0% found this document useful (0 votes)
28 views

ECSE UNIT-4 Notes

Uploaded by

Timothy Saxena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
28 views

ECSE UNIT-4 Notes

Uploaded by

Timothy Saxena
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 31

Computer Network:

The computer network is defined as a set of interconnected autonomous systems


that facilitate distributed processing of information. It results in better performance
with a high speed of processing. Computer Networks can be defined as collections
of two or more computer networks that are linked together.
Applications of Computer Networks
Some of the applications of Computer Networking are discussed below:
Resource Sharing: Resource Sharing is one of the important applications of
Computer Networking. You can share a single software among Multiple users.
We can also share Hardware Devices via this technique.
Communication: Communication Medium means various ways through which
we can communicate like Email Calls, broadcasts, etc.
Home Applications: Home Applications are an important application of
Computer Networking. Examples are User-to-User Communication,
Entertainment, E-Commerce, etc.
Business Applications: Business Application is also an important application
of Computer Networking. Almost all companies are doing business online with
the help of Computer Networking.
Social Media: Social Media is one of the recent and widely used applications of
Computer Networking. It helps people in getting news, feed, current trending
topics of all types, etc.
Access to Remote Information: Computer Networking helps in accessing
remote information from the end-users. For Example. details required for train
tickets, plane tickets, etc.
Cloud Computing: Computer Networking has facilitated the development of
cloud computing, which allows users to store and access data and applications
from remote servers via the internet.
Virtualization: Networking technologies also enable virtualization, which
allows multiple virtual machines to run on a single physical machine, improving
resource utilization and reducing costs.
Online Education: Computer Networking has revolutionized education by
providing online learning platforms, distance education, and virtual classrooms.
Remote Working: Networking technologies have enabled remote working,
allowing employees to work from home or other locations outside of the office.
This has become especially important during the COVID-19 pandemic.
E-commerce: Computer Networking has facilitated the growth of e-commerce
by allowing businesses to sell their products and services online and reach a
global market.
Telemedicine: Networking technologies have also enabled telemedicine,
allowing doctors and healthcare providers to provide remote medical
consultations and diagnosis to patients in remote locations.
Real-time Collaboration: Networking technologies enable real-time
collaboration, allowing people to work together on projects and share
information in real-time, no matter where they are located.
Advantages of Computer Networks
Some of the main advantages of Computer Networking are discussed below:
Central Storage of Data: Files can be stored on a central node (the file server)
that can be shared and made available to every user in an organization.
Connectivity: There is a negligible range of abilities required to connect to a
modern computer network. The effortlessness of joining makes it workable for
even youthful kids to start exploring the data.
Faster Problem-solving: Since an extensive procedure is disintegrated into a
few littler procedures and each is taken care of by all the associated gadgets, an
explicit issue can be settled in lesser time.
Reliability: Reliability implies backing up information. Due to some reason
equipment crashes, and so on, the information gets undermined or inaccessible
on one PC, and another duplicate of similar information is accessible on another
workstation for future use, which prompts smooth working and further handling
without interruption.
Flexible: This innovation is known to be truly adaptable, as it offers clients the
chance to investigate everything about fundamental things, for example,
programming without influencing their usefulness.
Security through Authorization: Security and protection of information are
additionally settled through the system. As just the system clients are approved
to get to specific records or applications, no other individual can crack the
protection or security of information.
Storage capacity: Since you will share data, records, and assets with other
individuals, you need to guarantee all information and substance are
legitimately put away in the framework. With this systems administration
innovation, you can do most of this with no issue, while having all the space
you require for capacity.
Disadvantages of Computer Networks
Some of the main disadvantages of Computer Networking are discussed below:
Expensive: Execution of the network can be expensive in the case of an initial
setup, as the wires and the cost of the cable are high and sometimes equipment
is also costly.
How do LANs Work?
A router serves as the hub where the majority of LANs connect to the Internet.
Home LANs often utilise a single router, but bigger LANs may also use network
switches to transmit packets more effectively.
LANs nearly always connect devices to the network via Ethernet, WiFi, or both
of these technologies. Ethernet is a way to connect devices to the Local Area
Network ethernet define the physical and data link layer of the OSI model. WiFi
is a protocol that is used to connect devices to the Local Area Network
wirelessely.
There are many devices that is connected to the LAN for example Servers,
desktop computers, laptops, printers, Internet of Things (IoT) devices, and even
game consoles. LANs are usually used in offices to give internal staff members
shared access to servers or printers that are linked to the network.

Types of LAN
There are different architectures in LAN as discussed below-
Client/Server LANs: Multiple devices (the clients) are connected to a main
server in a client/server LAN. The server controls network traffic, device
access, application access, and file storage. Any connected device that runs
apps or accesses the Internet qualifies as a client. Clients can use wired or
wireless connections to connect to the server.
Peer-to-Peer LANs: Peer-to-peer LANs are commonly smaller because they
shortage a central server and can’t support huge workloads like client/server
LANs can. Every device on a peer-to-peer LAN collaborates equally to the
network’s operation. Through wired or wireless connections to a switch or
router, the devices share data and resources. Peer-to-peer networks are the
norm in homes.
Ethernet: It is most widely used archetecture. ethernet specifies the network
speed, cable type and network interface adapters. This type of architecture
used in both wired or wireless networks.
Token ring: Token ring is a type of local area network (LAN) setup that was
once widely used but is now less common. It manages network access through
the use of tokens and has an operating speed of 100 megabits per second.
Cloud-managed: A cloud-managed LAN depend on a centralized cloud
service to handle tasks such as access control, policy enforcement, network
setup, and various security and performance issues. This approach simplifies
management in diverse network environments, making it ideal for businesses.
What is a Virtual LAN?
The same physical network can have its traffic divided into two networks using
virtual LANs, or VLANs. Imagine establishing two independent LANs in the
same room, each with its own router and Internet connection. Similar to that, but
with only one router and one Internet connection required, VLANs divide
networks virtually rather than physically.
VLANs are beneficial for network management, particularly in very large LANs.
Administrators may much more simply control the network by segmenting it.
(Subnets, another method of segmenting networks for increased efficiency, differ
greatly from VLANs.)

