Computer Applications Unit 2
Computer Applications Unit 2
Unit-2
A computer network is a collection of devices that are connected to share data and
resources. The devices can be computers, printers, and other devices that can send and
receive data.
• Devices use a set of rules called communications protocols to send and receive data.
• These protocols define how data is transmitted over physical or wireless
connections.
• The network's capacity is how much traffic it can support at any given time.
• The network's capacity is measured in bandwidth, which is the maximum number of
bits per second that can pass through a network device.
Examples of computer networks
• The internet, which is a global network of computer networks
• Local Area Networks (LANs)
• Wide Area Networks (WANs)
• Wireless Networks
• Cloud Networks
Uses of Computer Networks
• Communicating using email, video, instant messaging, etc.
• Sharing devices such as printers, scanners, etc.
• Sharing files.
Gowrishankar C 1
Evolution of Networks
A network additionally enables associated PCs to share documents and information and also
equipment assets, i.e., scanners, plotters, projectors, and storage devices, making it simpler
to gather and administer data, and enabling clients to work together. The system was simply
not advanced in one day; rather took a long time to be an all the more incredible, productive,
and dependable system. Advancement of systems administration began path back in 1969’s
with the improvement of the first system called ARPANET, which prompted the
improvement of the web. At that point, constant everyday upgradation occurs in the system
innovation. The system has gone through a few phases which are described below:
Internet
Gowrishankar C 2
The Internet, which is a network of networks, came into existence. The internet
has evolved from ARPANET. The internet is a globally connected network
system that utilizes TCP/IP (Transmission Control protocol) to transmit
information. It allows computers of different types to exchange information
and is known as the internet. The Internet is the financial communications
method on the planet, in which the following services are instantly available:
• Email
• Web-enabled audio/video conferencing services
• Online movies and gaming
• Financial services
Types Network
There are mainly five types of Computer Networks
1. Personal Area Network (PAN)
2. Local Area Network (LAN)
3. Campus Area Network (CAN)
4. Metropolitan Area Network (MAN)
5. Wide Area Network (WAN)
Gowrishankar C 3
Types of PAN
• Wireless Personal Area Networks: Wireless Personal Area Networks are
created by simply utilising wireless technologies such as WiFi and Bluetooth.
It is a low-range network.
• Wired Personal Area Network: A wired personal area network is constructed
using a USB.
Advantages of PAN
• PAN is relatively flexible and provides high efficiency for short network
ranges.
• It needs easy setup and relatively low cost.
• It does not require frequent installations and maintenance
• It is easy and portable.
Gowrishankar C 4
Advantages of a LAN
• Privacy: LAN is a private network, thus no outside regulatory body controls it, giving
it a privacy.
• High Speed: LAN offers a much higher speed(around 100 mbps) and data transfer
rate comparatively to WAN.
• Supports different transmission mediums: LAN support a variety of communications
transmission medium such as an Ethernet cable (thin cable, thick cable, and twisted
pair), fiber and wireless transmission.
• Inexpensive and Simple: A LAN usually has low cost, installation, expansion and
maintenance and LAN installation is relatively easy to use, good scalability.
Disadvantages of LAN
• The initial setup costs of installing Local Area Networks is high because there is
special software required to make a server.
• Communication devices like an ethernet cable, switches, hubs, routers, cables are
costly.
• LAN administrator can see and check personal data files as well as Internet history of
each and every LAN user. Hence, the privacy of the users are violated
• LANs are restricted in size and cover only a limited area
Gowrishankar C 5
4. Metropolitan Area Network (MAN)
A MAN is larger than a LAN but smaller than a WAN. This is the type of computer network that
connects computers over a geographical distance through a shared communication path over a city,
town, or metropolitan area. This network mainly uses FDDI, CDDI, and ATM as the technology with a
range from 5km to 50km. Its transmission speed is average. It is difficult to maintain and it comes
with a high cost. Examples of MAN are networking in towns, cities, a single large city, a large area
within multiple buildings, etc.
Advantages of MAN
• MAN offers high-speed connectivity in which the speed ranges from 10-100 Mbps.
• The security level in MAN is high and strict as compared to WAN.
• It support to transmit data in both directions concurrently because of dual bus architecture.
• MAN can serve multiple users at a time with the same high-speed internet to all the users.
