SlideShare une entreprise Scribd logo
1  sur  52
COMPUTER
NETWORK
Networking & Security
CONTENTS
 What is a computer network?
 Types of network
 Network topologies

 Computer components
 Network components
 Internet security
 A computer network is where two or more networks are
connected or linked. so that they can exchange data.
 Network devices that originate, route and terminate the data
are called network nodes.
 Nodes can include host like servers and personal computers,
as well as networking hardware.
 Two networks are said to networked when a process in one

device can exchange information with a process in another
device.
 The connection (network links) between networked computing
device (network nodes) are established using either cable media
or wireless media. The best known computer network is
Internet.
 Computer networks support applications such as world wide
web, shared use of application and storage servers, printers, fax

machine, and use of email and instant text messaging
application.
TYPES OF NETWORK
Main Types Of Network:1.
2.
3.
4.

PAN (Personal Area Network)
LAN (Local Area Network)
WAN (Wide Area Network)
MAN (Metropolitan Area Network)
PAN - This type of network is used for a portable computer and a
handheld for sharing photos, music, including email and calendar
appointments, short distance connection using USB, Firewire,
Bluetooth or Infrared.
LAN – This type of network is used to connect computers which
belong to the same organization, within a building or small area.
WAN – This type of network is used to connect multiple LAN’s with
each other from far places.
MAN - This type of network is used to connect two or more
computers in nearby cities using fiber optic cable.
NETWORK TOPOLOGY
Network topology is the layout or organizational hierarchy of
interconnected nodes of a computer network.

Common layouts: 1. bus network
2. star network
3. ring network

4. tree network
5. mesh network
BU S N E T WO R K
 In bus network each node is connected to a single cable.
 A signal from the source travels in both directions to all all the
machines connected to bus cable until it reaches intended receipt.
 Advantage – Its economical; Disadvantage – If Backbone breaks
whole network will shutdown.
S TA R N E T WO R K
 In star network each network host is connected to a central hub

with a point-to-point connection.
 The hub is the server and peripherals are the client.
 All the data on the star topology passes through the central

device before reaching the intended destination.
 Advantage - Reliable; Disadvantage – Expensive to install
R I N G N E T WO R K
 In Ring Topology, all the nodes are connected to each-other in such a
way that they make a closed loop.
 Each workstation is connected to two other components on either
side, and it communicates with these two adjacent neighbors.

 Data travels around the network, in one direction. Sending and
receiving of data takes place by the help of TOKEN.
 Advantage – Less wiring; Disadvantage – Very slow


T R E E N E T WO R K
 Tree Topology integrates the characteristics of Star and Bus
Topology.
 In Tree Topology, the number of Star networks are connected using
Bus. This main cable seems like a main stem of a tree, and other star
networks as the branches. It is also called Expanded Star Topology.
Advantage – Its big; Disadvantage - Not reliable
MESH NETWORK
 In Mesh Network each node, computer and other devices are interconnected

to each other.
 Every node not only sends its own signals but also relays data from other
nodes.
 This type of topology is very expensive as there are many redundant
connections, thus it is not mostly used in computer networks. It is commonly
used in wireless networks.
Advantage – Traffic abundance; Disadvantage – Highly expensive
COMPUTER COMPONENTS
Input Devices:1. Mouse (Pointer Device)
2. Keyboard
3. Joystick

4. Scanner
5. Microphone
6. Webcam
Central Processing Unit:
1. Processor (CPU)
Output Devices:1. Monitor (Screen)
2. Printers

3. Speakers
Storage Devices:1. ROM (Random Access Memory)
2. ROM (Read Only Memory)
3. Hard Disks (Read/Write)

4. CD/DVD Drives
NETWORK COMPONENTS
 Network interference card - is found in the circuit board or mother board. It
helps devices to connect to a network.
 Network software - is software designed to manage a network.
 Network cable/wire - Used to connect devices together to form a network.
 Hub- Central device used in Star Networks which is not reliable and is slow.

 Switch- Central device used in Star Network which is safe
 Router – A device which forwards data packets to the appropriate computer
network.
INTERNET SECURITY
The Need Of Internet Security:1. It is protection against viruses, malware etc. even hackers.
2. Commercial & Government Enterprises are reluctant to use the
Internet because of security concerns. Since Internet ultimately
connects to a public network, the security concerns are very much valid.