Differences Between Wired LAN, Wireless LAN and Virtual LAN


Wired LAN
A wired LAN connects devices like, servers, IoT devices, and other electronic
devices to a company network using switches and Ethernet cables. For small
organization, or businesses with a limited number of devices, a wired LAN might
just consist of a single, unmanaged switch with Ethernet ports to connect all the
devices.
Wireless LAN
A wireless LAN allows devices to connect to the network without physical
cables.Wireless LAN or WLANs transfer data over radio waves using wireless
technology. This type of LAN is commonly found in homes, offices, coffee
shops, and restaurants where mobility is important. WLANs enable devices such
as computers, smartphones, and tablets to connect to the internet or other shared
resources. For example connecting mobile to the hotspot is a wireless LAN.
Wireless LANs use the IEEE 802.11 standards to transmit data between devices
and the network through the wireless system. In many cases, WLANs are
preferred over wired LANs due to their flexibility and cost efficiency, as they
eliminate the need for extensive cabling. Businesses considering WLANs as their
main form of connectivity often have users who primarily depend on mobile
devices like smartphones and tablets.
Virtual LAN
In larger LANs that connect thousands of devices, more hardware, software, and
configuration are needed to maintain optimal network performance. This is where
virtual LANs (VLANs) become useful.
A Metropolitan Area Network (MAN) is a type of computer network that spans
over a metropolitan area, typically a city. It provides high-speed data
communication services such as video, audio, and data transfer between multiple
LANs (Local Area Networks) and WANs (Wide Area Networks). The main
Characteristics of MAN
It can covers the area which ranges from 5 to 50 km, which is capable of
carrying from a group of buildings to the whole city.
In MAN, data rates are moderate to high.
In MAN, mostly used medium is optical fibers which results in high-speed
connectivity.
MAN networks provides high reliability because the error rate in this network
is very less.
A MAN network can use a variety of access technologies, such as wireless,
fiber-optic, or copper-based connections, to provide connectivity to different
devices and networks.
Hybrid topology: A MAN network may use a combination of different
topologies, such as a ring, bus, or star topology, depending on the specific
requirements of the network.
Advantages of MAN
MAN offers high-speed connectivity in which the speed ranges from 10-100
Mbps.
The security level in MAN is high and strict as compared to WAN.
It support to transmit data in both directions concurrently because of dual bus
architecture.
MAN can serve multiple users at a time with the same high-speed internet to
all the users.
MAN allows for centralized management and control of the network, making
it easier to monitor and manage network resources and security.
Disadvantages of MAN
The architecture of MAN is quite complicated hence, it is hard to design and
maintain.
This network is highly expensive because it required the high cost to set up
fiber optics.
It provides less fault tolerance.
The Data transfer rate in MAN is low when compare to LANs.
Examples of MAN
Cable TV network.
Used in government agencies.
University campuses.
Used in hospitals to connect multiple buildings
Uses of MAN Network
A Metropolitan Area Network (MAN) has several uses, including:
1. Resource Sharing: A MAN allows multiple LANs in a metropolitan area to
share resources such as printers, storage devices, and other peripherals.
2. Data Exchange: A MAN provides a high-speed communication channel for
the exchange of data between different LANs.
3. Internet Access: A MAN can provide high-speed internet access to users in a
metropolitan area.
4. Video and Audio Streaming: A MAN can support video and audio streaming
for applications such as video conferencing and multimedia presentations.
5. Backup and Recovery: A MAN can provide backup and recovery services for
data stored on multiple LANs.
6. Disaster Recovery: A MAN can provide a secondary communication channel
in the event of a disaster or other emergency that disrupts the primary
communication channel.
7. Centralized Management: A MAN allows centralized management of
network resources, making it easier to monitor and manage the network.

WAN:

A WAN (Wide Area Network) is to connect multiple smaller Local Area Networks
(LANs). It is a computer network designed. WANs can help in communication, the
sharing of information, and much more between systems or devices from around
the world through a WAN provider.
What is a WAN?
WAN stands for Wide Area Network. It is a computer network that covers a large
geographical area consisting of two or more LANs or MANs. These networks are
established with leased telecommunication circuits, in which two sides which are
connected have routers that connect the LAN of both sides together in a network to
facilitate communication.
Circuit switching: Circuit switched networks operate on the virtual connection
principle, which dictates that all messages will take the same way and that
resources along this path are set aside for this connection.
Packet Switching: The size of a packet in a packet switched network is dictated
by the outgoing link, and these packets may follow different route. These
packets are ready to collected and reassembled at the destination.
TCP/IP protocol suite: TCP/IP is a protocol suite of foundational of the
internet protocols used to interconnect devices on Internet and other computers
networks or device network. Full form of TCP/IP is Transmission Control
Protocol/Internet Protocol.
Router: A router is a networking device which transfers data packets between
device networks and also we can say it is used to interconnect LANs to form a
wide area network (WAN).
Packet over SONET/SDH (PoS): Packet over SONET and SDH is a
communication protocol used for WAN transport. When using optical fiber and
SONET or SDH communication protocol used to defines how point-to-point
links communicate.
Multiprotocol Label Switching (MPLS): Multi Protocol Label Switching
(MPLS) is an IP packet routing technique and also a network routing
optimization technique that routes IP packet through paths via labels instead of
looking at complex routing tables of routers.
Characteristics of WAN
Broader Reach: The reach of WAN in terms coverage of geographical area is
very high which can be a region, country or the world itself.
Higher Capacity: The capacity of WAN in terms of number of LANs or
WANs connected in a network is very high, which results in connection of large
number of user over different location all around the globe.
Use of Public Carrier: WAN uses telephone network, cabled system, satellites
etc for connection and transmission purpose which are easily available.
Resource Sharing: WAN enables its users to share data and information over
large area. Computer resources can be accessed remotely which makes
transmission and exchange of data very easy.
Advantages of WAN
It covers large geographical area which enhances the reach of organisation to
transmit data quickly and cheaply.
The data can be stored in centralised manner because of remote access to data
provided by WAN.
The travel charges that are needed to cover the geographical area of work can be
minimised.
WAN enables a user or organisation to connect with the world very easily and
allows to exchange data and do business at global level.
Disadvantages of WAN
Traffic congestion in Wide Area Network is very high.
The fault tolerance ability of WAN is very less.
Noise and error are present in large amount due to multiple connection point.
The data transfer rate is slow in comparison to LAN because of large distances
and high number of connected system within the network.
Internet:
The Internet is the foremost important tool and the prominent resource that is being
used by almost every person across the globe. It connects millions of computers,
webpages, websites, and servers. Using the internet we can send emails, photos,
videos, and messages to our loved ones. Or in other words, the Internet is a
widespread interconnected network of computers and electronic devices(that
support Internet). It creates a communication medium to share and get information
online. If your device is connected to the Internet then only you will be able to
access all the applications, websites, social media apps, and many more services.
The Internet nowadays is considered the fastest medium for sending and receiving
information.
World Wide Web (WWW)
The world wide web is a collection of all the web pages, and web documents that
you can see on the Internet by searching their URLs (Uniform Resource
Locator) on the Internet. For example, www.geeksforgeeks.org is the URL of the
GFG website, and all the content of this site like webpages and all the web
documents are stored on the world wide Web. Or in other words, the world wide
web is an information retrieval service of the web. It provides users with a huge
array of documents that are connected to each other by means of hypertext or
hypermedia links. Here, hyperlinks are known as electronic connections that link
the related data so that users can easily access the related information hypertext
allows the user to pick a word or phrase from text, and using this keyword or
word or phrase can access other documents that contain additional information
related to that word or keyword or phrase. World wide web is a project which is
created by Timothy Berner’s Lee in 1989, for researchers to work together
effectively at CERN. It is an organization, named World Wide Web
Consortium (W3C), which was developed for further development in the web.
Difference Between World Wide Web and the Internet
The main difference between the World Wide Web and the Internet are:

World Wide Web Internet

All the web pages and web documents are


The Internet is a global network
stored there on the World wide web and to find
of computers that is accessed by
all that stuff you will have a specific URL for
the World wide web.
each website.

The world wide web is a service. The Internet is an infrastructure.

The Internet is the superset of


The world wide web is a subset of the Internet.
the world wide web.

The Internet is hardware-


The world wide web is software-oriented.
oriented.

The world wide web uses HTTP. The Internet uses IP Addresses.

The world wide web can be considered as a The Internet can be considered a
book from the different topics inside a Library. Library.

What is Wi-Fi?
WiFi is a wireless technology that allows electronic devices to connect to the
internet and communicate with each other without a physical cable. This uses
radio waves to transmit the data between a WiFi router and compatible devices
like smartphones, computers, and smart home gadgets. These WiFi networks are
common in homes, offices, and public spaces providing convenient internet
access and local connectivity. This technology has become an essential part of
modern digital life enabling wireless internet browsing, file sharing, and device
communication in various settings.
Applications of Wi-Fi
Using Wi-Fi we can access the internet in any Wi-Fi-capable device
wirelessly. We can stream or cast audio or video wirelessly on any device
using Wi-Fi for our entertainment.
We can share files, data, etc between two or more computers or mobile phones
using Wi-Fi, and the speed of the data transfer rate is also very high. Also, we
can print any document using a Wi-Fi printer, this is very much used
nowadays.
We can use Wi-Fi as HOTSPOTS also, it points Wireless Internet access for a
particular range of area. Using Hotspot the owner of the main network
connection can offer temporary network access to Wi-Fi-capable devices so
that the users can use the network without knowing anything about the main
network connection. Wi-Fi adapters are mainly spreading radio signals using
the owner network connection to provide a hotspot.
Using Wi-Fi or WLAN we can construct simple wireless connections from one
point to another, known as Point to point networks. This can be useful to
connect two locations that are difficult to reach by wire, such as two buildings
of corporate business.
One more important application is VoWi-Fi, which is known as voice-over
Wi-Fi. Some years ago telecom companies are introduced VoLTE (Voice over
Long-Term Evolution ). Nowadays they are introduced to VoWi-Fi, by which
we can call anyone by using our home Wi-Fi network, only one thing is that
the mobile needs to connect with the Wi-Fi. Then the voice is transferred using
the Wi-Fi network instead of using the mobile SIM network, so the call quality
is very good. Many mobile phones are already getting the support of VoWi-Fi.
In an office, all the computers are interconnected using Wi-Fi. For Wi-Fi,
there are no wiring complexities. Also, the speed of the network is good. For
Wi-Fi, a project can be presented to all the members at a time in the form of an
excel sheet, ppt, etc. For Wi-Fi, there is no network loss as in cable due to
cable break.
Also using W-Fi a whole city can provide network connectivity by deploying
routers at a specific area to access the internet. Already schools, colleges, and
universities are providing networks using Wi-Fi because of its flexibility. Wi-
Fi is used as a positioning system also, by which we can detect the positions of
Wi-Fi hotspots to identify a device location.

