You are on page 1of 12

Date: Roll Number:

TASK 4
Network configuration & software installation-Configuring TCP/IP, Proxy and firewall
settings, Installation applications software, system software &Tools
Internet :
 Internet is a global collection of computers connected to one other by way of
transmission of signal through terrestrial as well as microwave lines .
 This global network links thousand s of computers at universities ,research
institutions, government agencies and business houses throughout the world .
 Using a small PC at your home and a telephone collection ,you can access
information from any place in the world through internet .
 Messages or Information sent or received on internet in the form of files .To
exchange information on internet ,the computers connected to internet must be able
to communicate with one another .
 This is done using a language called the Transmission control protocol /Internet
Protocol(TCP/IP).This protocol acts as a medium of communication among
numerous internet computers .
Scope Of Internet:
 Electronic mail
 Information store house
 Software and Programs
 Entertainment
 Online shopping/Electronic Commerce
Equipment Requirement for an Internet Connection:
 Computer
 Telephone Line
 Modem
 Internet Service Provider(ISP)
 Web browser
Transmission Media
Twisted Pair:A twisted pair consists of two insulated copper wires arranged in a regular
spiralpattern. A wire pair acts as a single communication link. Typically, a number ofthese
pairs are bundled together into a cable by wrapping them in a tough protectivesheath. Over
longer distances, cables may contain hundreds of pairs. The twistingtends to decrease the
crosstalk interference between adjacent pairs in a cable.Neighboring pairs in a bundle
typically have somewhat different twist lengths to reducethe crosstalk interference. On long-
distance links, the twist length typicallyvaries from 5 to 15 cm. The wires in a pair have
thicknesses of from 0.4 to 0.9 mm.
Coaxial Cable:Coaxial cable, like twisted pair, consists of two conductors, but is
constructeddifferently to permit it to operate over a wider range of frequencies. It consists of
a hollow outer cylindrical conductor that surrounds a single inner wire conductor.Coaxial
cable is perhaps the most versatile transmission medium and is enjoyingwidespread use in a
wide variety of applications. The most important of these are
1. Television distribution
2. Long-distance telephone transmission
3. Short-run computer system links
4. Local area networks
Optical Fiber:An optical fiber is a thin (2 to), flexible medium capable of guiding anoptical
ray. Various glasses and plastics can be used to make optical fibers. The lowestlosses have
been obtained using fibers of ultrapure fused silica. Ultrapure fiber is125 _m difficult to

56
Date: Roll Number:

manufacture; higher-loss multicomponent glass fibers are more economicaland still provide
good performance. Plastic fiber is even less costly and can be
used for short-haul links, for which moderately high losses are acceptable. An optical fiber
cable has a cylindrical shape and consists of three concentric.
Network:
A network is a group of interconnected systems sharing services and interacting by means
of shared communication link.
Networks are of 3 types :
LAN  Local area network (LAN) is privately owned and links the devices in a single
office, building or campus. LAN is limited to a few kilometers in size.
MAN  A metropolitan area network (MAN) is a network with a size between a local
area network (LAN) and a wide area network (WAN). It normally covers the area inside
a town or a city.
WAN  A wide area network (WAN) provides long- distance transmission of data,
image, audio, and video information over large geographical areas that may comprise a
country, a continent, or even the whole world.
Topology: Well known connection with in an area. Types of topology
Bus Topology
Tree Topology
Mesh Topology
Ring Topology
Star Topology
Hybrid Topology
ROUTERS: In a common configuration, routers are
used to create larger networks by joining two network
segments. Like bridges, routers are devices whose
primary purpose is to connect two or more networks and
to filter network signals so that only desired information
travels between them. They also have another important
capability: they are aware of many possible paths across
the network and can choose the best one for each data
packet to travel. Routers operate primarily by examining incoming data for its network
routing and transport information
GATEWAYS: Gateways make communication possible between different architectures and
environments. They repackage and convert data going from one environment to another so
that each environment can understand the other‘s environment data. A gateway repackages
information to match the requirements of the destination system. Gateways can change the
format of a message so that it will conform to the application program at the receiving end of
the transfer. A gateway links two systems that do not use the same:
1 Communication protocols
2 Data formatting structures
3 Languages
4 Architecture
HUB:
Hubs are used in networks that use twisted-pair cabling to connect
devices. Hubs can also be joined together to create larger networks.
Hubs are simple devices that direct data packets to all devices
connected to the hub, regardless of whether the data package is
destined for the device. This makes them inefficient devices and can
create a performance bottleneck on busy networks. In its most basic