• MAN allows for centralized management and control of the network, making it easier to
monitor and manage network resources and security.
Disadvantages of MAN
• The architecture of MAN is quite complicated hence, it is hard to design and maintain.
• This network is highly expensive because it required the high cost to set up fiber optics.
• It provides less fault tolerance.
• The Data transfer rate in MAN is low when compare to LANs.
5. Wide Area Network (WAN)
WAN is a type of computer network that connects computers over a large geographical distance
through a shared communication path. It is not restrained to a single location but extends over
many locations. WAN can also be defined as a group of local area networks that communicate with
each other with a range above 50km. Here we use Leased-Line & Dial-up technology. Its
transmission speed is very low and it comes with very high maintenance and very high cost. The
most common example of WAN is the Internet.
Gowrishankar C 6
Advantages of WAN
• It covers large geographical area which enhances the reach of organisation to transmit data
quickly and cheaply.
• The data can be stored in centralised manner because of remote access to data provided by
WAN.
• The travel charges that are needed to cover the geographical area of work can be minimised.
• WAN enables a user or organisation to connect with the world very easily and allows to
exchange data and do business at global level.
Disadvantages of WAN
• Traffic congestion in Wide Area Network is very high.
• The fault tolerance ability of WAN is very less.
• Noise and error are present in large amount due to multiple connection point.
• The data transfer rate is slow in comparison to LAN because of large distances and high
number of connected system within the network.
Gowrishankar C 7
Network Devices
Network devices are physical devices that allow hardware on a computer network to communicate
and interact with each other. Network devices like hubs, repeaters, bridges, switches, routers,
gateways
Modem
Modem stands for Modulator/Demodulator. The modem is defined as a networking device that is
used to connect devices connected in the network to the internet. The main function of a modem is
to convert the analog signals that come from telephone wire into a digital form. In digital form, these
converted signals are stored in the form of 0s and 1s. The modem can perform both the task
of modulation and demodulation simultaneously. Modems are majorly used to transfer digital data in
personal systems. The modem is also known as a signal translator as it translates one signal into
another signal by modulating the digital signal into an analogy signal for transmission and then
demodulates receiving analogy signals into digital signals.
Features of Modem
• Modems can modulate as well as demodulate the signals simultaneously.
• Modem allows to connect only a specific number of devices to the internet.
• According to the features of modem, it’s price ranges.
• Modems can be upgraded with the help of a specific software patch.
• To use the devices over the internet with a modem devices need to be configured with
an Internet Service Provider(ISP).
• When the modem is connected to Hub it slows down its process.
Working of Modem
RJ45 Connector
In networking, a node is any device connected to a network that can send, receive, or process
data. Nodes in a network can be classified based on their roles and functions. Here’s how different
nodes are identified in networking devices:
Types of Nodes in Networking Devices
1. End Nodes (Hosts)
o Devices that serve as a source or destination for data.
o Examples:
▪ Computers (Laptops, Desktops)
▪ Smartphones
▪ Tablets
▪ IoT Devices
Gowrishankar C 8
2. Intermediate Nodes (Network Devices)
o Devices that help in directing and managing network traffic.
o Examples:
▪ Routers – Direct data between different networks.
▪ Switches – Manage data flow within a local network.
▪ Hubs – Basic device that broadcasts data to all nodes.
▪ Bridges – Connect different network segments.
▪ Gateways – Convert protocols between networks.
3. Server Nodes
o Provide services and resources to other nodes.
o Examples:
▪ Web Servers
▪ File Servers
▪ DNS Servers
▪ Mail Servers
4. Wireless Nodes
o Nodes that communicate over wireless protocols.
o Examples:
▪ Access Points (Wi-Fi Routers)
▪ Bluetooth Devices
▪ Mesh Network Nodes
Identification of Nodes in a Network
1. IP Address
o Each node in a network is assigned a unique IP address (IPv4 or IPv6).
o Example: 192.168.1.10
2. MAC Address
o Each network interface card (NIC) has a unique Media Access Control (MAC)
address.
o Example: 00:1A:2B:3C:4D:5E
3. Hostnames
o Human-readable names assigned to devices in a network.
o Example: server1.company.com
4. Network Topology Mapping
o Tools like ping, traceroute, ARP tables, and network monitoring software help
identify nodes.
