You are on page 1of 4

NET WORKING PROTOCOLS

NETWOR TCP/IP TCP/IP is a set of layered protocols used for communication over the
KING Internet. The communication model of this suite is client-server model.
PROTOC A computer that sends a request is the client and a computer to which
OLS the request is sent is the server.
FTP FTP is a client-server protocol, with which a client requests a file and the
server supplies it. Clients request files through the command channel
and receive access to download, edit and copy the file, among other
actions, through the data channel.
PPP It is a byte - oriented protocol that is widely used in broadband
communications having heavy loads and high speeds. Point Protocol
(PPP) is a communication protocol, that is used to transmit
multiprotocol data between two directly connected (point-to-point)
computers.
HTTP HTTP is a file sharing protocol, although HTTP primarily works over web
browsers. When a user enters a website domain and aims to access it,
HTTP provides the access. HTTP connects to the domain's server and
requests the site’s webpages.
HTTPS Another form of HTTP is HTTPS, which stands for HTTP over Secure
Sockets Layer or HTTP Secure. This provides more security to users and
can prevent common cybersecurity threats.
SMTP SMTP is the most popular email protocol and controls how email clients
send users' email messages. Email servers use SMTP to send email
messages from the client to the email server to the receiving email
server.
POP3 used for electronic messaging across the Internet. POP3 is a protocol
that involves both a server and a client. A POP3 server receives an e-mail
message and holds it for the user. A POP3 client application periodically
checks the mailbox on the server to download mail. POP3 does not
allow a client to send mail, only to receive it.
REMOTE Telnet is designed for remote connectivity, and it establishes
LOGIN(TE connections between a remote endpoint and a host machine to enable a
LNET) remote session.
WIRELES GSM GSM stands for Global System for Mobile communications. GSM is one
S& of the most widely used digital wireless telephony system. Any GSM
MOBILE handset with a SIM (Subscriber Identity Module) card can be used in any
COMM. country that uses this standard. Every SIM card has a unique
PROTOC identification number. It has memory to store applications and data like
OL phone numbers, processor to carry out its functions and software to
send and receive messages
GPRS GPRS is the mobile communication protocol used by second (2G) and
third generation (3G) of mobile telephony. It pledges a speed of 56 kbps
to 114 kbps, however the actual speed may vary depending on network
load. GPRS stands for General Packet Radio Services. It is a packet based
wireless communication technology that charges users based on the
volume of data they send rather than the time duration for which they
are using the service.
WLL WLL stands for Wireless in Local Loop. It is a wireless local telephone
service that can be provided in homes or offices. The subscribers
connect to their local exchange instead of the central exchange
wirelessly. Using wireless link eliminates last mile or first mile
construction of network connection, thereby reducing cost and set up
time. As data is transferred over very short range, it is more secure than
wired networks.
CHAT & VOIP Voice over Internet Protocol (VoIP), also called IP telephony, is a
VIDEO method and group of technologies for the delivery of voice
CONFER communications and multimedia sessions over Internet Protocol (IP)
ENCING networks, such as the Internet.

WIRE LESS TECHNOLOGIES


Sr. Key Wifi WiMax
No.

Definition Wifi stands for Wireless Fidelity. WiMax stands for Wireless
1 Inter-operability for Microwave
Access.

Usage WiFi uses Radio waves to create WiMax uses spectrum to


wireless high-speed internet and deliver connection to network
2
network connections. A wireless and handle a larger inter-
adapter is needed to create hotspots. operable network.

Usage Wifi is used in LAN applications. WiMax is used in MAN


4
applications.

Network Wifi network ranges at max 100 WiMax network ranges to max
6
Range meters. 90 kms.

Transmission Wifi transmission speed can be upto 54 WiMax transmission speed can
7
speed mbps. be upto 70 mbps.

NETWORK AND SECURITY CONCEPTS

Identity Theft Identity theft is the deliberate use of someone else's identity, usually as a
method to gain a financial advantage or obtain credit and other benefits
in the other person's name, and perhaps to the other person's
disadvantage or loss.
Cyberstalking Cyberstalking is the use of the Internet or other electronic means to stalk
or harass an individual, a group of individuals, or an organization.
It may include the making of false accusations or statements of fact (as in
defamation), monitoring, making threats, identity theft, damage to data
or equipment, the solicitation of minors for objectionable activities, or
gathering information that may be used to harass.

Cyberbullying Cyberbullying is the attack upon an individual or group through the use
of electronic means such as instant messaging, social media, e-mail and
other forms of online communication with the intent to abuse,
intimidate, or overpower.

Internet Troll A troll is a person who starts quarrels or upsets people on the Internet to
distract and sow discord by posting inflammatory and digressive,
extraneous, or off-topic messages in an online community (such as a
newsgroup, forum, chat room, or blog) with the intent of provoking
readers into displaying emotional responses and normalizing tangential
discussion, whether for the troll's amusement or a specific gain.

Phishing Phishing is a type of scam where the scammers disguise as a trustworthy


source in attempt to obtain private information such as passwords, and
credit card information, etc. through the Internet.
Phishing often occurs through emails and instant messaging and may
contain links to websites that direct the user to enter their private
information.
These fake websites are often designed to look identical to their
legitimate counterparts to avoid suspicion from the user.

Virus
• A virus is a software program, capable of reproducing itself and usually capable of
causing great harm to files/other programs on the same computer. A true virus
cannot spread to other computer without human assistance.
Worm
• Worm is a software program capable of reproducing itself, that can spread from one
computer to the next over a network. Worms take advantage of automatic file
sending and receiving features found on many computers.
Trojan Horse
• Trojan Horse is a program that appears desirable but actually contains something
harmful. The contents of a Trojan can be a virus or a worm.

Spams
unsolicited usually commercial messages (such as e-mails, text messages, or Internet
postings) sent to a large number of recipients or posted in a large number of places

Difference Between
Hub Switch
Broadcasts information to each node on Sends data to only that device which
the network needs it. Does not broadcast
Many chances of collision and network Very less chances of congestion and
congestion collision of data.

DIFFERENCES BETWEEN
Router Bridge
Connects networks having different Connects networks following same
protocols. protocol.
Uses IP addresses to forward data. Uses MAC address to send data.

Uses routing table to send data Does not use any such table

You might also like