RS - 402 - X - Unit 9 - Presentation
RS - 402 - X - Unit 9 - Presentation
Data sharing
Resource sharing
Data security
Performance enhancement
Session 1: Networking Fundamentals
Setup Cost
Administration Cost
Undesirable sharing
Undesirable behavior
Data security
Components of Network
Network topology
refers to the basic
geometric layout
according to which the
server and clients are
connected via a
channel.
Different topologies
provide different levels
of access to the clients
through the channel.
The three most
common network
topologies are bus, ring
and star, as shown in
given figures.
Network Protocols and OSI Model
Following figure shows the services and protocol at different layers of the OSI
model:
Internet
The computers on the Internet are connected to each other with the help of
various small networks. These different small networks are then connected to
the Internet backbone using several gateways.
Following figure is a diagrammatic representation of the working of the Internet:
Accessing the Internet
The Internet is a network that can be accessed from anywhere in the world.
You can subscribe for an Internet connection from an Internet Service Provider (ISP).
The ISP provides you the settings, such as username and password, which you
need to configure the Internet connection on your computer.
There are a number of factors that should be considered while choosing an
Internet connection. Few of them are described as follows:
Bandwidth and Speed: Your Internet connection varies depending on the
purpose for which you want to use the Internet.
Internet Service Provider (ISP): The ISP you choose should be reliable and
provide immediate help to any Internet connection problem. There are a
number of ISPs, such as MTNL, Airtel, Reliance, etc.
Cost-effectiveness: You should choose that Internet connection which is
cost-efficient for the desired purpose.
Modem
There are two main ways of connecting to the Internet, that is, wired and wireless.
Wired Internet connections are:
Dial-up Connection
Broadband Connection
Leased Line
Wireless Internet connections are:
Wireless Fidelity (Wi-Fi)
Worldwide Interoperability for Microwave Access (WiMAX)
3G
4G
4.5G
5G
WWW
World Wide Web (WWW), also known as Web in short, was developed by Tim
Berners-Lee of the European Laboratory for Particle Physics (CERN) in
Switzerland.
WWW represents an information space where documents and other web
resources reside.
These documents are connected by hyperlinks and can be accessed by URIs
using Internet.
WWW makes up a large part of the Internet and consists of websites that have
one or more Web pages.
Session 2: Working with Accessibility Options
For using instant messaging services, users need to install an instant messaging
software application. The software program enables a computer with an IM
client to use instant messaging features.
The user has to register on the IM client (IM software) with a unique password
and username combination.
Once a user logs in with the correct
credentials, the connection
information such as port number and
IP address of the user are sent to the
IM server.
The server checks the list of contacts
of the client to see if any of them is
also logged in and available for
communication. Following figure
shows an instant messaging model.
How Instant Messaging Work?
In case the server finds an online connection, it sends the information back to the
client. Also, the server sends the information about the client to the online contact.
The information exchange allows both the users to communicate with each
other either directly or via server.
In most cases, IM systems work in client-server architecture for sending and
receiving messages and other IM operations. In this case, all the messages
exchanged between users are directed via the server. The IM server appears a
single entity to a connected client but it can be a group of servers operated by
the service provider or collective servers from independent service providers.
In this model, when a user wants to communicate with another user, both
must connect to the same IM service using their credentials.
Some IM systems employ the peer-to-peer architecture, wherein they can
directly share content or transfer files without the intervention of a central
server. This architecture does not involve any file storage requirements. The
network architecture only uses client’s bandwidth to transfer files.
Instant Messaging Architecture
Video Conferencing: More than two people can participate on a video call
in video conferencing. This helps in conducting meetings or learning
sessions face-to-face even when the participants are physically present at
different places.
Job Outsourcing: Employers can find and employ overseas employees
easily since instant messaging provides a safe, quick and cost-effective
mode of instant communication with the remote employees.
Rules and Etiquettes Followed while Chatting
Some rules and etiquettes that need to be followed by anyone during chatting
are as follows:
Begin chatting with formal greetings.
Ensure that the message should be short and the idea is conveyed.
Ensure to match the communication style of the receivers, else the
receivers will lose their interest in chatting.
Give recipients time to respond.
Know about the abbreviation and shortcut used in chatting such as COS is
used for ‘because’ and KIT is used for ‘keep in touch’.
Do not chat with strangers.
Be attentive during chatting with multiple persons lest you might miss
some important information.