5. DHCP and DNS Logs
o DHCP assigns dynamic IPs to nodes, and DNS resolves hostnames.
6. Network Scanning Tools
o Tools like Nmap, Wireshark, and Netstat help in discovering active nodes.
Gowrishankar C 9
to Ethernet-based networks
Gowrishankar C 10
Identification of Nodes in Networked
In networking, a node is any device connected to a network that can send, receive, or process data.
Nodes in a network can be classified based on their roles and functions. Here’s how different nodes
are identified in networking devices:
Types of Nodes in Networking Devices
1. End Nodes (Hosts)
o Devices that serve as a source or destination for data.
o Examples:
▪ Computers (Laptops, Desktops)
▪ Smartphones
▪ Tablets
▪ IoT Devices
2. Intermediate Nodes (Network Devices)
o Devices that help in directing and managing network traffic.
Gowrishankar C 11
o Examples:
▪ Routers – Direct data between different networks.
▪ Switches – Manage data flow within a local network.
▪ Hubs – Basic device that broadcasts data to all nodes.
▪ Bridges – Connect different network segments.
▪ Gateways – Convert protocols between networks.
3. Server Nodes
o Provide services and resources to other nodes.
o Examples:
▪ Web Servers
▪ File Servers
▪ DNS Servers
▪ Mail Servers
4. Wireless Nodes
o Nodes that communicate over wireless protocols.
o Examples:
▪ Access Points (Wi-Fi Routers)
▪ Bluetooth Devices
▪ Mesh Network Nodes
Identification of Nodes in a Network
1. IP Address
o Each node in a network is assigned a unique IP address (IPv4 or IPv6).
o Example: 192.168.1.10
2. MAC Address
o Each network interface card (NIC) has a unique Media Access Control (MAC) address.
o Example: 00:1A:2B:3C:4D:5E
3. Hostnames
o Human-readable names assigned to devices in a network.
o Example: server1.company.com
4. Network Topology Mapping
o Tools like ping, traceroute, ARP tables, and network monitoring software help
identify nodes.
5. DHCP and DNS Logs
o DHCP assigns dynamic IPs to nodes, and DNS resolves hostnames.
6. Network Scanning Tools
o Tools like Nmap, Wireshark, and Netstat help in discovering active nodes.
Gowrishankar C 12
1. The Web (World Wide Web)
The Web refers to the system of interconnected documents and resources that can be accessed via
the internet using web browsers. It consists of:
• Web Pages & Websites (HTML, CSS, JavaScript)
• Web Servers (Host and serve web content)
• Web Protocols (HTTP/HTTPS, REST, WebSockets)
• Web Applications (Cloud-based apps, APIs)
2. Internet of Things (IoT)
IoT refers to a network of physical devices embedded with sensors, software, and connectivity that
allow them to collect and exchange data over the internet.
Key Components of IoT:
• Devices (Nodes): Sensors, actuators, smart appliances, wearables.
• Connectivity: Wi-Fi, Bluetooth, Zigbee, LoRa, 5G.
• IoT Platforms: AWS IoT, Google Cloud IoT, Microsoft Azure IoT.
• Data Processing: Cloud computing, Edge computing, AI-based analytics.
3. Relationship Between Web and IoT
IoT devices rely on web technologies for:
• Data Transmission: IoT devices send data to web-based servers using protocols like HTTP,
MQTT, or CoAP.
• Remote Monitoring & Control: Web apps allow users to monitor and control IoT devices via
dashboards.
• APIs & Web Services: IoT devices use RESTful APIs or WebSockets for real-time
communication.
• Cloud Integration: IoT data is stored and processed in cloud platforms, accessible via web
interfaces.
Gowrishankar C 13
. Example Use Cases
1. Smart Home Automation: Controlling lights, thermostats, and cameras through a web-based
dashboard.
2. Industrial IoT (IIoT): Monitoring machine performance via a web app.
3. Healthcare IoT: Wearable devices sending patient data to a web-based health monitoring
system.
4. Smart Agriculture: IoT sensors tracking soil moisture, accessible via a web platform.
Gowrishankar C 14
How to Prevent Virus Attacks
✅ Do Not Open Unknown Email Attachments or Links.
✅ Use a Strong & Updated Antivirus Program.
✅ Download Software Only from Trusted Sources.