5G Technology:
5G Wireless Technology is the 5th generation of mobile networks and an
evolution from the current 4G LTE networks. It is specially designed to fulfill the
demands of current technological trends, which includes a large growth in data
and almost global connectivity along with the increasing interest in the Internet of
Things. In its initial stages, 5G Technology will work in conjugation with the
existing 4G Technology and then move on as a fully independent entity in
subsequent releases. Now let’s try to answer some of the major questions
associated with 5G Wireless Technology so that we can understand it better.
What is 5G Wireless Technology?
5G Wireless Technology is now the latest cellular technology that will greatly
increase the speed of wireless networks among other things(And who doesn’t
want that?!!). So the data speed for wireless broadband connections using 5G
would be at a maximum of around
20 Gbps
. Contrasting that with the peak speed of 4G which is
60 Mbps
, that’s a lot! Moreover, 5G will also provide more bandwidth and advanced
antenna technology which will result in much more data transmitted over wireless
systems. And that’s just a small sampling of the capabilities of 5G technology! It
will also provide various network management features such as
Network Slicing
using which mobile operators will be able to create multiple virtual networks
using a single physical 5G network. So in this futuristic scenario, if you are inside
a self-driving car, then a virtual network with an extremely fast, low-latency
connections would be required because obviously the car needs to navigate in
real-time. On the other hand, if you are using any smart appliance in your home,
then a virtual network with lower power and a slower connection would be fine
because it’s not a life or death situation!!!
How does 5G Wireless Technology Work?
There are basically 2 main components in the 5G Wireless Technology systems
i.e. the Radio Access Network and the Core Network. Let’s see these in detail.
1. Radio Access Network:
The Radio Access Network mainly includes 5G
Small Cells
and
Macro Cells
that form the crux of 5G Wireless Technology as well as the systems that connect
the mobile devices to the Core Network. The 5G Small Cells are located in big
clusters because the millimeter wave spectrum (that 5G uses for insanely high
speeds!) can only travel over short distances. These Small Cells complement the
Macro Cells that are used to provide more wide-area coverage. Macro Cells use
MIMO
(Multiple Inputs, Multiple Outputs) antennas which have multiple connections to
send and receive large amounts of data simultaneously. This means that more
users can connect to the network simultaneously.
2. Core Network:
The Core Network manages all the data and internet connections for the 5G
Wireless Technology. And a big advantage of the 5G Core Network is that it can
integrate with the internet much more efficiently and it also provides additional
services like
cloud-based services, distributed servers
that improve response times, etc. Another advanced feature of the Core Network
is
network slicing
(Which we talked about earlier!!!).
What are the Benefits of 5G Wireless Technology?
5G Wireless Technology will not only enhance current mobile broadband
services, but it will also expand the world of mobile networks to include many
new devices and services in multiple industries from retail to education to
entertainment with much higher performances and lower costs. It could even be
said that 5G Technology as much as the emergence of automobiles or electricity
ever did!!! Some of the benefits of 5G in various domains are given here:
5G will make our smartphones much smarter with faster and more uniform
data rates, lower latency and cost-per-bit and this, in turn, will lead to the
common acceptance of new immersive technologies like Virtual Reality or
Augmented Reality.
5G will have the convenience of ultra-reliable, low latency links that will
empower industries to invest in more projects which require remote control of
critical infrastructure in various fields like medicine, aviation, etc.
5G will lead to an Internet of Things revolution as it has the ability to scale
up or down in features like data rates, power, and mobility which is perfect for
an application like connecting multiple embedded sensors in almost all
devices!
What are the Parameters for 5G Wireless Technology?
Details about the performance of 5G Wireless Technology according to various
parameters are given here:

At least 20Gbps downlink and 10Gbps uplink per mobile


Peak data rate base station.

Real-world data
Download speed of 100Mbps and upload speed of 50Mbps.
rate

Spectral 30bits/Hz downlink and 15 bits/Hz uplink. This assumes


efficiency 8×4 MIMO

Latency Maximum latency of just 4ms (compared to 20ms for LTE)


At least 20Gbps downlink and 10Gbps uplink per mobile
Peak data rate base station.

Connection At least 1 million connected devices per square kilometre (to


density enable IoT support)

HTML (Hyper Text Markup Language) is used to create web pages and web
applications. It is a markup language. By HTML we can create our static page. It
is used for displaying the data not to transport the data.
HTML is a combination of Hypertext and Markup language. Hypertext defines
the link between the web pages. A markup language is used to define the text
document within the tag which defines the structure of web pages. This language
is used to annotate (make notes for the computer) text so that a machine can
understand it and manipulate text accordingly.
XML:
XML (Extensible Markup Language) is a versatile markup language designed
for carrying and storing data. It allows users to define their custom tags, making it
highly flexible. XML is often used for data interchange between different
systems, enabling the sharing of structured information.
XML is also used to create web pages and web applications. It is dynamic
because it is used to transport the data not for displaying the data. The design
goals of XML focus on simplicity, generality, and usability across the Internet. It
is a textual data format with strong support via Unicode for different human
languages. Although the design of XML focuses on documents, the language is
widely used for the representation of arbitrary data structures such as those used
in web services.

Difference between HTML and XML


HTML XML

It was written in 1993. It was released in 1996.


HTML XML

HTML stands for Hyper Text Markup XML stands for Extensible Markup
Language. Language.

HTML is static in nature. XML is dynamic in nature.

It was developed by Worldwide Web


It was developed by WHATWG.
Consortium.

It is neither termed as a presentation


It is termed as a presentation language.
nor a programming language.

XML provides a framework to define


HTML is a markup language.
markup languages.

HTML can ignore small errors. XML does not allow errors.

It has an extension of .html and .htm It has an extension of .xml

HTML is not Case sensitive. XML is Case sensitive.

HTML tags are predefined tags. XML tags are user-defined tags.

