0% found this document useful (0 votes)
10 views

Computer Networks and Internet Securities

Uploaded by

tushmakol8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
10 views

Computer Networks and Internet Securities

Uploaded by

tushmakol8
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 30

COMPUTER NETWORKS AND

INTERNET SECURITIES
Name: Jeet Sanjay Tank
Class: 12 Science
School: Savvy International School
CERTIFICATE

 This is to certify that Jeet Sanjay Tank, a student of class 12 th has


successfully completed the research project on the topic “Indian
Mathematicians and their contributions.” under the guidance of mathematics
teacher Sanjay sir. This project is absolutely genuine and does not indulge
in plagiarism of any kind. The reference taken in making this project have
been declared at the end of the report.

_________________ _________________

Internal Examiner External Examiner


ACKNOWLEDGEMENT

I Jeet Sanjay Tank of class 12th (science) of Savvy International School


performed this project under the guidance of my computer teacher Deepak
sir.

I am very thankful to my teacher and parents who helped me in my


investigatory project. Without whose motivation and help the successful
completion of this project would not have been possible.
WHAT IS A COMPUTER NETWORK???
 A computer network is a collection of interconnected autonomous computing devices so as to
exchange information or share resources.
 Some of the examples of network in our everyday life includes:
1. Social network
2. Mobile network
3. Network of computers
 The network size may vary from small to large depending on the number of computers it
connects. A computer network can include different types of hosts (also called nodes) like
server, desktop, laptop, cellular phones.
COMPONENTS OF
COMPUTER NETWORK
To communicate data through different transmission media and to configure networks with
different functionality, we require different devices like Hosts ,Servers , cables , Network
hardware, etc.

Major components of a Computer Networks are:


1. Hosts Nodes (such as PC, laptops, smartphones etc.)
2. Servers
3. Client
4. Network hardware (such as NIC, router, switch, hub etc.)
5. Communication channel (such as cables, radio-links etc.)
6. Software (such as protocols, network operating system etc.)
7. Network services (such as BNS)
TYPES OF NETWORKS
There are various types of computer networks ranging from network of handheld devices (like
mobile phones or tablets) connected through Wi-Fi or Bluetooth within a single room to the
millions of computers spread across the globe. Some are connected wireless while others are
connected through wires.
Based on the geographical area covered and data transfer rate, computer networks are broadly
categorized as:
 PAN (Personal Area Network)
 LAN (Local Area Network)
 MAN (Metropolitan Area Network)
 WAN (Wide Area Network)
PERSONAL AREA NETWORK(PAN)
 It is a network formed by connecting a few
personal devices like computers, laptops, mobile
phones, smart phones, printers etc.
 All these devices lie within an approximate
range of 10 meters. A personal area network
may be wired or wireless.
 For example, a mobile phone connected to the
laptop through USB forms a wired PAN while
two smartphones communicating with each
other through Bluetooth technology form a
wireless PAN or WPAN
LOCAL AREA NETWORK (LAN)
 It is a network that connects computers, mobile phones, tablet, mouse, printer, etc., placed at a
limited distance.
 The geographical area covered by a LAN can range from a single room, a floor, an office
having one or more buildings in the same premise, laboratory, a school, college, or university
campus.
 The connectivity is done by means of wires, Ethernet cables, fiber optics, or Wi-Fi
 It is a network that connects computers, mobile phones, tablet, mouse, printer, etc., placed at a
limited distance.
 The connectivity is done by means of wires, Ethernet cables,
fiber optics, or Wi-Fi.
WIDE AREA NETWORK(WAN)
 Wide Area Network connects computers and other LANs
and MANs, which are spread across different geographical
locations of a country or in different countries or continents.
A WAN could be formed by connecting a LAN to other LANs
via wired/wireless media.
 Large business, educational and government organizations
connect their different branches in different locations across
the world through WAN.
 The Internet is the largest WAN that connects billions of
computers, smartphones and millions of LANs from different
continents.
METROPOLITAN AREA NETWORK (MAN)
 The Metropolitan Area Network, or MAN, spans a wider
area than a LAN and a smaller area than a WAN. It links
two or more computers that are located in separate cities
but are connected through a network. It serves as an
Internet Service Provider (ISP) and covers a vast
geographical area.
 MAN speeds are measured in megabits per second. A
Metropolitan Area Network is difficult to develop and
maintain.
 Cable TV network or cable based broadband
internet services are examples of MAN.
NETWORK TOPOLOGIES
 The pattern of interconnection of nodes in a network is called the Topology
 There are a number of factors to consider in making this choice, the most important of which
are set out below:-
1.Cost. For a network to be cost effective, one would try to minimize installation cost. This may
be achieved by using well understood media and also, to a lesser extent, by minimizing the
distances involved.
2.Flexibility. Because the arrangement of furniture, internal walls etc. in offices is often subject to
change, the topology should allow for easy reconfiguration of the network. This involves
moving existing nodes and adding new ones.
3.Reliability. Failure in a network can take two forms. Firstly, an individual node can malfunction.
It is not nearly as serious as the second type of fault where the network itself fails to operate.
The topology chosen for the network can help by allowing the location of the fault to be
TYPES OF TOPOLOGIES
There are mainly five types of topologies:-
1. Star topology
2. The bus
3. The Ring
4. The Tree
5. The Mesh
When in a network each host is connected to other directly i.e. there is a direct link between each
host, then the network is said to be fully connected. This characteristic is termed as full
connectivity
THE STAR TOPOLOGY