Ensure that the person with whom you want to chat is not busy.
End chatting with a closing message.
Session 4: Using Google Hangouts
Blogs are very popular these days among people who want to share their ideas
with others on the Internet.
You can easily start a blog or host your web pages by following some simple
steps listed as follows:
1. Select a Blogging Platform
2. Carefully Select Your Hosting
3. Register the Hosting and Domain Name
4. Setting Up the Blog Editor
5. Adding Posts or Pages
Some commonly used offline blog editors used for editing blogs on Windows
operating system are as follows:
Qumana BlogJet (Windows)
Windows Live Writer (Windows)
Reasons for Using an Offline Blog Editor
Blogs are very popular these days among people who want to share their ideas
with others on the Internet.
You can easily start a blog or host your web pages by following some simple
steps listed as follows:
1. Select a Blogging Platform
2. Carefully Select Your Hosting
3. Register the Hosting and Domain Name
4. Setting Up the Blog Editor
5. Adding Posts or Pages
Session 7: E-commerce
You get two options to pay for the goods purchased online with your debit card – to
make an offline payment via credit card processing or to make an online payment via
electronic funds transfer.
In an online transaction, the transfer of funds is completed via an EFT network to
which your bank is associated.
Payment processing takes place in two stages which include authorization for
payment approval and settlement to transfer money to the receiver’s account.
Authorization process involves the following steps:
1. A customer purchases an item on a website using a debit card or credit card.
2. The payment information is received by the payment gateway which encrypts the
received data to ensure privacy and forwards the same to the payment
processing system.
3. The payment processor sends a payment request to the issuing bank of the
customer to ensure the customer has enough credit in his account to pay for the
bills.
How Does An Online Transaction Work?
All the online transactions follow a pricing model according to which all the participants
receive some share as a fee.
In other words, a small percentage of the transaction amount is received by the following:
The issuer (as an interchange fee)
The credit card association (as an assessment fee)
The merchant’s bank account (as a transaction processing fee)
The payment processor (as an authorization fee)
The pricing structures are categorized as follows:
Flat-rate pricing, where you pay a fixed percentage for every transaction, irrespective
of the actual transaction cost.
Interchange plus pricing, where the merchant charges a fixed fee for every
interchange.
Tiered pricing, where the processor takes different interchange rates classified into
three buckets, namely qualified, non-qualified and mid-qualified.
Secure Password
Do not write the username and password on the notebook and papers.
Ensure that the password should not be included in the password
dictionaries.
Uses the random password generators available online to create a secure or
strong password.
Update the password within 6 months.
Ensure that the password you create does not match the past used password.
Ensure that the password will not the bike number, mobile number, pet
name, favorite colour, childhood name, etc.
Ensure that the different passwords are used for different portals and
websites.
Use Two-Factor Authentication (2FA) at the time of resetting the password.
Session 9: Internet Security
Various security issues concern Internet users all over the world.
The threats can be either undirected, which implies that they do not
personally target your computer but may still affect its performance. For
example, computer viruses and phishing emails are examples of undirected
threats. You can protect yourself from such threats by implementing general
security and ensuring secure browsing.
You may encounter some directed threats that personally target your
computer system or organization.
Attackers use different techniques for directed threats which combine
sophisticated tools with software engineering. You may counter such attacks
by implementing basic security such as password protection and screen locks
whenever you leave your computer unattended.
Potential Threats
Some remedies for resolving internet security threats that may affect a
computer system are as follows:
Encryption: In this method data is encoded in a manner so that it can only
be read by an authorized user. Encryption uses different algorithms at its
core to generate ciphertext (encoded text) which can be read only after
decryption.
Digital Signature: The digital signatures help in authenticating the content
by verifying the author, signature date and signature time.
Firewall: A firewall serves as a barrier between the internet and LAN. It
helps in minimizing the security risks by maintaining the confidentiality of
the private resources.
Resolving Internet Security Issues
A cookie is a file that contains small textual information about the activity of a
user over the Internet.
The unauthorized user can easily access the information stored in a cookie by
tracking them.
Hence, you need to clear the cookies from the browser to prevent any
unauthorized access from them.
Beside cookies, Web browser also saves the user id/username and password
of a user when he/she fills the form at the time of registering and logging into
a portal and websites.