✅ Enable Firewalls to Block Suspicious Connections.
✅ Regularly Update Your Operating System & Software.
✅ Avoid Using Unknown USB Drives or External Devices.
Ransomware: Definition
Ransomware is a type of malware (malicious software) that encrypts a victim’s
files or locks them out of their system, demanding a ransom payment (usually in
cryptocurrency) to restore access. If the ransom is not paid, the attacker may delete,
leak, or permanently block access to the files.
Gowrishankar C 15
causes system damage. Unlike worms and viruses, Trojans do not self-replicate but
rely on social engineering to trick users into installing them.
Definition of Spyware
Spyware is a type of malware that secretly monitors and collects user data without
permission. It operates in the background, tracking activities like keystrokes,
browsing history, login credentials, and financial information. Spyware is often used
for stealing personal data, spying on users, and delivering targeted ads.
Keyloggers: Definition and Function
A keylogger (short for keystroke logger) is a type of spyware malware that secretly records
every keystroke a user types on a keyboard. Cybercriminals use keyloggers to steal sensitive
information such as passwords, credit card details, and personal messages.
Gowrishankar C 16
3. Infected Software & Cracked Programs
How it Works:
• Downloading pirated software or cracked games often comes bundled with
malware.
• Attackers hide malware inside legitimate-looking programs.
Example: The PirateMatryoshka Trojan spreads through torrent sites.
Prevention:
Download software only from official sources.
Avoid pirated software and cracks.
Use application whitelisting to allow only trusted programs.
4. USB Drives & Removable Media
How it Works:
• Plugging in an infected USB drive can execute malware automatically.
• Used in air-gapped network attacks where internet access is restricted.
Example: Stuxnet worm spread through USB drives to attack industrial systems.
Prevention:
Disable AutoRun/AutoPlay for external drives.
Scan USB devices with antivirus software.
Use read-only USB drives for sensitive data.
5. Social Engineering & Fake Updates
How it Works:
• Users are tricked into downloading malware disguised as a software update or
security tool.
• Common with fake Flash Player or browser updates.
Example: Vidar Stealer spreads through fake browser update pop-ups.
Prevention:
Always update software from official sources.
Avoid clicking on pop-ups claiming your system is "infected."
Gowrishankar C 17
o Identifies malware by analyzing suspicious behavior instead of relying on
known signatures.
o Helps detect new and modified malware strains.
3. Behavioral Monitoring
o Monitors system activity in real time for unusual behavior (e.g.,
unauthorized encryption of files by ransomware).
o If detected, the antivirus stops and isolates the malware.
4. Sandboxing
o Runs suspicious programs in a virtual environment to observe their behavior
before allowing them to execute on the actual system.
5. Quarantine & Removal
o If a threat is found, the antivirus moves the infected file to quarantine or
removes it completely.
o
Popular Antivirus Software
✔ Windows Defender (Built-in for Windows) – Free, effective for basic protection.
✔ Norton Antivirus – Strong malware protection and advanced security features.
✔ Bitdefender – Lightweight, fast scanning, and strong AI detection.
✔ Kaspersky – Excellent for real-time protection and threat removal.
✔ McAfee – Comprehensive security suite with web protection.
✔ Avast/AVG – Free and paid versions with decent malware detection.
HTTP vs HTTPS
HTTP and HTTPS are protocols used for communication between a web browser and a
website. The key difference is that HTTPS is secure, while HTTP is not.
Gowrishankar C 18
Firewall
A firewall is a security system that monitors and controls incoming and outgoing network
traffic based on predefined security rules. It acts as a barrier between a trusted internal
network (like your computer or company network) and an untrusted external network (like
the internet).
How a Firewall Works
1. Traffic Filtering – Examines data packets and decides whether to allow or block them.
2. Prevents Unauthorized Access – Blocks hackers and malicious software from entering
a system.
3. Monitors Network Activity – Keeps logs of all network traffic for security analysis.
4. Protects Against Malware & Cyberattacks – Stops viruses, ransomware, and
intrusions before they reach your device.
Why You Need a Firewall
Blocks hackers & malware before they reach your system.
Prevents unauthorized access to sensitive data.
Stops harmful websites & phishing attacks.
Protects personal and business networks from cyber threats
Gowrishankar C 19
Gowrishankar C 20