 This topology consists of a central node to which all other


nodes are connected by a single path. It is the topology used
in most existing information networks involving data
processing or voice communications.
• Each node connected directly to a central network hub or
concentrator.
• Data passes through the hub or concentrator before
continuing.
• The hub or concentrator manages and controls all functions
of the network.
ADVANTAGES AND DISADVANTAGES OF STAR
TOPOLOGY
Advantages Disadvantages

 In the star topology, failure of a single  Long cable length ecause each node is
connection typically involves disconnecting directly connected to the center, the star
one node from an otherwise fully functional topology necessitates a large quantity of
network. cable

 The central node is connected directly to  The addition of a new node to a star network
every other node in the network means that involves a connection all the way to the
faults are easily detected and isolated. It is a central node hence difficult to expand.
simple matter to disconnect failing nodes from
the system.
THE BUS TOPOLOGY

1. The bus topology is used in traditional data communication


network where the host at one end of the bus communicates
with several terminals attached along its length.
2. The transmission from any station travels the length of the
bus, in both directions, and can be received by all other
stations.
3. The bus has terminators at either end which absorb the
signal, removing it from the bus. Data is transmitted in small
blocks, known as packets.
4. Each packet has some data bits, plus a header containing its
destination address. A station wanting to transmit some data
sends it in packets along the bus.
ADVANTAGES AND DISADVANTAGES OF BUS TOPOLOGY
Advantages Disadvantages

1. Short cable length and simple wiring 1. Control of the network is not centralized in
layout:- Because there is a single common any particular node this means that
data path connecting all nodes, the linear detection of a fault may have to be
topology allows a very short cable length to performed from many points in the network.
be used

2. If a node is faulty on the bus, it must be


2. The LINEAR architecture has an inherent rectified at the point where the node is
simplicity that makes it very reliable from a connected to the network therefore false
hardware point of view. There is a single isolation is difficult
cable through which all the data propagates
and to which all nodes are connected.
THE RING TOPOLOGY

1. In this case, each node is connected to two and only two


neighboring nodes.
2. Data is accepted from one of the neighboring nodes and is
transmitted onwards to another. Thus data travels in one
direction only, from node to node around the ring. After
passing through each node, it returns to the sending node,
which removes it.
3. It is important to note that data passed through rather than
travels past' each node. This means that the signal may be
amplified before being 'repeated on the outward channel.
ADVANTAGES AND DISADVANTAGES OF RING TOPOLOGY
Advantages Disadvantages

1. Short cable length:-The amount of cabling 1. If one node fails to pass data through itself,
involved in a ring topology is comparable to the entire network has failed and no traffic
that of a bus and is small relative to that of can flow until the defective node has been
a star. removed from the ring.
2. Since there is only one cable connecting 2. Network reconfiguration is difficult:- It is not
each node to its immediate neighbors, it is possible to shut down a small section of the
not necessary to allocate space in the ring while keeping the majority of it working
building for wiring closets. normally.
THE TREE TOPOLOGY