3. The need for security is being alarmingly realized with the emergence of
E-Commerce. Presently, E-Commerce operations are always threatened
by fear of loss of money and privacy.
3.

Governments, military, corporations, financial
institutions, hospitals, and private businesses amass a
great deal of confidential information about their
employees, customers, products, research and financial
status. Most of this information is now collected,
processed and stored on electronic computers and
transmitted across networks to other computers.
4. Even E-mail is also under threat. When sent across the
Internet, the E-mail can be intercepted and read by
anybody who can lay his hands on it.
 If you are planning to connect your organization to Internet
and your computers are accessed from remote places, you must
have a Firewall to protect your Intranet.
 Firewall is defined as a group of systems that enforce an access
control policy between two networks. In other words it is a
mechanism used to protect trusted network from an untrusted
network.
 Firewall acts as a Gatekeeper between a company’s internal
network and the outside world. It acts as an electronic barrier to
stop unauthorized entry.
A Firewall Performs Two Basic Functions: 1. Gatekeeping - It examines the location from which the
data enters your system and then decides based on your
instructions whether or not to allow the information.
2. Monitoring - It includes login of all system activities
and generation of reports for system administration.
Monitoring can be active or passive. In active
monitoring a firewall notifies a manager whenever an
incidence occurs, generally by E-mail or Pager. In
passive monitoring the manager has to go through the
logs to determine and analyze the system activities.
Draw Backs Of Firewall:1. An Internet Firewall cannot protect against attacks that do not go through
the Firewall. For example, if an unrestricted dial-out connection is
permitted from inside the protected network the users can make a direct
connection to the Internet. Users who become irritated with the additional
authentication required by the Firewall may temp to bypass the security
system by purchasing a direct connection to an ISP.
2. The Internet Firewall cannot protect against threats posed by traitors who
may copy sensitive data into floppies and other media. A hacker may also
persuade someone to reveal a password and grant him a temporary network
access. Hence, there is a need to periodically change the passwords.
3. The Firewall Cannot Protect Against The Transfer Of Virus Infected Files
Or Software. Hence, Anti-Viral Software Should Be Deployed At Each
Desktop.
4. Lastly the Internet Firewall cannot protect against data driven attacks. A
data driven attacks occur when seemingly harmless data is mailed or copied
to a computer and executed to launch a hidden attack.
MALWARE’S
 Malware, short for malicious software, is software used to disrupt
computer operation, gather sensitive information, or gain access to
private computer systems.

 Malware includes computer viruses, ransomware, worms, trojan
horses, rootkits, keyloggers, dialers, spyware, adware,
malicious BHOs, rogue security software and other malicious programs.
MAIN TYPES OF
MALWARE’S
1. Virus
2. Trojan Horse
3. Spyware
4. Worm
5. Adware
VIRUS
 Viruses are programs that can replicate their structures of effects
by inflecting other structures on a computer. The common use of
virus is to take over a computer to steal data.
TROJAN HORSE
 A destructive program that masquerades as a being application.
Unlike viruses, Trojan horses do not replicate themselves but they can
be just as destructive. One of the most insidious types of Trojan

horse is a program that claims to rid your computer of viruses but
instead introduces viruses onto your computer.
SPYWARE
 Spyware is a type of malware that is installed on a computer
without the knowledge of the owner in order to collect the owner’s
private information. Spyware is often hidden from the user in order to

gather information about internet interaction, keystrokes (also known
as key logging), passwords, and other valuable data.
WORM
 A program that makes copies of itself; for example, from one disk
drive to another, or by copying itself using email or another transport
mechanism. The worm may do damage and compromise the security

of the computer. It may arrive in the form of a joke program or
software of some sort.
ADWARE
 Adware, or advertising-supported software, is any software package
which automatically renders advertisements in order to generate revenue
for its author. The advertisements may be in the user interface of the
software or on a screen presented to the user during the installation
process. The functions may be designed to analyze which Internet sites
the user visits and to present advertising pertinent to the types of goods
or services featured there. The term is sometimes used to refer to
software that displays unwanted advertisements.
ANTI-VIRUS
 It is software used to detect and remove the malicious software/file,
such as: computer viruses, malicious BHOs, hijackers,
ransomware, keyloggers, backdoors, rootkits, trojan horses, worms,
malicious LSPs, dialers, fraudtools, adware and spyware.

