Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
0% found this document useful (0 votes)
0 views

unit II computer Applications

This document provides an overview of computer networks, including communication models like OSI and TCP/IP, the evolution of networking, types of networks, and network devices. It also discusses the Internet, the Web, IoT, the Domain Name System (DNS), and security threats along with prevention methods. Key distinctions between hackers and crackers are highlighted, emphasizing the importance of network security.

Uploaded by

poojachanda239
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
0 views

unit II computer Applications

This document provides an overview of computer networks, including communication models like OSI and TCP/IP, the evolution of networking, types of networks, and network devices. It also discusses the Internet, the Web, IoT, the Domain Name System (DNS), and security threats along with prevention methods. Key distinctions between hackers and crackers are highlighted, emphasizing the importance of network security.

Uploaded by

poojachanda239
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

UNIT II

Introduction to Computer Networks


A computer network is a system of interconnected computers that share
resources, data, and services. The primary goal of computer networking is to
enable communication and resource sharing among devices.

1. Communication Models:
There are two main communication models:
- OSI Model (Open Systems Interconnection): It divides the network
communication into seven layers:
1. Physical Layer (hardware transmission)
2. Data Link Layer (error correction and frame synchronization)
3. Network Layer (routing and addressing)
4. Transport Layer (reliable data transfer)
5. Session Layer (session management)
6. Presentation Layer (data formatting)
7. Application Layer (user interaction)

- TCP/IP Model: It simplifies the OSI model into four layers:


1. Link Layer
2. Internet Layer
3. Transport Layer
4. Application Layer

Why Networks are Important:


- Sharing files, printers, and resources
- Communication (email, voice, video)
- Hosting online services (websites, social media, cloud applications)

2. Evolution of Networking
- 1950s-1970s: Early networks were simple, point-to-point systems. The first
major network, ARPANET (1969), became the foundation for the internet.
- 1980s - LAN Growth: Ethernet and TCP/IP protocols made local area networks
(LANs) popular for offices and businesses.
- 1990s-2000s - Internet Expansion: The internet grew with the launch of the
World Wide Web. Broadband and Wi-Fi revolutionized internet access.
- 2010s-Present - Cloud & IoT: The rise of cloud computing, IoT, and 5G has
transformed connectivity with more connected devices and faster internet
speeds.

3. Types of Networks
- LAN (Local Area Network): Typically confined to a single location like a home or
office. It uses Ethernet cables or Wi-Fi for data transfer.
- WAN (Wide Area Network): Spans large geographic areas (e.g., across cities,
countries). The Internet is a global WAN.
- MAN (Metropolitan Area Network): Covers a city or large campus.
- PAN (Personal Area Network): A small network for personal devices, such as
Bluetooth devices and smartphones.
- VPN (Virtual Private Network): A secure network that allows remote access to
another network, ensuring encrypted communication over the internet.

4. Network Devices
- Modem: A device that modulates and demodulates signals for data transmission
over telephone lines.
- Ethernet Card (NIC - Network Interface Card): Hardware that allows a computer
to connect to a network.
- RJ45: The standard connector for Ethernet cables used in LANs.
- Repeater: Amplifies or regenerates a signal to extend the network range.
- Hub: A basic device that broadcasts data to all devices on a network, causing
inefficiency.
- Switch: More efficient than a hub, it forwards data only to the device it’s
intended for.
- Router: A device that routes data between different networks, like connecting a
home network to the internet.
- Gateway: A device that connects two different networks and translates data
between them.

5. Identification of Nodes in a Networked Communication


Each device connected to a network is called a node, and each has a unique
identifier:
- IP Address: A unique identifier for each device on a network.
- IPv4: 32-bit address (e.g., 192.168.0.1).
- IPv6: 128-bit address, used due to the exhaustion of IPv4 addresses.
- MAC Address: A unique hardware address used within local networks to identify
devices.

6. Internet, Web, and Internet of Things (IoT)


- Internet: A global network of interconnected devices that communicate using
the TCP/IP protocol suite.
- Web: A system of websites and content that is accessed over the internet. It's
just one service that runs over the internet, but it's highly popular.
- Internet of Things (IoT): A network of physical devices (like smart thermostats,
wearables, and home appliances) that communicate with each other over the
internet, often without human intervention.

7. Domain Name System (DNS)


The DNS is a system that translates human-readable domain names (like
www.example.com) into machine-readable IP addresses. This enables devices to
locate each other on the internet.

How DNS Works:


1. A user enters a website's domain name in their browser.
2. The browser sends a request to the DNS server.
3. The DNS server resolves the domain name to an IP address.
4. The browser accesses the website using the IP address.

DNS Hierarchy:
- Root DNS Servers: Handle requests for top-level domains (.com, .org, etc.)
- TLD DNS Servers: Handle domains for specific top-level domains.
- Authoritative DNS Servers: Contain records for individual domain names.

8. Security Aspects – Threats and Prevention


Malware Types:
- Virus: Requires a host program and spreads by attaching itself to files.
- Worms: Self-replicating malware that spreads across networks.
- Ransomware: Encrypts the victim's data and demands payment for decryption.
- Trojan: Appears as legitimate software but contains harmful functions.
- Spyware: Secretly monitors and collects user data.
- Adware: Displays unwanted ads and tracks browsing behavior.
- Keyloggers: Record keystrokes to steal passwords or sensitive data.

Prevention:
- Antivirus Software: Detects and removes malware from systems.
- Firewall: Monitors and controls incoming and outgoing network traffic based on
security rules.
- HTTPS: Secure version of HTTP, encrypting data to protect privacy.
- Cookies: Small data files used for tracking user behavior. While useful, they can
also be used for malicious purposes.

Hackers vs. Crackers:


- Hackers: Individuals who explore systems, sometimes for ethical or constructive
purposes (known as "white-hat hackers").
- Crackers: Individuals who break into systems for malicious purposes, often
referred to as "black-hat hackers."

You might also like