and CDMA.
The new EDGE air interface has been developed specifically to meet
the bandwidth needs of 3G.
SMTP
Short for Simple Mail Transfer Protocol, a protocol for sending e-mail
messages between servers. Most e-mail systems that send mail over
the Internet use SMTP to send messages from one server to
another; the messages can then be retrieved with an e-mail client
using either POP or IMAP. In addition, SMTP is generally used to
send messages from a mail client to a mail server. This is why you
need to specify both the POP or IMAP server and the SMTP server
when you configure your e-mail application.
POP
In computing, the Post Office Protocol (POP) is an application-layer
Internet standard protocol used by local e-mail clients to retrieve e-
mail from a remote server over a TCP/IP connection.POP and IMAP
(Internet Message Access Protocol) are the two most prevalent
Internet standard protocols for e-mail retrieval. Virtually all modern e-
mail clients and servers support both. The POP protocol has been
developed through several versions, with version 3 (POP3) being the
current standard. Most webmail service providers such as Hotmail,
Gmail and Yahoo! Mail also provide IMAP and POP3 service.
Wi-Fi
Wi-Fi is the name of a popular wireless networking technology that
uses radio waves to provide wireless high-speed Internet and
network connections. A common misconception is that the term Wi-
Fi is short for "wireless fidelity," however this is not the case. Wi-Fi
is simply a trademarked term meaning IEEE 802.11x.
WiMax
WiMAX is an IP based, wireless broadband access technology
that provides performance similar to 802.11/Wi-Fi networks
with the coverage and QOS (quality of service) of cellular
networks. WiMAX is also an acronym meaning "Worldwide
Interoperability for Microwave Access (WiMAX).WiMAX is a
wireless digital communications system, also known as IEEE
802.16, that is intended for wireless "metropolitan area
networks".
Web services
WWW
The term WWW refers to the World Wide Web or simply the Web.
The World Wide Web consists of all the public Web sites connected
to the Internet worldwide, including the client devices (such as
computers and cell phones) that access Web content. The WWW is
just one of many applications of the Internet and computer
networks.
The World Web is based on these technologies:
HTML - Hypertext Markup Language
HTTP - Hypertext Transfer Protocol
Web servers and Web browsers
Researcher Tim Berners-Lee led the development of the original
World Wide Web in the late 1980s and early 1990s. He helped build
prototypes of the above Web technologies and coined the term
"WWW." Web sites and Web browsing exploded in popularity during
the mid-1990s. Also Known As: World Wide Web, The Web
HTML
HTML is a language for describing web pages.
HTML stands for Hyper Text Markup Language
HTML is not a programming language, it is a markup language
XML
XML stands for Extensible Markup Language
XML is a markup language much like HTML
XML was designed to carry data, not to display data
XML tags are not predefined. You must define your own tags
XML is designed to be self-descriptive
XML is a W3C Recommendation
HTTP
HyperText Transfer Protocol, the underlying protocol used by the World
Wide Web. HTTP defines how messages are formatted and
transmitted, and what actions Web servers and browsers should take
in response to various commands. For example, when you enter a URL
in your browser, this actually sends an HTTP command to the Web
server directing it to fetch and transmit the requested Web page.
DNS
The Domain Name System (DNS) is the way that Internet domain
names are located and translated into Internet Protocol addresses. A
domain name is a meaningful and easy-to-remember "handle" for an
Internet address.
URL stands for Uniform Resource Locator. A URL is a formatted text
string used by Web browsers, email clients and other software to
identify a network resource on the Internet. Network resources are
files that can be plain Web pages, other text documents, graphics, or
programs. URL strings consist of three parts (substrings):
Network protocol
Host name or address
File or resource location
These substrings are separated by special characters as follows:
protocol :// host / location
Website
A website is a collection of web pages (documents that are accessed
through the Internet), such as the one you're looking at now. A web
page is what you see on the screen when you type in a web address,
click on a link, or put a query in a search engine. A web page can
contain any type of information, and can include text, color, graphics,
animation and sound.
Web Browser
A web browser is a computer program designed to read HTML or PHP
code, presenting it as web pages we are all used to. The web browsers
are based on different browser engines, which read HMTL and PHP
code and present it as an end result. Web browsers exist since the
1980s and are being constantly developed and upgraded to provide
the user with faster loading times, more stable web pages and better
looking websites. The most popular web browsers today are Internet
Explorer, Mozilla Firefox, Safari, Opera, Google Chrome.
Web Server
Web server can refer to either the hardware (the computer) or the
software (the computer application) that helps to deliver Web content
that can be accessed through the Internet. The most common use of
web servers is to host websites, but there are other uses such as
gaming , data storage or running enterprise Applications. Example of
webserver are Apache,IIS
Web Hosting
A web hosting service is a type of Internet hosting service that allows
individuals and organizations to make their website accessible via the
World Wide Web. Web hosts are companies that provide space on a
server owned or leased for use by clients, as well as providing
Internet connectivity, typically in a data center.
Web Script
Web script, a computer programming language for adding dynamic
capabilities to World Wide Web pages. Web pages marked up with
HTML (hypertext markup language) or XML (extensible markup
language) are largely static documents.
Client Side Scripting
A small program that is run on the user's machine. For example, VB
Script,JavaScript scripts are widely used on Web pages that are
executed in the client machine
Server Side Scripting
A small program run on the server that automates or controls certain
functions or links one program to another. On the Web, a CGI
script,VB Script and JSP are example of a server-side script.
Web 2.0
Web 2.0 is a concept that takes the network as a platform for
information sharing, interoperability, user-centered design, and
collaboration on the Internet or World Wide Web. A Web 2.0 site
allows users to interact and collaborate with each other . Examples of
Web 2.0 include social networking sites, facebook,google+,twitter etc.
Open Source Software