There are limited number of tags in


XML tags are extensible.
HTML.

HTML does not preserve white spaces. White space can be preserved in XML.

HTML tags are used for displaying the XML tags are used for describing the
data. data not for displaying.

In HTML, closing tags are not


In XML, closing tags are necessary.
necessary.

HTML is used to display the data. XML is used to store data.

HTML does not carry data it just XML carries the data to and from the
HTML XML

displays it. database.

IN XML, the objects are expressed by


HTML offers native object support.
conventions using attributes.

XML document size is relatively large


HTML document size is relatively
as the approach of formatting and the
small.
codes both are lengthy.

An additional application is not DOM(Document Object Model) is


required for parsing of JavaScript code required for parsing JavaScript codes
into the HTML document. and mapping of text.

Tools for web Design:


Web design, as the name suggests, refers to design a website. It is a way of
presenting the website online. Websites should be created effectively that not
only looks good but also functions properly as well as should rank at the top in
search engine. Web Design tools simply refer to material or software programs
generally used to develop effective, beautiful, and responsive websites.
Nowadays, there are various web design tools available to be used by developers
or designers. Choosing the best web design tool usually comes down to its main
purpose and functionality. Best tools will make it simple and easier to develop the
website as per requirement. One has to choose the most appropriate tool on basis
of the size of the team, type of website, budget, all resources, and technical
requirements. There are basically two main tools by which a website can be
designed as given below:
1. Desktop Apps: While designing websites, there are many desktop apps to
choose from. One has to decide which one is right for them. Such apps require
designers to develop their design and then transfer it to the development team.
The development team has to face all technical challenges and convert the design
to code. But this process is quite expensive, time-consuming, and requires more
team members and developers, etc. Some of the desktop apps used are Figma,
WordPress, Bluefish, Envision Studio, etc. But most popular and highly used web
designing desktop apps are Sketch and Photoshop.
Photoshop: Photoshop is a widely used app for designing the web. It includes
a lot of features such as artboards, character style, provides professional tools
to help create and enhance pictures, use grid systems, improve web export
options, control quality and file size of graphics, create quick color fills, etc.
Because of such amazing features, photoshop is used mostly by designers. It
provides creative and attractive looking logos and gives flexibility and options
to create logos.
Sketch: Sketch is basically a vector graphic editor widely used for macOS. It
is considered the best tool for User interface design along with responsive web
design. It is the best option for Mac users who want an affordable and
effective web design desktop app. It also makes the design process smooth and
easy. Some features include automate asset exports, analyze color contrast
with a stark plugin, define measurements with math functions, ease of use,
vector based-app, include licensing system, etc.
If one does not want to involve any developer, then one can go for another choice
to design website i.e. website builders. It is a more effective way to develop a
website with less technical requirements.
2. Website Builders: Website builders are basically tools that are used to
construct websites without any manual code editing. In simple words, it is a
platform or program that helps one to create a website quickly and easily. It is
easier for one to create a website with a little bit of effort and coding skills.
Nowadays, different website builders are available in the market that includes a
wide variety of features and services. Some website builders are HostGator,
Squarespace, Wix, Webflow, etc. Various features of website builder include ease
of use, blogging tools, template customization option, eCommerce solutions, etc.
One has to choose the most effective website builder. Not all Website Builder
will offer you features that you require in your website such as WordPress.
WordPress is widely used by website builders but it offers only limited
customization options so it is not popular with visual designers. Therefore, before
choosing any website builder for creating a website, one has to determine what
are the exact website requirements such as photo gallery, contact information,
how to update website, etc. Accordingly decide the most appropriate one to fulfill
requirements.

What is Social Media?


Social media is a network of people through which people connect with each other
online and share information. People access these types of services from mobile
devices, laptops, desktop applications, and websites. There are millions of social
media users worldwide. People use social media services for different reasons like
connecting with new contacts, reconnecting with former friends, maintaining
current relationships, promoting their business or project, to taking part in
discussions on different topics. Some common social media sites are Facebook,
Twitter, Snapchat, Instagram, WhatsApp, etc. On these social media sites, there are
millions of users who sign in every day.
What is Social Media?
There are different kinds of social media available in the market, people access
them using websites or applications. They create their profile on these social media
platforms by providing their name, contact number, or email address.
When the profile is created a user, can share the content on social media. For
example, we download Instagram from the Play Store or open it on the web, we
create our profile using an email address. Now we can share any picture or video
with a caption. We can follow other users, can comment on their pictures, etc.
What are the types of Social Media?
There are different kinds of social media, and they provide a variety of services,
below are a few types of social media with examples.
Social Network: This type of social media deals with the exchange of thoughts,
ideas, and content with other users. The best example of social network is
Facebook and Twitter. LinkedIn is also an example of a social network, but it is
more professional.
Media Networks: Through this type of social media people share media files like
photos, videos, and other content with each other. YouTube and Instagram are the
best examples of media networks. People upload the media on these platforms and
other users can like, dislike and comment according to their interests.
Review Networks: These kinds of social media helps in reviewing the product and
services. Yelp and TripAdvisor are examples of review networks.
Discussion Networks: With the help of these platforms people can discuss various
issues across the world. Reddit, and Stackoverflow are some of the best examples
of discussion networks.
What Are the Top Social Media Sites?
Examples of Social Media:
Below are the most popular Social Media Networks across the globe,
Facebook (2.74 billion users)
YouTube (2.29 billion users)
WhatsApp (2 billion users)
Facebook Messenger (1.3 billion users)
Instagram (1.22 billion users)
WhatsApp (1.21 billion users)
TikTok (689 million users)

What are the Benefits of Social Media?


