Computer network
Computer network
Networking
• An interconnected collection of autonomous
computers
• A computer network is a set of two or more
interconnected computers and other devices
which are able to communicate with each other
and share hardware and software.
Advantages
• Resource sharing
• Cost saving
• Collaborative user interactions
• Time saving
• Increased storage
Disadvantages
• It comes with the risk of security
issues
• It encourages people to become
dependent on computers
• Network are able to share data and
other resources
• They are able to communicate them
self
Transmission media
• Voice mail
– Allows you to receive your voice mail message
directly in your mail with out any additional
hardware and software
– It arrives as on audio file that one can conveniently
play on ones computer or mobile
• E mail
– Short form of electronic mail
– Message sent electronically
– Sending and receiving message by computer
• Chat
– You type on your screen which is immediately
received by the recipient ; then recipient can
type a message in response to your message
Wireless / Mobile communication
• GSM
• CDMA
• WLL
• GSM (Global System for Mobile )
– Leading cellular system
– Stands for cell phone, established in Europe in 1980
– To connect to the specific service provider in different countries
– GSM users simply switch subscriber identification module (SIM )
– Sim
• Small removable disks that slip in and out GSM Cellphone
– GSM uses narrow TDMA which allows eight simultaneous calls on the same
radio frequency .
– TDMA (Time Division Multiple Access.)
– GSM digitizes and compress voice data then sends it down a channel with other
steam of users data .
– It uses encryption to make phone calls more secure
– it operates in the 900MHz and 1800 MHz
– GSM is also the basis for integrated digital enhanced network (IDEN)
CDMA
• Code Division Multiple Access
• It uses spread spectrum technology
• It does not assign specific frequency to user instead every channel uses
the full availability spectrum
• Data send in small pieces over a number of the discrete frequencies
available for use at any time in the specified range.
• Each user signal is spread over the entire bandwidth by unique
spreading code
• It is military technology which used in world war II
Finally CDMA uses spread spectrum technique where data is sent in small
pieces over a number of discrete frequencies. Each users signal is spread
over the entire bandwidth by unique spreading code.at the receiver end
the same unique code is used to recover the signal .
WLL
• Wire Less in Local loop
• WLL is a system that connects subtribes to the
public switched telephone network(PSTN) using
radio signals as a substitute for other connecting
media.
Network security
• Denial of service attacks
• Intrusion problem
• Firewall
• Antivirus s/w
• File permissions
Denial of service attacks
Attempt to make one or more network resources unavailable
to their legitimate users
– Denial of access to information
• Corrupting ,encrypting or changing the status of
information .
– Denial of access to application
• Forced shutting of an application as soon as the user opens
– Denial of access to resource
• Blocking a resources, may be printer , scanner or USB port.
– Denial of access to a website
• Continuously sending bulk requests to a website .
Intrusion problems
• Attempts to mischievously steal some information
from someone's computer
– Snooping
– Eavesdropping
Snooping
• Snooping refers to gaining unauthorised access to another person's or
organization's data.
– By getting someone's login information by casually watching what
he/she is typing.
– Reading the files on someone's computer in an unauthorised
manner
– Using some softwares which keeps track of the activities and data
being sent or received on someone's computer.
Eavesdropping
• Eavesdropping refers to gaining unauthorised
access to another person's or organization's data
while the data is on its way on the network
– By setting up parallel telephone lines.
– By installing some software (spyware) in the target computer.
– By installing some receiver which captures the data while on its
way.
Login-Password
• By assigning login names and strong passwords to
the users of a system, it can be ensured that only
authorized people access a computer.
Anti virus software
• These days anti-virus softwares work against not
only the virus but also against almost all kinds of
malware. Therefore by installing a full version legal
(not the pirated one or freeware) anti-virus
software network security can be increased