 No matter how useful antivirus software can be, it can sometimes have
drawbacks. Antivirus software can impair a computer's performance.
 Inexperienced users may also have problems understanding the
prompts and decisions that antivirus software presents them with.
EXAMPLES OF ANTIVIRUS
CIA
 The CIA triad (confidentiality, integrity and availability) is one of
the core principles of information security.
 CIA is a widely used benchmark for evaluation of information
systems security, focusing on the three core goals
of Confidentiality, Integrity and Availability of information.
 It is designed to guide polices for information security within an
organization.
CONFIDENTIALITY
 Confidentiality refers to limiting information access to authorized
users and preventing access by unauthorized users.
 The information in today’s time is very valuable. Bank account

statements, personal information, credit card numbers, trade secrets,
government documents. Every one has information they wish to keep a
secret. Protecting such information is a very major part of information
security.
 A very key component of protecting information confidentiality would be
encryption. Encryption ensures that only the right user) can read the
information. Encryption is VERY widespread in today’s environment and
can be found in almost every major protocol in use. A very prominent
example will be SSL/TLS, a security protocol for communications over the
internet that has been used in conjunction with a large number of internet
protocols to ensure security.
 Other ways to ensure information confidentiality include enforcing file
permissions and access control list to restrict access to sensitive
information.
INTEGRITY
 Integrity of information refers to protecting information from
being modified by unauthorized users.
 Information only has value if it is correct. Information that has
been tampered with could prove costly. For example, if you were
sending an online money transfer for $100, but the information was
tampered in such a way that you actually sent $10,000, it could prove to

be very costly for you.
 As with data confidentiality, cryptography plays a very major role in
ensuring data integrity. Commonly used methods to protect data integrity
includes hashing the data you receive and comparing it with the hash of the
original message. However, this means that the hash of the original data
must be provided to you in a secure fashion. More convenient methods
would be to use existing schemes such as GPG to digitally sign the data.
AVAILABILITY
 Availability of information refers to ensuring that authorized users are able
to access the information when needed.

 Information only has value if the right people can access it at the right
times. Denying access to information has become a very common attack
nowadays. Almost every week you can find news about high profile websites
being taken down by DDOS attacks. The primary aim of DDOS attacks is to
deny users of the website access to the resources of the website. Such
downtime can be very costly. Other factors that could lead to lack of
availability to important information may include accidents such as power
outages or natural disasters such as floods.
 How can one ensure data availability? Backup is key. Regularly doing
backups can limit the damage caused hard drives or natural disasters. For
information services that is highly critical, redundancy might be
appropriate. Having a off-site location ready to restore services in case
anything happens to your primary data centers will heavily reduce the
downtime in case of anything happens.
SOURCES: Wikipedia.org

 Ianswer4u.com
 Computernetworking.about.com
 Googleimages.com

 http://it.med.miami.edu/x904.xml
 Information Technology Book
Computer networking

Contenu connexe

Tendances

Computer network
Computer networkComputer network
Computer networkNeha Gupta
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)ashiesh0007
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsSurabhi Gosavi
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networksTatheer Fatima
 
Computer network
Computer networkComputer network
Computer networkKetan Garg
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardwareMziaulla
 
Networking concepts
Networking conceptsNetworking concepts
Networking conceptsritajindal2
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)Ridwanul Hoque
 
Computer networking
Computer networkingComputer networking
Computer networkingAbdul Rehman
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networkingJyoti Tewari
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networksRubal Sagwal
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of NetworksUttar Tamang ✔
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devicesRajesh Sadhukha
 
Network ppt
Network pptNetwork ppt
Network ppthlalu861
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPTDhivya T
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and TopologiesChristopher Brown
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer NetworkMohit Dasariya
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentalsjpprakash
 

Tendances (20)

Computer network
Computer networkComputer network
Computer network
 
Basics Of Networking (Overview)
Basics Of Networking (Overview)Basics Of Networking (Overview)
Basics Of Networking (Overview)
 