1. A variation of bus topology is the tree topology. The


shape of the network is that of an inverted tree with the
central root branching and sub branching to the
extremities of the network.
2. Transmission in this topology takes place in the same
way as in the bus topology. In both cases, there is no
need to remove packets from the medium because
when a signal reaches the end of the medium, it is
absorbed by the terminators.
3. Tree topology is best suited for applications which have
a hierarchical flow of data and control. Since the tree
topology is a modification of a pure network
ADVANTAGES AND DISADVANTAGES OF TREE TOPOLOGY
Advantages Disadvantages
1. It uses point-to-point wiring for individual 1. Overall length of each segment is limited by
segments. the type of cabling used.
2. It is supported by several hardware and 2. If the backbone line breaks, the entire
software venders. segment goes down.
THE MESH TOPOLOGY

 In this topology, each node is connected to more than one


node to provide an alternative route in the case the host is
either down or too busy. It is an extension to P-P network.
 The mesh topology is excellent for long distance networking
because it provides extensive back-up, rerouting and pass-
through capabilities. This function is needed in the event of a
line or node failure elsewhere in the network.
 The mesh topology is commonly used in large internetworking
environments with stars, rings, and buses attached to each
node. This is also ideal for distributed networks.
ADVANTAGES AND DISADVANTAGES OF MESH TOPOLOGY
Advantages Disadvantages
1. Each connection can carry its own data 1. Overall length of each segment is limited by
load. the type of cabling used.
2. It is robust and provides security and 2. If the backbone line breaks, the entire
privacy. segment goes down.
Network Devices:

In the smooth functioning of a computer network, other than computers and wiring, many devices
or specialized hardware play important roles:-

1. Modem
A modem is a computer peripheral that allows to connect and communicate with other computer
via telephone lines.

2. Hub
A hub is a networking device having multiple ports that are used for connecting multiple
computers or segments of a LAN together.

3. Switch
A switch is a device that is used to segment networks into different subnetworks called subnets
or LAN segments.

4. Repeater
A repeater is a network device that amplifies and restores signals for long-distances transmits.
5. Bridge
A bridge is a device that lets you link two networks together

6.Router
A device that lets you link two networks together and can handle different protocols and is
responsible for forwarding data from one network to a different network.

7.Gateway
A gateway is a network device that connects dissimilar networks. Its establishes an connection
between a local network and external network
5. Bridge
A bridge is a device that lets you link two networks together

6.Router
A device that lets you link two networks together and can handle different protocols and is
responsible for forwarding data from one network to a different network.

7.Gateway
A gateway is a network device that connects dissimilar networks. Its establishes an connection
between a local network and external network
5. Bridge
A bridge is a device that lets you link two networks together

6.Router
A device that lets you link two networks together and can handle different protocols and is
responsible for forwarding data from one network to a different network.

7.Gateway
A gateway is a network device that connects dissimilar networks. Its establishes an connection
between a local network and external network
POTENTIAL THREATS AND ATTACKS

1.Malicious Software:
 Malicious software, often called Malware, may disrupt the operations of the computer, gain
access to the privacy information and may gather sensitive data.
 Such software may cause intentional harm to your system the network may have many such
malwares which include: Computer Viruses, Worms, Ransomware, Scareware, Spyware,
Trojan Horse, KeyLogger etc.
2.Denial of Service attack:
 The DoS attack makes a computer’s resource unavailable to the user
 As a result, the computer system may not function efficiently and may get temporarily or
indifinitely suspended.
POTENTIAL THREATS AND ATTACKS

3.Phishing:
 This attack targets online users to extract sensitive information, like username, Password, or
credit card information.
 Phishing accounts for major loss of data throughout the world.

4.Spoofing:
 Email Spoofing is to gain access to recipient's personal information involves sending emails to
the targeted recipients to make them believe that this email originate from trusted owner.
 Chat spoofing is quite similar to email spoofing. The target perceives that he or she is chatting
with someone known, but in fact it is cyber attack.
Best practices to protect ourselves from cyber attacks:
1. Use strong passwords.

2. Backup your data frequently.

3. Keeping your username and passwords private.

4. Carefully registering with websites.


5. 0
6. Secure transactions.

7. Do not share personal information.

8. Install and update antivirus softwares.

9. Don't immediately respond to mails from unknown users.

10. Avoid using unsecured WIFI networks in public places.

11. Never install software from unknown sources.

You might also like