57
Date: Roll Number:

form, a hub does nothing except provide a pathway for the electrical signals to travel along.
Such a device is called a passive hub.
BRIDGES: A bridge is a device that connects two or more local area networks, or two or
more segments of the same network. You can use a bridge to connect these two networks so
that they can share information with each other. In addition to connecting networks, bridges
perform an additional, important function. Possible for bridges to connect networks with
different physical and data link level protocols.
Types of Bridges Three types of bridges are used in networks:
Transparent bridge:derives its name from the fact that the
devices on the network are unaware of its existence. A transparent
bridge does nothing except block or forward data based on the
MAC address.
Source route bridge :Used in Token Ring networks. The source
route bridge derives its name from the fact that the entire path that
the packet is to take through the network is embedded within the packet.
Translational bridge:Used to convert one networking data format to another; for example,
from Token Ring to Ethernet and vice versa.
NIC:
NIC stands for Network Information Card. In computer networking, a NIC provides the
hardware interface between a computer and a network. A NIC technically is network adapter
hardware in the form factor of an add-in card such as a PCI and PCMCIA cards. Some NIC
cards work with wired connections while others are wireless. Most NICs support either wired
Ethernet or Wi-Fi wireless standards. Ethernet NICs plug into the system bus of the PC and
include jacks for network cables, while Wi-Fi NICs contain built-in transmitters
/ receivers (transceivers).
Bluetooth:
It is a wireless technology is a short-range communications technology intended
to replace the cables connecting portable and/or fixed devices while maintaining
high levels of security. The Bluetooth core system consists of an RF transceiver,
baseband, and protocol stack. The system offers services that enable the connection of
devices and the exchange of a variety of data classes between these devices.The key features
of Bluetooth technology are robustness, low power, and low cost. The Bluetooth specification
defines a uniform structure for a wide range of devices to connect and communicate with
each other. It creates a radio link between hardware devices. For example a laptop can
communicate with a headset or other peripheral device.
Wireless Technology
Wireless technology has enabled individuals to communicate
via cell phones, PDA‘s, portable radios, email and wireless Internet
devices. Whether you are in a meeting, on the golf course or
vacationing in Peru, wireless technology allows you to communicate
with business partners, administrators or family members. Wireless
technology has transformed the way business is conducted in virtually
every job profession. Individuals from government agencies, school
districts, banks and delivery services use wireless technology to conduct business and
transactions on a daily basis. Wireless technology has improved the timelessness of
communications, but has significantly hindered the privacy of these individuals
Modems: It is used on dialup network convert data between the
analog form used on telephone lines and the digital form used on
computers. Standard dial-up network modems transmit data at a
maximum rate of 56,000 bits per second (56 Kbps). However,

58
Date: Roll Number:

inherent limitations of the public telephone network limit modem data rates to 33.6
Kbps or lower in practice. The most common use for modems is for both sending and
receiving of the digital information between personal computers. This information used
to be transmitted over telephone lines using V.92, the last dial-up standard, to an
analog modem that would convert the signal back to a digital format for a computer to
read.
DSL - Digital Subscriber Line
DSL is a high-speed Internet service like cable Internet. DSL provides high-speed
networking over ordinary phone lines using broadband modem technology. DSL technology
allows Internet and telephone service to work over the same phone line without requiring
customers to disconnect either their voice or Internet connections. DSL technology
theoretically supports data rates of 8.448Mbps, although typical rates are 1.544 Mbps or
lower. DSL Internet services are used primarily in homes and small businesses. DSL Internet
service only works over a limited physical distance and remains unavailable in many areas
where the local telephone infrastructure does not support DSL technology.
Internet Terminology:
TCP/IP:
It is a protocol suite that is designed specially for the internet .Basically, the TCP/IP
handles
Network communications between network nodes .This suite is actually composed of several
protocols including IP.
URL:
A URL (Uniform Resource Locator) is the address of a resource accessible on the
Internet.
Here is an example: http:// www.google.com
HTTP:
Hyper Text Transfer Protocol used by the World Wide Web .The main task of HTTP is
deals with the messages format and transmission and what actions web servers and
browsers should take in response to various commands .
For example : when you enter a URL in your browser ,this actually send s an HTTP
command to the web server ( a computer where web pages reside ) directing it to fetch
and transmit the requested web page.
HTML:
Hyper Text Mark Up Language, is a computer language used to create web pages in
internet
IP address:
An identifier for a computer or device on a TCP/IP network .Networks using the
TCP/IP protocol route messages based on the IP address of the destination. The format of
an IP address is a 32 –bit numeric address written as a four numbers separated by
periods .Each number ranges from 0 to 255.
Creating a new Internet Connection :
Step 1: Select My network places -> right click -> select Properties