Networking devices
Networking devicesNetworking devices
Networking devices
 
Computer networks
Computer networksComputer networks
Computer networks
 
Types of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design ToolsTypes of Networks,Network Design Issues,Design Tools
Types of Networks,Network Design Issues,Design Tools
 
Types of computer networks
Types of computer networksTypes of computer networks
Types of computer networks
 
Computer network
Computer networkComputer network
Computer network
 
Computer networks--networking hardware
Computer networks--networking hardwareComputer networks--networking hardware
Computer networks--networking hardware
 
Networking concepts
Networking conceptsNetworking concepts
Networking concepts
 
LAN (Local Area Network)
LAN (Local Area Network)LAN (Local Area Network)
LAN (Local Area Network)
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Presentation on computer networking
Presentation on computer networkingPresentation on computer networking
Presentation on computer networking
 
Basics of computer networks
Basics of computer networksBasics of computer networks
Basics of computer networks
 
Network and Types of Networks
Network and Types of NetworksNetwork and Types of Networks
Network and Types of Networks
 
Computer networking devices
Computer networking devicesComputer networking devices
Computer networking devices
 
Network ppt
Network pptNetwork ppt
Network ppt
 
Computer Networks - PPT
Computer Networks - PPTComputer Networks - PPT
Computer Networks - PPT
 
Network Types and Topologies
Network Types and TopologiesNetwork Types and Topologies
Network Types and Topologies
 
Types of Computer Network
Types of Computer NetworkTypes of Computer Network
Types of Computer Network
 
Networking fundamentals
Networking fundamentalsNetworking fundamentals
Networking fundamentals
 

En vedette

CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1Irsandi Hasan
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer NetworkAdetula Bunmi
 
Socal network and its impects
Socal network and its impectsSocal network and its impects
Socal network and its impectsarfin97
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First SemesterHem Pokhrel
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesShahid Khan
 
Network Effects
Network EffectsNetwork Effects
Network Effectsa16z
 

En vedette (9)

CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1CCNA Exploration 1 - Chapter 1
CCNA Exploration 1 - Chapter 1
 
computer network OSI layer
computer network OSI layercomputer network OSI layer
computer network OSI layer
 
Introduction to Computer Network
Introduction to Computer NetworkIntroduction to Computer Network
Introduction to Computer Network
 
Socal network and its impects
Socal network and its impectsSocal network and its impects
Socal network and its impects
 
Computer Network | BBA First Semester
Computer Network | BBA First SemesterComputer Network | BBA First Semester
Computer Network | BBA First Semester
 
Physical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and DevicesPhysical Layer of ISO-OSI model and Devices
Physical Layer of ISO-OSI model and Devices
 
Networking
NetworkingNetworking
Networking
 
Network Effects
Network EffectsNetwork Effects
Network Effects
 
Ppt on internet
Ppt on internetPpt on internet
Ppt on internet
 

Similaire à Computer networking

Computing safety
Computing safetyComputing safety
Computing safetyBrulius
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptxDhanvanthkesavan
 
A REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITYA REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITYijiert bestjournal
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsüremin_oz
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkIOSR Journals
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technologySaumya Ranjan Behura
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Vatsal Unadkat
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protectionphanleson
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.RAVI RAJ
 

Similaire à Computer networking (20)

Computing safety
Computing safetyComputing safety
Computing safety
 
Network and Security-2.pptx
Network and Security-2.pptxNetwork and Security-2.pptx
Network and Security-2.pptx
 
Network
NetworkNetwork
Network
 
A REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITYA REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITY
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Viruses, worms, and trojan horses
Viruses, worms, and trojan horsesViruses, worms, and trojan horses
Viruses, worms, and trojan horses
 
Firewall presentation m. emin özgünsür
Firewall presentation   m. emin özgünsürFirewall presentation   m. emin özgünsür
Firewall presentation m. emin özgünsür
 
Info scince pp
Info scince ppInfo scince pp
Info scince pp
 
UNIT-4.docx
UNIT-4.docxUNIT-4.docx
UNIT-4.docx
 
Network security
Network securityNetwork security
Network security
 
Ensuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic NetworkEnsuring Privacy in opportunistic Network
Ensuring Privacy in opportunistic Network
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
G011123539
G011123539G011123539
G011123539
 
Security system wireless technology
Security system wireless technologySecurity system wireless technology
Security system wireless technology
 
Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)Societal Impacts Of IT (Class X)
Societal Impacts Of IT (Class X)
 
Ch14 Desktop Protection
Ch14 Desktop ProtectionCh14 Desktop Protection
Ch14 Desktop Protection
 
security By ZAK
security By ZAKsecurity By ZAK
security By ZAK
 
System_security.pptx
System_security.pptxSystem_security.pptx
System_security.pptx
 
Cryptography and network security.
Cryptography and network security.Cryptography and network security.
Cryptography and network security.
 