Open-source software (OSS) is computer software that is available in


source code form: the source code and certain other rights normally
reserved for copyright holders are provided under an open-source
license that permits users to study, change, improve and at times
also to distribute the software. Open source software is very often
developed in a public, collaborative manner. Open-source software
is the most prominent example of open-source development and
often compared to (technically defined) user-generated content or
(legally defined) open content movements. Example
Linux,MYSQL,Fedora Core,UNIX
Advantages
•Mostly software free or less cost.
•Right to use the software in any way.
•No single entity on which the future of the software depends.
•No per-copy fees can be asked for modified versions.
•Availability of the source code and the right to modify it.
Disadvantages
•Mostly used commercial applications.
•Security bugs
•Support issues
Freeware
Freeware is software that is available for use at no cost or for an
optional fee,but usually with one or more restricted usage rights.
Freeware is in contrast to commercial software, which is typically
sold for profit, but might be distributed for a business or commercial
purpose in the aim to expand the marketshare of a "premium"
product. According to the Free Software Foundation, "freeware" is a
loosely defined category and it has no clear accepted definition,
although FSF says it must be distinguished from free software (libre).
Example Adobe reader , Skype,Microsoft V-Chat,X-Lite etc.
Shareware
Shareware is proprietary software that is provided to users without
payment on a trial basis and is often limited by any combination of
functionality, availability (it may be functional for a limited time
period only). Shareware is usually offered either with certain features
only available after the license is purchased .
Example Kaspersky Antivirus ,Wondershare
FLOSS
Free and open-source software (F/OSS, FOSS) or free/libre/open-
source software (FLOSS) is software that is both free software and
open source. It is liberally licensed to grant users the right to use,
copy, study, change, and improve its design through the availability of
its source code. In the context of free and open-source software, free
refers to the freedom to copy and re-use the software, rather than to
the price of the software. The Free Software Foundation, an
organization that advocates the free software model.
GNU GNU is a recursive acronym for "GNU's Not Unix!", chosen
because GNU's design is Unix-like, but differs from Unix by being free
software and containing no Unix code. Programs released under the
auspices of the GNU Project are called GNU packages or GNU
programs. The system's basic components include the GNU Compiler
Collection (GCC), the GNU Binary Utilities (binutils), the bash shell,
the GNU C library (glibc), and GNU Core Utilities (coreutils). GNU
developers have contributed Linux ports of GNU applications and
utilities, which are now also
FSF
The Free Software Foundation (FSF) is a non-profit organization
founded by Richard Stallman on 4 October 1985 to support the free
software movement, a movement which aims to promote the
universal freedom to create, distribute and modify computer
software,with the organization's preference for copyleft, such as
with its own GNU General Public License, being used to license
software whose modifications retain these permissions.

OSI
Open Source Initiative Abbreviated OSI, a non-profit organization
that promotes the integrity of the open source definition by
certifying products with the OSI Certified Open Source Software
mark. OSI is comprised of board members who make up its
directorship and is not a membership organization.
Network Security
Threat

A computer threat MIGHT include a Trojan, virus, spyware, back-


doors etc. each has its own meaning.
Virus

A computer virus is a computer program that can copy itself and


infect a computer without the permission or knowledge of the
owner.
Worm

A computer worm is a standalone malware computer program that


replicates itself in order to spread to other computers. Often, it uses
a computer network to spread itself. This is due to security
shortcomings on the target computer. Unlike a computer virus, it
does not need to attach itself to an existing program. Worms almost
always cause at least some harm to the network, even if only by
consuming bandwidth, whereas viruses almost always corrupt or
modify files on a targeted computer.
Trojan Horse

The Trojan horse, also known as trojan, in the context of computing


and software, describes a class of computer threats (malware) that
appears to perform a desirable function but in fact performs
undisclosed malicious functions that allow unauthorized access to
the host machine, giving them the ability to save their files on the
user's computer or even watch the user's screen and control the
computer.
Spyware

