Computer networks –
II
TABLE OF CONTENTS
1. WIRELESS/MOBILE COMPUTING
TECHNOLOGIES
2. INTERNET WORKING TERMS &
CONCEPTS
3. NETWORK SECURITY CONCEPTS
4. VIRUSES
.
SHORT MESSAGE SERVICE(SMS)
TEXT MESSAGING SERVICE AVAILABLE ON MOBILE PHONES.
ONCE A MESSAGE IS SENT,
MESSAGE IS RECEIVED BY A SHORT MESSAGE SERVICE
CENTER (SMSC) AND IT DELIVERES TO THE RECIPIENT.
CHAT
ONLINE TEXTUAL TALK
VIDEO
CONFERENCING
• A TWO-WAY VIDEOPHONE CONVERSATION AMONG MULTIPLE
PARTICIPANTS.
• A VIDEOPHONE SOFTWARE CAN SEE EACH OTHER WHILE
TALKING.
VOICE OVER INTERNET PROTOCOL,
VoIP
VOIP IS A TECHNOLOGY THAT ALLOWS VOICE AND MULTIMEDIA
COMMUNICATION TO BE TRANSMITTED OVER THE INTERNET
INSTEAD OF TRADITIONAL TELEPHONE LINES.
Connecting Wirelessly to Internet
1) Wi-Fi
Refers to Wireless Fidelity, which lets you connect
to the Internet without a direct line.
For Wi-Fi to work,
• A broadband Internet connection.
• A wireless router
• A laptop or desktop
Wi-Fi Hotspots
A hotspot is a venue that offers
WH-Fi access the public can use
Wireless LAN (WLAN)
Allows devices to connect to the
internet and communicate with
each other using wireless signals,
typically through Wi-Fi
technology.
1. WiMax
• stands for Worldwide Interoperability for
Microwave Access.
• provides high-speed internet access and data
transmission over long distances.
Internetworking Terms and Concepts
1. WWW(World Wide Web)
• Set of protocols that allows you to access any document on
the Net through a naming system based on URLS
URL means Uniform Resource Locator.
It is a pointer to information on the WWW.
It can include pointers to other types of resources
such
as ftp servers and gopher servers in addition to
WWW servers.
WWW Attributes
• User-friendly :WWW resources can work easily with most Internet browsers,
which are very user-friendly.
• Multimedia Documents composed of multiple file format combinations, such as
image and texts, sound
• Hypertext and Hyperlinks hypertext is basically a simple text that contains
a link which redirects the user to somewhere else on the computer
network. While the hyperlink is a link that allows users to navigate
between difference computer resources like webpages
• Interactive WWW, with its pages, supports and enables interactivity
between users and servers
Ex: radio buttons, check- boxes, text-boxes etc.
• Frames
Frames is the display of more than one independently controllable section
on single web page.
2. TELNET
Telnet is an Internet utility that lets you log onto remote computer
systems. Telnet program gives you a character-based terminal
window on another system.
3. Web Browser and Web Server
A Web Browser is a WWW client that navigates through the World
Wide Web and displays web pages
.
A Web Server is a WWW server that responds to the requests made
by web browsers.
4. Web Sites, Web Addresses and Web Pages
A location on a net server is called a web site.
A web address is the location of a web page on the Internet.
A location on a web server is a Web Site. A document that use
HTTP or HTTPS is called a Web Page.
URL(Uniform Resource Locator)
URL (Uniform Resource Locator) is an address of a file Internet.
Syntax Elements of URLS :
• The type of server or protocol.
• The name/address of the server on the Internet (Domain name)
• The Location of the file on the server (this location may be related as a “path”
through the file hierarchy)
Domain Name, Domain Name System
An Internet address which is character based is called a
Domain Name.
The naming scheme by which servers are identified is also
known as the domain name system.. Ex: com, edu, etc.
The documents residing on web sites are called web pages. The web
pages use HTTP/HTTPS protocols.
1. HOME PAGE : It is the top-level web page of a web site. When a web-site
is opened, its home page is displayed.
2. WEB PORTAL : internet that give specific audiences access to different
information from an organization. Ex : www.yahoo.com etc.
Web portal
Home page
Web Hosting
Different types of Web hosting services are :
• Free Hosting (freely available on a site’s server)
• Virtual or Shared Hosting (here domain is hosted on a shared server)
• Dedicated Hosting (here the domain is hosted on a dedicated server, i.e., no sharing of
server).
Web 2.0 Web 3.0
• Web 2.0 is an updated version (the • Newest version of the Internet.
one we currently use) that allows • Aims at combining new technologies
users to interact, generate content, like Artificial Intelligence (AI).
and network. Machine Learning (ML), and Block
Ex : Facebook, Twitter, YouTube, etc chain etc. So as to power intelligent
apps over the Internet.