Chapter 10.0
Chapter 10.0Chapter 10.0
Chapter 10.0
 

Dernier

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfMr Bounab Samir
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptxmary850239
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfTechSoup
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 

Dernier (20)

How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdfLike-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
Like-prefer-love -hate+verb+ing & silent letters & citizenship text.pdf
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptxYOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
YOUVE_GOT_EMAIL_PRELIMS_EL_DORADO_2024.pptx
 
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptxYOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
YOUVE GOT EMAIL_FINALS_EL_DORADO_2024.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx4.18.24 Movement Legacies, Reflection, and Review.pptx
4.18.24 Movement Legacies, Reflection, and Review.pptx
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdfInclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
Inclusivity Essentials_ Creating Accessible Websites for Nonprofits .pdf
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 

Computer networking

  • 2. CONTENTS  What is a computer network?  Types of network  Network topologies  Computer components  Network components  Internet security
  • 3.  A computer network is where two or more networks are connected or linked. so that they can exchange data.  Network devices that originate, route and terminate the data are called network nodes.  Nodes can include host like servers and personal computers, as well as networking hardware.  Two networks are said to networked when a process in one device can exchange information with a process in another device.
  • 4.  The connection (network links) between networked computing device (network nodes) are established using either cable media or wireless media. The best known computer network is Internet.  Computer networks support applications such as world wide web, shared use of application and storage servers, printers, fax machine, and use of email and instant text messaging application.
  • 5. TYPES OF NETWORK Main Types Of Network:1. 2. 3. 4. PAN (Personal Area Network) LAN (Local Area Network) WAN (Wide Area Network) MAN (Metropolitan Area Network)
  • 6. PAN - This type of network is used for a portable computer and a handheld for sharing photos, music, including email and calendar appointments, short distance connection using USB, Firewire, Bluetooth or Infrared. LAN – This type of network is used to connect computers which belong to the same organization, within a building or small area. WAN – This type of network is used to connect multiple LAN’s with each other from far places. MAN - This type of network is used to connect two or more computers in nearby cities using fiber optic cable.
  • 7.
  • 8. NETWORK TOPOLOGY Network topology is the layout or organizational hierarchy of interconnected nodes of a computer network. Common layouts: 1. bus network 2. star network 3. ring network 4. tree network 5. mesh network
  • 9. BU S N E T WO R K  In bus network each node is connected to a single cable.  A signal from the source travels in both directions to all all the machines connected to bus cable until it reaches intended receipt.  Advantage – Its economical; Disadvantage – If Backbone breaks whole network will shutdown.
  • 10.
  • 11. S TA R N E T WO R K  In star network each network host is connected to a central hub with a point-to-point connection.  The hub is the server and peripherals are the client.  All the data on the star topology passes through the central device before reaching the intended destination.  Advantage - Reliable; Disadvantage – Expensive to install
  • 12.
  • 13. R I N G N E T WO R K  In Ring Topology, all the nodes are connected to each-other in such a way that they make a closed loop.  Each workstation is connected to two other components on either side, and it communicates with these two adjacent neighbors.  Data travels around the network, in one direction. Sending and receiving of data takes place by the help of TOKEN.  Advantage – Less wiring; Disadvantage – Very slow 
  • 14.
  • 15. T R E E N E T WO R K  Tree Topology integrates the characteristics of Star and Bus Topology.  In Tree Topology, the number of Star networks are connected using Bus. This main cable seems like a main stem of a tree, and other star networks as the branches. It is also called Expanded Star Topology. Advantage – Its big; Disadvantage - Not reliable
  • 16.
  • 17. MESH NETWORK  In Mesh Network each node, computer and other devices are interconnected to each other.  Every node not only sends its own signals but also relays data from other nodes.  This type of topology is very expensive as there are many redundant connections, thus it is not mostly used in computer networks. It is commonly used in wireless networks. Advantage – Traffic abundance; Disadvantage – Highly expensive
  • 18.
