You are on page 1of 26

COMPUTER

NETWORKS - II
DIMPLE THRESIA BENNY
Table of contents
01 02
Internetworking
Wireless/Mobile Terms and Concepts
Computing
Technologies
03 04
Network Security Viruses
Options
01
Wireless/mobile computing
technologies
SMS CHAT
•SHORT MESSAGE SERVICE
•NO IMAGE OR GRAPHICS •MOST FANTASTIC THING ON
•FIXED NO OF ALPHA- INTERNET
NUMERICS •SENDER
•SMSC TO HLR (STATUS) •SENDERS SCREEN
•RECIEVER’S SCREEN
•RECIEVER

Video conferencing Voice over internet protocol(VoIP)


•Voice into data packets
•A two way videophone conservation •Transmitted over data networks
among multiple participants. •Converted back to voice at
•Eg-skype,botim end(packet switching technology).
Connecting wirelessly to internet
WIFI
●Wireless fidelity
●Direct line connection
●Hotspot-venue that offers
wi-fi-access(library ,
airports)
●When you create LAN by
using Wi-Fi (WLAN)
Connecting wirelessly to internet
WiMAX
●Wireless digital
communication
●Needs a base station
●Uses microwave link to
establish a connection
02
Internetworking Terms and concepts
WWW (world wide web)
●Set of protocols that allows to access any document on net
through a naming system based on URLs
●User friendly
●Multimedia documents
●Hypertext and hyperlinks
●Interactive
●frames
TELNET
• Telnet is like a digital way to "visit" another computer or device over
the internet.
• It lets you see and control that computer as if you were sitting in
front of it, typing on its keyboard.
• People use Telnet for tasks like giving commands to remote machines
or checking on them
• But it's not very private or secure, so it's not used as much nowadays.
• SESSION
• i)Run telnet client
• ii)Connect to telnet site
• iii)start browsing
• Finally disconnect
1. Web Browser: A web browser is a software application access on the internet.
that allows users to access and view websites,
displaying text, images, videos, and other content from 4. Web Addresses (URLs)**: Web addresses, also known as
web servers. Uniform Resource Locators (URLs), are unique text
strings that specify the location of web resources on the
2. Web Server: A web server is a computer or software internet, including web pages, documents, or
system that stores and delivers web content to users' multimedia files.
browsers when requested, processing HTTP requests
and serving web pages. 5. Web Pages: Web pages are individual documents or files
containing content such as text, images, and hyperlinks,
3. Websites: Websites are collections of web pages which can be accessed and displayed in web browsers
organized under a common domain or URL, providing when users visit a website.
information, services, or interactive content for users to
URL and Domain names
URL-uniform resource locator specifies distinct address for each location.
DOMAIN NAME-name or address of server
DNS SERVER
Understanding Web Terminology
• Web Page: A single document on the internet that can contain
text, images, and links.
• Web Hosting: A service that stores and delivers website
content to users' browsers.
• Web 2.0: A term used to describe dynamic and interactive
websites, often involving user participation and social
features.
• Web 3.0: An evolving concept representing the next generation
of the internet, emphasizing AI, semantic data, and advanced
user experiences.
• HTML (Hypertext Markup Language): The standard language
for creating web pages, defining the structure and content.
• XML (Extensible Markup Language): A markup language
used for sharing structured data over the web.
• DHTML (Dynamic HTML): A combination of technologies
used to create interactive and animated web content.
WEB SCRIPTING
(The process of creating or embedding scripts in a web page)

Client-Side Scripting
- Code runs in the user's web browser
- Used for interactive web pages and
user interface enhancements.

Server-Side Scripting
- Code runs on the web server
- Used for processing data, interacting
with databases, and generating dynamic
web content.
03
Networking Security Concepts
Network Protection Methods
1. Authentication:
- Verifies the identity of users or devices to ensure authorized access.
2. Authorization:
- Specifies what users or systems are allowed to do after authentication.
3. Biometric Systems:
- Uses unique biological traits (e.g., fingerprints, retina scans) for identity
verification.
4. Firewall:
- Acts as a barrier between a trusted network and external, potentially harmful
sources to filter traffic.
Related Terms
- Cookies :Small text files stored by websites on your device for user tracking and
personalization.

- Hackers and Crackers: Hackers are skilled experts in computer systems, while
crackers are malicious hackers who break into systems for malicious purposes.

- Cyber law: Legal regulations governing internet activities and cyber security practices.

- India's IT Act, 2000: Enacted to provide legal recognition for electronic transactions,
data protection, and digital signatures, enhancing India's digital economy.

- IT (Amendment) Act, 2008: An amendment to the IT Act, addressing emerging issues


in data security, privacy, and cybercrimes, ensuring legal coverage in a rapidly evolving
digital landscape.
(unlawful acts

Cyber Crimes
-Classification of Cybercrimes:
committed online)

1. Tampering with Computer Source Documents: Unauthorized


modification of computer program source code or data to deceive, defraud,
or disrupt.

2. Malicious Hacking: Unauthorized access, manipulation, or damage to


computer systems or networks with malicious intent.

3. Publishing Obscene Information Electronically: Distributing or


sharing sexually explicit or obscene content through electronic means.

4. Child Pornography: Producing, distributing, or possessing explicit


images involving minors using digital technology.

5. Accessing Protected Systems: Unauthorized entry into secure


computer systems, often for financial or data theft.

6. Breach of Confidentiality and Privacy: Unauthorized access,


disclosure, or misuse of confidential or private information, including
personal and financial data.
IPR ISSUES
Intellectual Property Rights (IPR) issues encompass a
range of challenges related to the protection of
intellectual property, including patents, copyrights,
trademarks, and trade secrets. These issues often
involve disputes over ownership, infringement, and the
balance between protecting innovation and fostering
competition in various industries.
04
Viruses
VIRUSES
THREE TYPES:
• File infectors –attack themselves to program file
• Boot sector viruses-install themselves on the beginning
tracks of storage disk
• Macro viruses-infect data files
• DAMAGES IT CAUSES-
• Destroy fat
• create bad sectors
• Decrease space
• Format specific tracks
• Destroy executable files
• Cause systems to hang
Common Cyber Threats
- Trojan Horses :Deceptive software that appears harmless but hides malicious
code, often leading to unauthorized access or data theft.

- Worms :Self-replicating programs that can quickly spread across networks,


consuming bandwidth and causing system crashes.

- Spam: Unsolicited and irrelevant emails or messages that clutter inboxes, waste
time, and may contain phishing attempts or malware.

- Malware: General term for malicious software, including viruses, Trojan, worms,
and spyware, which can result in data breaches, financial losses, and compromised
privacy.
NETWORKING SECURITY THREATS

- Snooping and Eavesdropping: Unauthorized interception of data transmitted over a network,


potentially exposing sensitive information.

- Denial of Service (DoS): Deliberate attempts to overwhelm a network or system, rendering it


unavailable to users.

• Other Intrusion Attacks:


• Asymmetric routing
• buffer overflow attacks
• traffic flooding
Virus Prevention
- Keep Antivirus Software Updated:
Regularly update and use reputable antivirus software to detect and remove viruses.

- Update Operating Systems:


Apply security patches and updates to your operating system and software to address vulnerabilities.

- Exercise Caution with Email:


Avoid opening email attachments or clicking on links from unknown or suspicious sources.

- Download from Trusted Sources:


Only download software and files from reputable and official websites.

- Use a Firewall:
Enable a firewall to filter incoming and outgoing network traffic and block malicious connections.

- Educate Users:
Train individuals to recognize phishing attempts and practice safe online behavior
Antivirus Software
THANK YOU !

You might also like