59
Date: Roll Number:

Step 2 : Displaying Network connections Dialog box then select create new connection

Step 3 : It will displays Net connection wizard dialog box then select Next button

Step4 : Select Connect to the Internet then press Next button

Step 5 : Select Set up my connection manually then press Next button

Step 6 : select Connect using a dial up modem then press Next

60
Date: Roll Number:

Step 7 : Then give the name of the ISP name which you like then press Next button

Step 8: Then enter the phone number , press Next button

Step 9 : Enter the username , password and confirm password , press Next

Step 10: Then Put a check mark to short cut option to display the icon on desktop , press
Finish button

Step 11: Now the internet connection is created and the shortcut is displayed on the Desktop

61
Date: Roll Number:

TASK 5:
Internet and World Wide Web: Search engines, Types of search engines,
netiquette, cyber hygiene
Aim: To know and use of search engine
Requirements: Desired configuration for the above task is:
 The configured personal computer system
 LAN and internet facility
Software: Licensed version of windows XP
Search Engine:
A search Engine is a software program that searches a particular piece of information ,
according to the specified criteria .
We all known amount of information available on the web is huge.
It is not an easy task to keep track of all the web sites present on the web.
Most of us are not even aware of the names of the sites available on net. Even if we know the
names of few sites, it is quite possible that we do not remember them tomorrow.
Today, there are number of sites that let you specify the criteria of your search and
immediately you provided with a list of sites matching the criteria.
In a survey conducted by Nielsen /Net ratings, it was found for that the year 2002, the two
most popular search engines for navigating the web were – Yahoo and MSN.

Some other popular search engines are Google, Alta Vista, Look Smart and Nescape etc.
Some of the search engines are shown below:

Components of a Search Engine:


There are three components that work together to provide us with the search results.
They are – the Robot, the Database and Search Form

62
Date: Roll Number:

Robot:
Also known as Spider or Bot, this is a program that automatically navigates the various
hypertext structures on the web. It makes a move like a robot spider and retrieves and lists
the various web pages .
Database :
A data base is a repository to store and manage the information .Oracle ,Microsoft SQL
server are some of the databases management system that are used to configure and
manage the database.
Search form:
This is an interactive form, which is used by a visitor to make a request for some information.
This mainly consists of textbox and submit button.

CYBER HYGIENE
A computer virus is a program or piece of code that is loaded onto your computer
without your knowledge and runs against your wishes. Viruses can also replicate themselves.
All computer viruses are man-made.
These malicious little programs can create files, move files, erase files, consume your
computer's memory, and cause your computer not to function correctly. Some viruses can
duplicate themselves, attach themselves to programs, and travel across networks. In fact
opening an infected e-mail attachment is the most common way to get a virus.
Categories of computer viruses:
The three broad categories of viruses are
1. File Infectors
2. System Infectors
3. Macro viruses
File Infectors:
Some file infector viruses attach themselves to program files while some can infect
any program for which execution is requested. When the program is loaded, the virus is
loaded as well. Other file infector viruses arrive as wholly-contained programs or scripts sent
as an attachment to an e-mail note.
System Infectors:
These viruses infect executable code found in certain system areas on a disk. They
attach to the DOS boot sector on diskettes or the Master Boot Record on hard disks. A typical
scenario is to receive a diskette from an innocent source that contains a boot disk virus.
Macro viruses:
These are the most common viruses, and they tend to do the least damage. Macro
viruses infect our Microsoft Word application and typically insert unwanted words or
phrases.
We all know it's hard enough to get a computer to work well when it is healthy, let
alone when it has been attacked by a virus. Therefore, it is better to prevent an attack than to
try and cure it.
Anti-virus:
Anti-virus is the name given to software that detects and (where possible) removes
viruses from messages. By removing viruses at the email server, all internal mail clients are
protected AND all customers are protected from receiving viruses too.
Computer Viruses are written by people who wish to gain control of your system
resources and are continually updated to try and break through any barriers you may have
installed.