  • 20. Input Devices:1. Mouse (Pointer Device) 2. Keyboard 3. Joystick 4. Scanner 5. Microphone 6. Webcam
  • 21.
  • 23. Output Devices:1. Monitor (Screen) 2. Printers 3. Speakers
  • 24.
  • 25. Storage Devices:1. ROM (Random Access Memory) 2. ROM (Read Only Memory) 3. Hard Disks (Read/Write) 4. CD/DVD Drives
  • 26.
  • 27. NETWORK COMPONENTS  Network interference card - is found in the circuit board or mother board. It helps devices to connect to a network.  Network software - is software designed to manage a network.  Network cable/wire - Used to connect devices together to form a network.  Hub- Central device used in Star Networks which is not reliable and is slow.  Switch- Central device used in Star Network which is safe  Router – A device which forwards data packets to the appropriate computer network.
  • 28.
  • 29. INTERNET SECURITY The Need Of Internet Security:1. It is protection against viruses, malware etc. even hackers. 2. Commercial & Government Enterprises are reluctant to use the Internet because of security concerns. Since Internet ultimately connects to a public network, the security concerns are very much valid. 3. The need for security is being alarmingly realized with the emergence of E-Commerce. Presently, E-Commerce operations are always threatened by fear of loss of money and privacy.
  • 30. 3. Governments, military, corporations, financial institutions, hospitals, and private businesses amass a great deal of confidential information about their employees, customers, products, research and financial status. Most of this information is now collected, processed and stored on electronic computers and transmitted across networks to other computers. 4. Even E-mail is also under threat. When sent across the Internet, the E-mail can be intercepted and read by anybody who can lay his hands on it.
  • 31.  If you are planning to connect your organization to Internet and your computers are accessed from remote places, you must have a Firewall to protect your Intranet.  Firewall is defined as a group of systems that enforce an access control policy between two networks. In other words it is a mechanism used to protect trusted network from an untrusted network.  Firewall acts as a Gatekeeper between a company’s internal network and the outside world. It acts as an electronic barrier to stop unauthorized entry.
  • 32.
  • 33. A Firewall Performs Two Basic Functions: 1. Gatekeeping - It examines the location from which the data enters your system and then decides based on your instructions whether or not to allow the information. 2. Monitoring - It includes login of all system activities and generation of reports for system administration. Monitoring can be active or passive. In active monitoring a firewall notifies a manager whenever an incidence occurs, generally by E-mail or Pager. In passive monitoring the manager has to go through the logs to determine and analyze the system activities.
  • 34. Draw Backs Of Firewall:1. An Internet Firewall cannot protect against attacks that do not go through the Firewall. For example, if an unrestricted dial-out connection is permitted from inside the protected network the users can make a direct connection to the Internet. Users who become irritated with the additional authentication required by the Firewall may temp to bypass the security system by purchasing a direct connection to an ISP. 2. The Internet Firewall cannot protect against threats posed by traitors who may copy sensitive data into floppies and other media. A hacker may also persuade someone to reveal a password and grant him a temporary network access. Hence, there is a need to periodically change the passwords. 3. The Firewall Cannot Protect Against The Transfer Of Virus Infected Files Or Software. Hence, Anti-Viral Software Should Be Deployed At Each Desktop. 4. Lastly the Internet Firewall cannot protect against data driven attacks. A data driven attacks occur when seemingly harmless data is mailed or copied to a computer and executed to launch a hidden attack.
  • 35. MALWARE’S  Malware, short for malicious software, is software used to disrupt computer operation, gather sensitive information, or gain access to private computer systems.  Malware includes computer viruses, ransomware, worms, trojan horses, rootkits, keyloggers, dialers, spyware, adware, malicious BHOs, rogue security software and other malicious programs.
  • 36. MAIN TYPES OF MALWARE’S 1. Virus 2. Trojan Horse 3. Spyware 4. Worm 5. Adware
  • 37. VIRUS  Viruses are programs that can replicate their structures of effects by inflecting other structures on a computer. The common use of virus is to take over a computer to steal data.
  • 38. TROJAN HORSE  A destructive program that masquerades as a being application. Unlike viruses, Trojan horses do not replicate themselves but they can be just as destructive. One of the most insidious types of Trojan horse is a program that claims to rid your computer of viruses but instead introduces viruses onto your computer.