Clearing Cookies and Data from Browser
The steps to clear cookies and data from the Web browser are as follows
1. Launch the Microsoft Edge Web browser.
2. Click the Settings and more icon on the Web browser window. A drop-
down list appears.
3. Select the History Clear browsing data option from the drop-down list.
The Clear browsing data dialog box appears.
4. Select the desired check boxes to remove data from the Web browser.
5. Click the Clear now button in the Clear browsing data dialog box.
Temporary Internet files, cookies, history, form data, password, etc., get
deleted from the Web browser.
Use Antivirus Software
Antivirus software is used to identify, prevent and take action against malicious
programs, such as viruses and worms, by deactivating or deleting them.
Antivirus software protects your computer from virus attacks by:
Scanning e-mail messages and their attachments
Scanning and monitoring files and folders to ensure that they are not
infected
Scanning your computer’s files on a regular basis
You can easily purchase antivirus software from the market or download a free
version of an antivirus program from its company’s website.
Some popular antivirus software applications are Norton Antivirus, McAfee,
Quick Heal Antivirus, Kaspersky Antivirus, etc.
Take Data Backup
Taking regular backup ensures that your computer data is protected and can
be recovered in the following circumstances:
Hardware Failure
Accidental Deletion or Modification of Data
Restoration of the Old Version of a File
Unauthorized Deletion or Modification of Data
You can use different types of storage devices to take the backup of your data.
These include the following:
CD
Digital Versatile Disc (DVD)
External hard disk
USB drive
Online backup and storage services
Session 10: Maintaining Workplace Safety
Health and safety of employees at the workplace play an important role in the
overall effectiveness of an organization.
To minimize employees’ exposure to risk, organizations usually put certain
processes or systems in place, for instance, using protective gear and other
safety equipment where necessary.
It is the responsibility of both the organization and its employees to follow the
system in place and ensure a risk-free work environment for all.
Essentially, a healthy and safe workplace is a decisive factor for enhanced
employee productivity.
Fire Safety Rules
Some falls and slips safety rules followed at the workplace are as follows:
Ensure that the footwear and shoes you wear are suitable and appropriate
for the workplace.
Ensure that the floor surface is clean from any type of spillages.
Ensure that the floor surface is not damaged at the workplace.
Ensure that the floor is clean and dry.
Ensure that the cupboard, file cabinet, and desk drawers are properly
closed when they are not in use.
Ensure that the cables and wires in the walkways are covered.
Ensure that walkways and halls are free from any type of garbage and
obstacles.
Ensure that proper lighting is available at the workplace.
Ensure that the walkways are clear during the movement of large items.
Electrical Safety Rules
First aid is the initial aid given to an injured or sick person to save his/her life
before the arrival of medical assistance.
The main purpose of first aid is to provide immediate relief to the patient until
medical assistance arrives.
The Do’s that must be followed while providing first aid are as follows:
Assure victim of immediate help.
Use direct pressure to stop bleeding.
Keep an eye on victim’s condition.
Raise head of the victim if bleeding is in the upper body.
Raise feet of the victim if bleeding is in the lower body.
Wash burns and wounds with sterile wipes.
Session 11: Understanding First Aid
The Don’ts that must be followed while providing first aid are as follows:
Do not move the victim if it is not required.
Do not apply a tourniquet.
Do not set fractures, if any (that is, keep victim still).
Do not use any burn ointment unless told by a physician or qualified first
aider.
Do not clean the wound with a cloth.
Session 12: Accidents
Some rules and guidelines followed for handling accidents at the workplace
are as follows:
Provide first aid to the victim during an accident.
Report about the accident to the superior or manager.
Follow the standard operating procedure (SOP) designed by the
organization for handling accidents.
Ensure that sufficient safety equipment is available at the workplace to
avoid accidents.
Call the doctor or medical team immediately in the wake of an accident.
Follow emergency drills set by the organization during an emergency.
Session 14: Emergency
An emergency plan is a set of rules and instructions that describes the course
of action employees must take when an emergency arise at the workplace.
An evacuation plan provides a set of procedures to be used by the occupants
of a building in an emergency.
General training for employees on emergency and evacuation plans should
address the following:
Roles and responsibilities of an individual
Possible threats and hazards and their consequences as well as the plan of
action to prevent them
The process for warning and communicating others about an emergency
The process how to respond in an emergency situation
The place where the emergency equipment is placed and its usage
Session 15: Emergency and Evacuation Plan