In today’s world, people use different kinds of social media platforms. These
platforms have their own advantages and disadvantages.
Some advantages of social media are as follows:
1. It brings people together: Social media sites provide us with open
communication, and we can discover and deliver information easily. Anyone
can find new people, and their friends and can communicate with them.
2. Increased breadth of knowledge: With the help of social media people can
share their knowledge or something about almost anything in the world. The
connection of social media is really broad. It connects people from all around
the world.
3. Attract attention: Aside from building loyalty and long-term relations with
your audience, social media can attract attention to your site, product, or
services.
4. Social media optimization: Social media is really helpful in promotion and
advertisement. Using social media people can share their brands, products, or
services online with the whole world.
5. Help in Education: People can take a lot of help in their education from social
media. We can learn from other people online, and it provides the best ever
learning opportunities. A few examples are YouTube, Google, Yahoo, etc.
6. Social Media Helps Government: Government takes a lot of advantages from
social media. It is a powerful way for the government to interact with the public.
It is very easy for the government to spread awareness of any issue to the public
through social media.
7. As an Entertainment: Social media is one of the easiest ways to entertain
people. Most people join social media to entertain themselves. People share
different kinds of photos, and videos on social media to entertain others.
What are the Disadvantages of Social Media?
Although the idea of online social networking sounds very useful, however, there
is a certain element of risk and disadvantages involved in it. Some of these
advantages are explained here:
1. Privacy: While a user can protect himself, he cannot control what others post
about him. This is a growing concern as employers are beginning to search for
information about new and potential employees.
2. Distraction: Many people suffer distraction from their goals because of social
media and most of them are students. Instead of doing their homework, they
tend to fail in their academic endeavors because they use social media in the
wrong way.
3. Social Media Bullying or Cyberbullying: One of the worst things about social
media is cyberbullying. People tease and troll other people for their images,
videos, or opinion they do not like.
4. Fraud: Sometimes a stranger is not someone who is he trying to pretend.
People make fake profile on social media and cheats other. We have seen many
people get cheated. Their money is lost and other important information they
share is also in danger.
5. Health Issues: Excess use of social media also affect the health of people.
People become lazy and fatty, they start hating going outside which causes
serious health issues.
6. Spread Fake News: Social media spread fake news very fast. People post any
fake news or information, and it becomes viral very soon. Nobody tries to find
out the reality of the news, instead, they start sharing it.
7. Hacking: Hacking is one of the biggest disadvantages of social media. Hacking
is not allowed anywhere, by hacking, hackers get your personal and restricted
information.

Online Social Networks:

Introduction
Social Networking refers to grouping of individuals and organizations together via
some medium, in order to share thoughts, interests, and activities.

There are several web based social network services are available such as
facebook, twitter, linkedin, Google+ etc. which offer easy to use and interactive
interface to connect with people with in the country an overseas as well. There are
also several mobile based social networking services in for of apps such as
Whatsapp, hike, Line etc.

Available Social networking Services

The following table describes some of the famous social networking services
provided over web and mobile:

S.N
Service Description
.
1. Facebook
Allows to share text, photos, video etc. It also offers interesting online games.
Google+
2.
It is pronounced as Google Plus. It is owned and operated by Google.
Twitter
3. Twitter allows the user to send and reply messages in form of tweets. These
tweets are the small messages, generally include 140+ characters.
Faceparty
4. Faceparty is a UK based social networking site. It allows the users to create
profiles and interact with each other using forums messages.
Linkedin
5.
Linkedin is a business and professional networking site.
Flickr
6.
Flickr offers image hosting and video hosting.
Ibibo
7. Ibibo is a talent based social networking site. It allows the users to promote
one’s self and also discover new talent.
Whatsapp
8. It is a mobile based messaging app. It allows to send text, video, and audio
messages
Line
9.
It is same as whatsapp. Allows to make free calls and messages.
Hike
10. It is also mobile based messager allows to send messages and exciting
emoticons.
Where Social Networking Helps
Following are the areas where social networking has become most popular:
Online Marketing
Website like facebook allows us to create a page for specific product, community
or firm and promiting over the web.
Online Jobs
Website like linkedin allows us to create connection with professionals and helps
to find the suitable job based on one’s specific skills set.
Online News
On social networking sites, people also post daily news which helps us to keep us
updated.
Chatting
Social networking allows us to keep in contact with friends and family. We can
communicate with them via messages.
Share Picture, Audio and video
One can share picture, audio and video using social networking sites.

What is Information Security?