63
Date: Roll Number:

GMS Anti-Virus overcomes this issue by providing a "signature file" update service which
ensures that all new variants are caught as soon as possible.
There are many antivirus programs available that scan incoming files for viruses
before they can cause damage to your computer.
McAfee http://www.mcafee.com/
Norton http://www.symantec.com/
ESET NOD32 http://www.eset.com/
Quick Heal http://www.quickheal.co.in/
Kaspersky http://www.kaspersky.com/
Webroot http://www.webroot.com/
F-Secure http://www.f-secure.com/
G Data
Trend Micro http://us.trendmicro.com/us/home/
Avast! http://www.avast.com/
Zone Alarm http://www.zonealarm.com/
PC Tools Antivirus
Vipre Antivirus
K7 Antivirus
Norman Antivirus
CA Antivirus
F-Prot Antivirus
How to install Kaspersky Antivirus:
Step1: First of all, you need to download Kaspersky Antivirus. Make sure to save the setup
file on your computer and then open the file, the following picture will give you an idea about
the setup icon:

We advise you to close all other applications before continuing


Step2: Open the setup file, now you‘ll see a window that that says "Welcome to
Kaspersky Anti-Virus 2010 Setup Wizard". This wizard will install Kaspersky Anti-
Virus 2010 (9.0.0.463) on your computer. Click on the "Next" button to continue.

Here, Click Next to continue installation. Click Cancel to exit Setup Wizard
Select "Custom installation" if you want to change settings during the installation
(this is recommended for advanced users)
Step3: Read the license agreement carefully and if you agree with all terms and conditions
listed, click on the "I agree" button to continue.

64
Date: Roll Number:

Step4: Again, a second window tells you to read the following terms of participation in
Kaspersky Security Network. If you agree with all of these terms make sure to check the little
box called "I accept the terms of participation in Kaspersky Security Network" and click on
"Install" button.

Step5: The antivirus will start to install on your computer and it may take a minute or two
depending on your computer performance (it took approximately 2-3 minutes), in the
meantime you will probably see a temporary window that says "Installation in progress".

Step6: Finally after the temporary installation window closes you will see a window that asks
you to activate the application. Since we don't have a commercial license yet, we want to test
the application for a full 30 days trial before buying the antivirus. So, choose the second radio
button called "Activate trial license" and then to click on the "Next" button.

Step7: You need to have an available Internet connection since the antivirus will
connect to the license server and ask for a 30 days trial license. In a couple of seconds
you should see a message that says: "Activation procedure completed - Key file is
successfully installed". So you can test now this antivirus for 30 days. To continue
choose "Next".

Step8: The installation is complete, however there is something that you need to do before
scanning your computer or benefit from all features of this antivirus. In the following window
make sure that the box "Start Kaspersky Anti-Virus" is checked and then click on "Finish"
button.

65
Date: Roll Number:

When Kaspersky Antivirus will run for the first time, you will notice a "pop-up" window that
displays a warning message: "Databases are obsolete" - "Update now". You may ignore this
message as we are going to update the antivirus databases right away.

Step9: Here it is, Kaspersky Antivirus running for the first time on your PC. As you can see it
is a large red bar that warns you: "Your computer security is at risk - Databases are obsolete" and
you need to click on the "Fix it now" button or choose to go to "My Update Center" as this is
going to the same place - to the place where you can update your antivirus database
manually.

Step10: Now if you clicked on the "Fix it now" button or (on "My Update Center" you will see
a small link that says: "Start Update" click on "Start Update" ) the Update will start on your
computer and it will end when you will see 100% completed.

66
Date: Roll Number:

Step11: To start a full scan click on the left panel on the second tab called "Scan My
Computer" and you should see a group of tasks. You need to click on the first one
called "Start Full Scan" and the antivirus is going to start scanning all your files and
folders from your computer, and takes a couple of hours if your hard drive is large and
you have a lot of files and folders.

Step12: if you click on the "Default values" button it will modify them but I am
recommending you to select all of them since it will increase your protection level, just
check the "Select all" box. Again, press on the "Next" button to continue with our
configuration.

67

You might also like