Advantages: Advantages :
1. Increased the rate of participation 1. Offers immersive user experience.
of users on online websites 2. Allows for more interactivity and
2. Provided a better functionality and transparency between the user and
allows the visitor to communicate the web.
with the website in a much better 3. Offers greater security and privacy.
prospective
HTML XML
• HyperText Mark up Language. • eXtensible Mark up Language
• Code that is used to structure a • Mark up language for documents
web page and its content. containing structured information
• (such as heading, subheading plain
Tells the browser how to display
text, tables, data etc.)
the contents of a hypertext • The XML specification defines a
document. standard way to add
• Tells how to make a document
interactive through special
hyperlinks.
So XML is Just Like HTML?
The key difference between HTML and XML is that HTML
displays data and describes the structure of a webpage,
whereas XML stores and transfers data.
XML is a standard language which can define other
computer languages
DHTML
• Dynamic HTML
• Refers to Web content that changes each time it is viewed.
• Describes the development of dynamic and interactive web pages.
• Can work with HTML, JavaScript, XML, and CSS to create dynamic
and interactive web pages.
Web Scripting
Process of creating and embedding scripts in a web page.
Script
A script or a computer-script is a list of commands that are embedded in a web-
page and are interpreted and executed by a certain program or scripting engine.
Types of Server Side Scripting
Client Side Scripting
Scripts
The script is executed at the server-end and
Script code is downloaded and executed the result is sent to the client-end.
at the client end. Complex processes are more efficient as the
Response to interaction is more program and associated resources are not
immediate once the program code has down- loaded to the browser.
been downloaded. • Some popular server-side scripting
• Some popular client-side scripting
languages are: PHP (Hypertext
languages are : VBScript, JavaScript, Preprocessor), Perl, ASP (Active Server
Hypertext Preprocessor (PHP). Pages), JSP (Java Server Pages etc.
Network Security Concepts
The concerns are to make sure that only legal or authorized users and programs gain
access to information resources like databases.
Under this type of security, mechanisms like
• Authorization
• Authentication
• Encrypted smart cards
• Biometrics
• Firewalls etc. are implemented.
Protection Methods
To counter or reduce the security threats received under this
category, many protection methods are used.
1. Authorization
Determines if a user or the service requestor is entitled to perform the operation by
ensuring if the user’s credentials are valid or not.
2. Authentication
ensures that the user is an authentic user. Authentication involves accepting credentials
from a user and validating them against an authority (stored valid password).
3.Biometric Systems
The biometric systems involve some unique aspect of a person's body such as finger-prints,
retinal patterns etc. to establish his/her identity.
4. Firewall
The system designed to prevent unauthorized access to or from a private
network is called Firewall.
Terms related to network security
Cookies
Cookies are messages that a Web server transmits to a Web browser so
that the Web server can keep track of the user's activity on a specific
website.
Hackers and Crackers
Hackers are the people who hack devices and systems with good
intentions
Crackers are the people with malicious. intentions who hack a system by
breaking into it and violating it for some bad motives.
Types of Hackers
Cyber Law
• CYBER LAW IS A GENERIC TERM WHICH REFERS TO ALL THE LEGAL AND
REGULATORY ASPECTS OF INTERNET AND THE WORLD WIDE WEB.
• IN INDIA, THE CYBER LAWS ARE ENFORCED THROUGH INFORMATION
TECHNOLOGY ACT, 2000 (IT ACT 2000) WHICH WAS NOTIFIED ON 17
OCTOBER 2000.
CYBER CRIMES
• CRIMES COMMITTED WITH THE
USE OF COMPUTERS
ESPECIALLY THROUGH THE
INTERNET.
CLASSIFICATION OF CYBER
CRIMES:-
• TAMPERING WITH COMPUTER
SOURCE DOCUMENTS
• MALICIOUS HACKING
• BREACH OF CONFIDENTIALITY
AND PRIVACY
IPR ISSUES( INTELLECTUAL
PROPERTY RIGHTS)
• A PRODUCT OF THE INTELLECT THAT HAS COMMERCIAL VALUE,
INCLUDING COPYRIGHTED PROPERTY SUCH AS LITERARY OR
ARTISTIC WORKS, AND IDEATIONAL PROPERTY.