Information security is the practice of protecting information by mitigating
information risks. It involves the protection of information systems and the
information processed, stored, and transmitted by these systems from
unauthorized access, use, disclosure, disruption, modification, or destruction.
This includes the protection of personal information, financial information, and
sensitive or confidential information stored in both digital and physical forms.
Effective information security requires a comprehensive and multi-disciplinary
approach, involving people, processes, and technology.
What is Information Security (InfoSec)?
Information Security is not only about securing information from unauthorized
access. Information Security is basically the practice of preventing unauthorized
access, use, disclosure, disruption, modification, inspection, recording, or
destruction of information. Information can be a physical or electronic one.
Information can be anything like Your details or we can say your profile on social
media, your data on your mobile phone, your biometrics, etc. Thus Information
Security spans so many research areas like Cryptography, Mobile Computing,
Cyber Forensics, Online Social Media, etc.
During the First World War, a Multi-tier Classification System was developed
keeping in mind the sensitivity of the information. With the beginning of the
Second World War, formal alignment of the Classification System was done.
Alan Turing was the one who successfully decrypted the Enigma Machine which
was used by Germans to encrypt warfare data.
Effective information security requires a comprehensive approach that considers
all aspects of the information environment, including technology, policies and
procedures, and people. It also requires ongoing monitoring, assessment, and
adaptation to address emerging threats and vulnerabilities.
Why We Use Information Security?
We use information security to protect valuable information assets from a wide
range of threats, including theft, espionage, and cybercrime. Here are some key
reasons why information security is important:
Protecting sensitive information: Information security helps protect sensitive
information from being accessed, disclosed, or modified by unauthorized
individuals. This includes personal information, financial data, and trade
secrets, as well as confidential government and military information.
Mitigating risk: By implementing information security measures,
organizations can mitigate the risks associated with cyber threats and other
security incidents. This includes minimizing the risk of data breaches, denial-
of-service attacks, and other malicious activities.
Compliance with regulations: Many industries and jurisdictions have
specific regulations governing the protection of sensitive information.
Information security measures help ensure compliance with these regulations,
reducing the risk of fines and legal liability.
Protecting reputation: Security breaches can damage an organization’s
reputation and lead to lost business. Effective information security can help
protect an organization’s reputation by minimizing the risk of security
incidents.
Ensuring business continuity: Information security helps ensure that critical
business functions can continue even in the event of a security incident. This
includes maintaining access to key systems and data, and minimizing the
impact of any disruptions.
What are the 3 Principles of Information Security?
Information security is necessary to ensure the confidentiality, integrity, and
availability of information, whether it is stored digitally or in other forms such as
paper documents. Information Security programs are build around 3 objectives,
commonly known as CIA – Confidentiality, Integrity, Availability.
Confidentiality – Means information is not disclosed to unauthorized
individuals, entities and process. For example if we say I have a password for
my Gmail account but someone saw while I was doing a login into Gmail
account. In that case my password has been compromised and Confidentiality
has been breached.
Integrity – Means maintaining accuracy and completeness of data. This means
data cannot be edited in an unauthorized way. For example if an employee
leaves an organisation then in that case data for that employee in all
departments like accounts, should be updated to reflect status to JOB LEFT so
that data is complete and accurate and in addition to this only authorized
person should be allowed to edit employee data.
Availability – Means information must be available when needed. For
example if one needs to access information of a particular employee to check
whether employee has outstanded the number of leaves, in that case it requires
collaboration from different organizational teams like network operations,
development operations, incident response and policy/change
management. Denial of service attack is one of the factor that can hamper the
availability of information.

CYBER SECURITY:

Cyber Security is the body of technologies, processes, and practices designed to


protect networks, devices, programs, and data from attack, theft, damage,
modification, or unauthorized access. This includes using special programs to
check for harmful software and learning how to recognize and avoid online
scams. By practicing good cybersecurity, you can ensure your data stays private
and your online experiences are secure. It’s also known as Information
Security (INFOSEC), Information Assurance (IA), or System Security.
What is Cyber Security?
Cyber Security is the technique of protecting your systems, digital devices,
networks, and all of the data stored in the devices from cyber attacks. By
acquiring knowledge of cyber attacks and cyber security we can secure and
defend ourselves from various cyber attacks like phishing and DDoS
attacks. It uses tools like firewalls and antivirus software to protect your
devices from hackers and malware.
Encryption is the technique that helps to keep your personal information
private, you can only read it. Cybersecurity also teaches you how to spot
tricks like phishing, where bad guys try to steal your info by pretending to
be someone you trust. In short, cybersecurity keeps your online world safe
and secure.
Different Types of Cybersecurity
1. Network Security
Focuses on securing computer networks from unauthorized access, data breaches,
and other network-based threats. It involves technologies such
as Firewalls, Intrusion detection systems (IDS), Virtual private
networks (VPNs), and Network segmentation.
Guard your internal network against outside threats with increased network
security.
Sometimes we used to utilize free Wi-Fi in public areas such as cafes, Malls,
etc. With this activity, 3rd Party starts tracking your Phone over the internet. If
you are using any payment gateway, then your bank account can be Empty.
So, avoid using Free Network because Free Network Doesn’t support
Securities.
2. Application Security
Concerned with securing software applications and preventing vulnerabilities that
could be exploited by attackers. It involves secure coding practices, regular
software updates and patches, and application-level firewalls.
Most of the Apps that we use on our cell phones are Secured and work under
the rules and regulations of the Google Play Store.
There are 3.553 million applications in Google Play, Apple App Store has
1.642 million, and Amazon App Store has 483 million available for users to
download. When we have other choices, this does not mean that all apps are
safe.
Many of the apps pretend to be safe, but after taking all information from us,
the app shares the user information with the 3rd-party.
The app must be installed from a trustworthy platform, not from some 3rd
party website in the form of an APK (Android Application Package).
3. Information or Data Security
Focuses on protecting sensitive information from unauthorized access, disclosure,
alteration, or destruction. It includes Encryption, Access controls, Data
classification, and Data loss prevention (DLP) measures.
Incident response refers to the process of detecting, analyzing, and responding
to security incidents promptly.
Promoting security awareness among users is essential for maintaining
information security. It involves educating individuals about common security
risks, best practices for handling sensitive information, and how to identify
and respond to potential threats like phishing attacks or social engineering
attempts.
Encryption is the process of converting information into an unreadable format
(ciphertext) to protect it from unauthorized access.
4. Cloud Security
It involves securing data, applications, and infrastructure hosted on cloud
platforms, and ensuring appropriate access controls, data protection, and
compliance. It uses various cloud service providers such as AWS, Azure, Google
Cloud, etc., to ensure security against multiple threats.
Cloud-based data storage has become a popular option over the last decade. It
enhances privacy and saves data on the cloud, making it accessible from any
device with proper authentication.
These platforms are free to some extent if we want to save more data than we
have to pay.
AWS is also a new Technique that helps to run your business over the internet
and provides security to your data
5. Mobile Security
It involves securing the organizational and personal data stored on mobile devices
such as cell phones, tablets, and other similar devices against various malicious
threats. These threats are Unauthorized access, Device loss or Theft, Malware,
etc.
Mobile is a very common device for day-to-day work. Everything we access
and do is from a mobile phone. Ex- Online class, Personal Calls, Online
Banking, UPI Payments, etc.
Regularly backing up mobile device data is important to prevent data loss in
case of theft, damage, or device failure.
Mobile devices often connect to various networks, including public Wi-Fi,
which can pose security risks. It is important to use secure networks whenever
possible, such as encrypted Wi-Fi networks or cellular data connections.
6. Endpoint Security
Refers to securing individual devices such as computers, laptops, smartphones,
and IoT devices. It includes antivirus software, intrusion prevention systems
(IPS), device encryption, and regular software updates.
Antivirus and Anti-malware software that scans and detects malicious
software, such as Viruses, Worms, Trojans, and Ransomware. These tools
identify and eliminate or quarantine malicious files, protecting the endpoint
and the network from potential harm.
Firewalls are essential components of endpoint security. They monitor and
control incoming and outgoing network traffic, filtering out potentially
malicious data packets.
Keeping software and operating systems up to date with the latest security
patches and updates is crucial for endpoint security.
5. Critical Infrastructure Security
All of the physical and virtual resources, systems, and networks that are
necessary for a society’s economics, security, or any combination of the above
to run smoothly are referred to as critical infrastructure. Food and agricultural
industries, as well as transportation systems, comprise critical infrastructure.
The infrastructure that is considered important might vary depending on a
country’s particular demands, resources, and level of development, even
though crucial infrastructure is comparable across all nations due to basic
living requirements.
Industrial control systems (ICS), such as supervisory control and data
acquisition (SCADA) systems, which are used to automate industrial
operations in critical infrastructure industries, are frequently included in
critical infrastructure. SCADA and other industrial control system attacks are
very concerning. They can seriously undermine critical infrastructure,
including transportation, the supply of oil and gas, electrical grids, water
distribution, and wastewater collection.
Due to the links and interdependence between infrastructure systems and
sectors, the failure or blackout of one or more functions could have an
immediate, detrimental effect on several sectors.
6. Internet of Things (IoT) Security
Devices frequently run on old software, leaving them vulnerable to recently
identified security vulnerabilities. This is generally the result of connectivity
problems or the requirement for end users to manually download updates from
a C&C center.
Manufacturers frequently ship Internet of Things (IoT) devices (such as home
routers) with easily crackable passwords, which may have been left in place by
suppliers and end users. These devices are easy targets for attackers using
automated scripts for mass exploitation when they are left exposed to remote
access.
APIs are frequently the subject of threats such as Man in the Middle (MITM),
code injections (such as SQLI), and distributed denial of service (DDoS)
attacks since they serve as a gateway to a C&C center. You can read more
about the effects of attacks that target APIs here.