Spyware is computer software that is installed surreptitiously on a


personal computer to collect information about a user, their
computer or browsing habits without the user's informed consent.
Virus Prevention Tips
•Do not open any files attached to an email from an unknown or
suspicious sender or any unknown files found on the Internet.
•Do not download any files from strangers.
•Delete chain emails and junk email.
•Do not forward or reply to any to them. These types of email are
considered spam.
•Exercise caution. When downloading files from the Internet ensure
that the source is a legitimate and reputable one. Always have your
antivirus turned on and updated.
•Update your antivirus software regularly. Ensure that your antivirus
and firewall are set to use automatic updates.
•Back up your files on a regular basis.
•Follow up on your suspicions. If you find a suspicious file on you
computer you scan it with multiple antivirus scanners to determine if
it is a threat or not.
A message given to a Web browser by a Web server. The browser
stores the message in a text file.
Cookies

The main purpose of cookies is to identify users and possibly prepare


customized Web pages for them. When you enter a Web site using
cookies, you may be asked to fill out a form providing such
information as your name and interests. This information is packaged
into a cookie and sent to your Web browser which stores it for later
use. The next time you go to the same Web site, your browser will
send the cookie to the Web server. The server can use this
information to present you with custom Web pages. So, for example,
instead of seeing just a generic welcome page you might see a
welcome page with your name on it.
Firewall

A system designed to prevent unauthorized access to or from a


private network. Firewalls can be implemented in both hardware and
software, or a combination of both. Firewalls are frequently used to
prevent unauthorized Internet users from accessing private networks
connected to the Internet, especially intranets.
Cyber Law
When Internet was developed, the founding fathers of Internet
hardly had any inclination that Internet could transform itself into an
all pervading revolution which could be misused for criminal
activities and which required regulation. Today, there are many
disturbing things happening in cyberspace. Due to the anonymous
nature of the Internet, it is possible to engage into a variety of
criminal activities with impunity and people with intelligence, have
been grossly misusing this aspect of the Internet to perpetuate
criminal activities in cyberspace. Hence the need for Cyberlaws in
India.
Cyber Crime

In Simple way we can say that cyber crime


is unlawful acts wherein the computer is
either a tool or a target or Both Cyber
crimes can involve criminal activities that
are traditional in nature, such as theft,
fraud, forgery, defamation and mischief, all
of which are subject to the Indian Penal
Code. The abuse of computers has also
given birth to a gamut of new age crimes
that are addressed by the Information
Technology Act, 2000.
The Computer as a Target :-using a computer to attack other computers.
e.g. Hacking, Virus/Worm attacks, DOS attack etc.
The computer as a weapon :-using a computer to commit real world
crimes. e.g. Cyber Terrorism, IPR violations, Credit card frauds, EFT
frauds, Pornography etc.Cyber Crime regulated by Cyber Laws or
Internet Laws.
IPR Issue

IPR stands for Intellectual Property Rights. IPR was divided into 7
main branches under the TRIPS agreement (Trade Related Aspects of
Intellectual Property Rights).
These branches are:-
1) Patents
2) Copyrights
3) Trademarks
4) Geographical Indications
5) Integrated Circuits and Design Layouts
6) Designs
7) Confidential Information(Trade secrets)
Hacking

Hacker is a term used by


some to mean "a clever
programmer" and by
others, especially those in
popular media, to mean
"someone who tries to
break into computer
systems."
•A person who enjoys learning details of a programming
language or system
•A person capable of appreciating someone else's hacking
•A person who picks up programming quickly
VoIP

VoIP (voice over IP) is an IP telephony term for a set of facilities used to
manage the delivery of voice information over the Internet. VoIP
involves sending voice information in digital form in discrete packets
rather than by using the traditional circuit-committed protocols of the
public switched telephone network (PSTN). A major advantage of VoIP
and Internet telephony is that it avoids the tolls charged by ordinary
telephone service.
Voice over Internet Protocol (VoIP), is a technology that allows you to
make voice calls using a broadband Internet connection instead of a
regular (or analog) phone line. Some VoIP services may only allow you
to call other people using the same service, but others may allow you to
call anyone who has a telephone number - including local, long distance,
mobile, and international numbers. Also, while some VoIP services only
work over your computer or a special VoIP phone, other services allow
you to use a traditional phone connected to a VoIP adapter.
How VoIP / Internet Voice Works
VoIP services convert your
voice into a digital signal that
travels over the Internet. If
you are calling a regular phone
number, the signal is
converted to a regular
telephone signal before it
reaches the destination. VoIP
can allow you to make a call
directly from a computer, a
special VoIP phone, or a
traditional phone connected to
a special adapter. In addition,
wireless "hot spots" in
locations such as airports,
parks, and cafes allow you to
connect to the Internet and
may enable you to use VoIP
service wirelessly.
What Kind of Equipment Do I Need?
A broadband (high speed Internet) connection
is required. This can be through a cable modem, or
high speed services such as DSL or a local area
network.
A computer, adaptor, or specialized phone is
required. Some VoIP services only work over your
computer or a special VoIP phone, while other services
allow you to use a traditional phone connected to a VoIP
adapter. If you use your computer, you will need some
software and an inexpensive microphone. Special VoIP
phones plug directly into your broadband connection
and operate largely like a traditional telephone. If you
use a telephone with a VoIP adapter, you'll be able to
dial just as you always have, and the service provider
may also provide a dial tone.

You might also like