VIRUSES
malicious program that requires a host and is designed to make a
system sick just like a real virus
LASSIFICATION OF VIRUS
• FILE INFECTORS :- ATTACH
THEMSELVES TO A PROGRAM
FILE
• BOOT SECTOR VIRUSES :-
INSTALL THEMSELVES ON THE
BEGINNING TRACKS OF A
STORAGE DISK
• MACRO VIRUSES :- INFECT DATA
FILES
CHARACTERISTICS OF A
COMPUTER VIRUS
• ABLE TO REPLICATE
• REQUIRES A HOST PROGRAM AS A CARRIER
• ACTIVATED BY EXTERNAL ACTION
• REPLICATION ABILITY IS LIMITED TO THE SYSTEM
DAMAGE THAT VIRUSES CAUSE
• CAN DESTROY FILE LOCATION
• CAN CREATE BAD SECTORS
• CAN DECREASE THE SPACE ON HARD DISK
• CAN FORMAT SPECIFIC TRACKS
• CAN DESTROY SPECIFIC TRACKS
• CAN CAUSE THE SYSTEM TO HANG
TROJAN HORSE:-
• A TROJAN HORSE IS CODE HIDDEN IN A USEFUL LOOKING
PROGRAM SUCH AS A GAME OR SPREADSHEET THAT LOOKS
SAFE TO RUN BUT HAS HIDDEN SIDE EFFECTS.
WORMS
• A WORM IS A PROGRAM
DESIGNED TO
REPLICATE.
CHARACTERISTICS OF
WORM:-
• ABLE TO REPLICATE
• SELF- CONTAINED AND
DOES NOT REQUIRE
HOST
• ACTIVATED BY
CREATING PROCESS
Spam
Spam refers to electronic junk mail or junk
newsgroup postings.
AVOIDING SPAM
• ONE WAY TO HELP AVOID SPAM OR JUNK MAIL IS TO CREATE
A FILTER THAT FINDS AND DOES SOMETHING TO E-MAIL
THAT YOU SUSPECT IS SPAM.
• ANOTHER TIP IS NOT TO REGISTER YOURSELF WITH TRUE ID
TO SIGN UP FOR THINGS ON THE INTERNET. THESE PLACES
OFTEN SHARE THAT E-MAIL ADDRESS WITH OTHER
COMPANIES THAT THEN SEND YOU SPAM.
MALWARE
• MALWARE IS AN UMBRELLA TERM FOR ANY PIECE
OF SOFTWARE THAT HAS MALICIOUS INTENT.
1. SPYWARE:- SPYWARE ARE THE SOFTWARE THAT
STEALTHILY ATTACH WITH YOUR COMPUTER
SOFTWARE SUCH AS A WEB BROWSER
2. ADWARE:-ADWARE REFERS TO UNWANTED
SOFTWARE THAT DISPLAY ADVERTISEMENT POP-
UPS ON YOUR SCREEN.
3. RANSOMWARE :SOFTWARE THAT MAKES A
COMPUTER’S DATA INACCESSIBLE AND
UNUSABLE USING ENCRYPTION AND DEMANDS
A RANSOM TO UNBLOCK IT.
4. KEY LOGGERS IS TYPE OF MALWARE
SOFTWARE/HARDWARE THAT KEEPS TRACK OF
YOUR KEYSTROKES ON YOUR KEYBOARD
NETWORK SECURITY THREATS
• SNOOPING:- SNOOPING REFERS TO OPENING AND LOOKING THROUGH FILES
IN UNAUTHORIZED MANNER
• EAVESDROPPING:- WHEN SOME ONE LISTENS TO A CONVERSATION THAT
THEY ARE NOT PART OF, IT IS EAVESDROPPING.
• DENIAL-OF-SERVICE (DOS) ATTACKS ARE THOSE ATTACKS THAT PREVENT THE
LEGITIMATE USERS OF THE SYSTEM, FROM ACCESSING OR USING THE
RESOURCES, INFORMATION, OR CAPABILITIES OF THE SYSTEM.
• A NETWORK INTRUSION IS ANY ILLEGAL ACTIVITY CARRIED OUT ON A
DIGITAL NETWORK SUCH AS THE THEFT OF VALUABLE NETWORK
RESOURCES AND VIRTUALLY ALWAYS COMPROMISE A NETWORK SECURITY
AND/OR DATA SECURITY.
VIRUS PREVENTION
1. USE ANTIVIRUS SOFTWARE
2. ENABLE FIREWALL
3. SAFE DOWNLOADS
4. BACKUP DATA
5. STRONG PASSWORDS
6. REGULAR UPDATES
ANTIVIRUS SOFTWARE
• DESIGNED SOFTWARE DESIGNED TO
DETECT AND REMOVE VIRUSES AND
OTHER KINDS OF MALICIOUS SOFTWARE