What is Cyber Law?


Cyber law, on the other hand, refers to a collection of policies or regulations that
govern what happens on the internet. The aim of cyber law is the prevention of
online crimes, protection of digital property, and management of human behavior
on the internet. The first cyber law was the Computer Fraud and Abuse Act of
1986. Till now, many cyber laws exist worldwide, all having different rules and
punishments.
These laws have made the internet safe, and consequently, people are protected
with rights, privacy, and security as technology in the digital place advances.
Cyber law has assumed a vital role in shielding people from threats in the online
world and giving assurance on the safe use of the internet.
Types of Cyber Laws
The following laws collectively contribute to creating a legal framework:
Type of Cyber Law Description
Laws that regulate the collection, storage, and use of
Data Protection
personal data to ensure individuals' privacy rights are
Laws
protected.
Type of Cyber Law Description
Laws that define criminal offenses related to cyber
Cybercrime Laws activities, such as hacking, identity theft, cyberbullying,
and online fraud.

Laws that protect digital creations, including patents,


Intellectual
copyrights, trademarks, and trade secrets, from
Property Laws
unauthorized use or reproduction.

Laws that govern the right to privacy and confidentiality


Privacy Laws of personal information, including regulations on
surveillance, data breaches, and online tracking.

Laws that establish legal requirements and standards for


Electronic
electronic transactions, including electronic signatures,
Transactions Laws
contracts, and records.

Laws that mandate cybersecurity measures and


Computer Security
standards to protect computer systems and networks
Laws
from cyber threats and attacks.

Cyber Ethics and Laws and regulations aimed at promoting ethical


Internet conduct, responsible internet usage, and governing the
Governance global internet infrastructure.

Laws that regulate online business activities, such as


E-commerce Laws online sales, advertising, consumer protection, and
dispute resolution
Importance of Cyber Law
Cyberlaw is highly important in keeping the Internet safe and secured. These
provide safety to individuals, firms, and governments from growing danger that is
cybercrime. Cyberlaw helps reduce risks, settle disagreements, and ensure
responsibility in the digital world by creating legal rules for online activities.
Cyberlaw also encourages trust and faith in online exchanges, which helps e-
commerce, digital innovation, and connecting people around the world. Because
cyber dangers are always changing, it is very important that cyber law protects our
digital lives and encourages a safe online environment.
Advantages of Cyber Law
Personal Information Protection: Cyber laws promote online security and
privacy by preventing the unauthorized use of personal information.
Reduced Cybercrime: By defining illegal activities and establishing sanctions,
cyber laws dissuade individuals and groups from committing cybercrimes.
Enhanced Confidence in Online Transactions: Cyber laws provide criteria
for electronic contracts and digital signatures, increasing trust in online
transactions.
Cyber laws safeguard intellectual property by making it unlawful to use or
pirate digital items such as books, music, and software.
Cyber rules require firms to use security measures that
decrease vulnerabilities and improve cybersecurity overall. This helps to
improve cybersecurity.
Legal Recourse: Cyber laws establish a framework for resolving disputes and
allow victims of cybercrime to submit legal claims and seek compensation.

You might also like