  • 39. SPYWARE  Spyware is a type of malware that is installed on a computer without the knowledge of the owner in order to collect the owner’s private information. Spyware is often hidden from the user in order to gather information about internet interaction, keystrokes (also known as key logging), passwords, and other valuable data.
  • 40. WORM  A program that makes copies of itself; for example, from one disk drive to another, or by copying itself using email or another transport mechanism. The worm may do damage and compromise the security of the computer. It may arrive in the form of a joke program or software of some sort.
  • 41. ADWARE  Adware, or advertising-supported software, is any software package which automatically renders advertisements in order to generate revenue for its author. The advertisements may be in the user interface of the software or on a screen presented to the user during the installation process. The functions may be designed to analyze which Internet sites the user visits and to present advertising pertinent to the types of goods or services featured there. The term is sometimes used to refer to software that displays unwanted advertisements.
  • 42. ANTI-VIRUS  It is software used to detect and remove the malicious software/file, such as: computer viruses, malicious BHOs, hijackers, ransomware, keyloggers, backdoors, rootkits, trojan horses, worms, malicious LSPs, dialers, fraudtools, adware and spyware.  No matter how useful antivirus software can be, it can sometimes have drawbacks. Antivirus software can impair a computer's performance.  Inexperienced users may also have problems understanding the prompts and decisions that antivirus software presents them with.
  • 44. CIA  The CIA triad (confidentiality, integrity and availability) is one of the core principles of information security.  CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of Confidentiality, Integrity and Availability of information.  It is designed to guide polices for information security within an organization.
  • 45. CONFIDENTIALITY  Confidentiality refers to limiting information access to authorized users and preventing access by unauthorized users.  The information in today’s time is very valuable. Bank account statements, personal information, credit card numbers, trade secrets, government documents. Every one has information they wish to keep a secret. Protecting such information is a very major part of information security.
  • 46.  A very key component of protecting information confidentiality would be encryption. Encryption ensures that only the right user) can read the information. Encryption is VERY widespread in today’s environment and can be found in almost every major protocol in use. A very prominent example will be SSL/TLS, a security protocol for communications over the internet that has been used in conjunction with a large number of internet protocols to ensure security.  Other ways to ensure information confidentiality include enforcing file permissions and access control list to restrict access to sensitive information.
  • 47. INTEGRITY  Integrity of information refers to protecting information from being modified by unauthorized users.  Information only has value if it is correct. Information that has been tampered with could prove costly. For example, if you were sending an online money transfer for $100, but the information was tampered in such a way that you actually sent $10,000, it could prove to be very costly for you.
  • 48.  As with data confidentiality, cryptography plays a very major role in ensuring data integrity. Commonly used methods to protect data integrity includes hashing the data you receive and comparing it with the hash of the original message. However, this means that the hash of the original data must be provided to you in a secure fashion. More convenient methods would be to use existing schemes such as GPG to digitally sign the data.
  • 49. AVAILABILITY  Availability of information refers to ensuring that authorized users are able to access the information when needed.  Information only has value if the right people can access it at the right times. Denying access to information has become a very common attack nowadays. Almost every week you can find news about high profile websites being taken down by DDOS attacks. The primary aim of DDOS attacks is to deny users of the website access to the resources of the website. Such downtime can be very costly. Other factors that could lead to lack of availability to important information may include accidents such as power outages or natural disasters such as floods.
  • 50.  How can one ensure data availability? Backup is key. Regularly doing backups can limit the damage caused hard drives or natural disasters. For information services that is highly critical, redundancy might be appropriate. Having a off-site location ready to restore services in case anything happens to your primary data centers will heavily reduce the downtime in case of anything happens.
  • 51. SOURCES: Wikipedia.org  Ianswer4u.com  Computernetworking.about.com  Googleimages.com  http://it.med.miami.edu/x904.xml  Information Technology Book