Uploaded by Sri Vijayadurga Degree College Kurnool

Chapter-1 Fundamentals of Internet (1)

advertisement
Chapter-1
Fundamentals of Internet
Network
Network is a collection of hardware components and computers interconnected by
communication channels(Transmission media)that allow sharing of resources and
information.
Network Components: The important components used in the computer network are:
 Transmission Media: It is the medium through which the data travels. The various
alternatives for transmission media are: twisted pair cable, coaxial cable, fiber
optics, etc.
 Processor: Processor is the hardware which helps to transfer the data from source
to destination. Different processors used in the data communication are: modem,
router, bridge, etc.
 Software: To transfer the data from source to destination we require software,
examples are: networking operating system software, internet explorer, etc.
 Topology: It is the way which data travels, the various topologies available are:
star, ring, bus, mesh, tree, etc.
Advantages of Networks
 Easy communication and speed
It is very easy to communicate through network. people can communicate
efficiently using a network with a group of people. They can enjoy the benefit of
emails, instant messaging,telephony,video conferencing, chat rooms etc.
 Ability to share Files, Data and Information
People can find and share information and data because of networking. This is
beneficial for large organizations to maintain their data in an organized manner
and facilitate access for desired people.
 Sharing Hardware: Ability to share hardware Resources such as printers, fax
machines and modems can be shared. For example: a printer can be shared among
users in a network so that there is no need to have individual printers for each and
every computer in the company. it will reduce the cost of purchasing hardware.
1
 Sharing Software: Users can share software within the network easily.
Networkable versions of software are available at considerable savings compared
to Individually licensed versions of software. Therefore large companies can
reduce the cost of buying software by networking their computers.
 Security: Sensitive files and programs on a network can be passwords protected.
Then Those files can only be accessed by the authorized users. Each and every
user has their own set of privileges’ to prevent them accessing restricted files and
programs.
 Speed: Sharing and transferring files within Networks are very rapid. Thus saving
time, while maintaining the integrity of the files.
Disadvantages of Networks
 Breakdown and possible loss of Resources:
One major disadvantage of networking is the breakdown of the whole network
due to an issue of the server. Such breakdowns are frequent in networks causing
losses of thousands of dollars each year. The worst scenario is such breakdowns
may lead to loss of important data of the server.
 Expensive to build
Building a network is a serious business in many occasions, especially for large
scale organizations. Cables and other hardware are very expensive to buy and
replace.
 Security Threats
Security threats are always problems with large networks. There are hackers who
are trying to steal valuable data for large companies for their own benefit.
 Band width issues
In a network there are users who consume a lot of more bandwidth than others.
Because of this some other people may exist experience difficulties.
Data Communication
Data communication means sharing the information. This sharing can be local or remote
or with in a building. Local communication usually occurs in face to face, while remote
communication takes place over distance.
Data communication is the exchange of data between the two devices via some of
transmission medium. Data communication devices must be the part of the
communication system made up of combination of hardware and software.
2
1. Delivery: Delivery should be done to the correct destination.
2. Timeliness: Delivery should be on time.
3. Accuracy: Data delivered should be accurate.
Components of Data Communication
1. Sender
A device that is used for sending messages (or data) is called sender. It is also
called transmitter or source. The sender can be a computer, telephone, or a video
camera etc. Usually, a computer is used as sender in data communication system.
2. Receiver
A device that is used for receiving messages is called receiver. It is also known
as sink. The receiver can be a computer, telephone set, printer, or a fax machine
etc. Usually, a computer is also used as receiver in data communication system.
3. Message
The message is the information or data that is to be communicated. It may consist
of text, numbers, pictures, sounds, videos or any combination of these.
4. Transmisson Medium
The path through which data is transmitted (or sent) from one location to another
is called transmission medium. It is also called communication channel. It may be
a wire, or fiber optic cable, or telephone line etc. If the sender and receiver are
within a building, a wire is used as the medium. If they are located at different
locations, the medium may be telephone line, fiber optics, microwave or satellite
system.
5. Protocol
These are some set of rules which govern data communication. It represents an
agreement between the communication devices. Without a protocol, two devices
may be connected but not communicating, just a person speaking German cannot
be understood by a person who speaks only Japanese.
3
Types of Networking
There are many different types of networks. However, from an end user’s point of view there are three
basic types.
1. LAN(Local Area Network)
2. MAN(Metropolitan Area Network)
3. WAN(Wide Area Network)
Local Area Network
A computer network spanned inside a building and operated under single administrative
system is generally termed as Local Area Network (LAN). Usually,LAN covers an
organization’ offices, schools, colleges or universities. Number of systems connected in
LAN may vary from as least as two to as much as 16 million.LAN provides a useful way
of sharing the resources between end users. The resources such as printers, file servers,
scanners, and internet are easily sharable among computers.
LAN configuration consist of:
A file server - stores all of the software that controls the network, as well as the software
that can be shared by the computers attached to the network.
A workstation - computers connected to the file server (Mac or PCs). These are less
powerful than the file server
4
LANs are composed of inexpensive networking and routing equipment. It may contains
local servers serving file storage and other locally shared applications. It mostly operates
on private IP addresses and does not involve heavy routing. LAN works under its own
local domain and controlled centrally.
LAN uses either Ethernet or Token-ring technology. Ethernet is most widely employed
LAN technology and uses Star topology, while Token-ring is rarely seen.LAN can be
wired, wireless, or in both forms at once.
Advantages
 Resource Sharing:
Computer resources like printers, modems,Dvd-Rom drives and hard disks can be
shared with the help of local area networks. This will reduce the cost of purchase
hardware
 Software Application Sharing:
It is cheaper to use same software over network instead of purchasing separate
licensed software for each client in a network.
 Easy and Cheap Communication
Data and messages can easily be transferred over networked computers.
 Centralized data
The data of all network users can be saved on hard disk of the server computer.
This will help users to use any workstation in a network to access their data.
Because data is not stored on workstation locally.
 Data Security
Data is stored on server computer centrally, it will be manage data at only one
place and the data will be more secure too.
5
 Internet Sharing
It provides the facility to share a single internet connection among all the lan
users
Ex: Net cafe
Disadvantages
 High setup cost
Initial setup costs of installing local area network is high.
 Privacy violations
The lan administrator has the right to check the personal data files of each and
every lan user, internet history and computer use history.
 Data security threat
Unauthorized users can access important data of an organization. if centralized
data is not secured properly by the lan administrator.
 Lan Maintenance job
It requies a lan administrator because, there are problems of hardware or software
failures and cable disturbances.
 Covers limited area
It covers only limited geographical area such as offices, schools, colleges,
universities etc.,
Metropolitan Area Network
The Metropolitan Area Network (MAN) generally expands throughout a city such as
cable TV network. It can be in the form of Ethernet, Token-ring, ATM, or Fiber
Distributed Data Interface (FDDI).
Metro Ethernet is a service which is provided by ISPs. This service enables its users to
expand their Local Area Networks. For example, MAN can help an organization to
connect all of its offices in a city.
6
Backbone of MAN is high-capacity and high-speed fiber optics. MAN works in between
Local Area Network and Wide Area Network. MAN provides uplink for LANs to
WANs or internet.
Advantages






Bandwidth could be easily access within MAN
Cost of sharing is quite cheap and fast throughout the MANS
It mainly used Fibre optic cable
It transmission is very fast
It generally covered a city or a town.
It support voice communication.
Disadvantages
 It is very expensive for the setting part.
 Phone network is needed
Wide Area Network
As the name suggests, the Wide Area Network (WAN) covers a wide area which may
span across provinces and even a whole country. Generally, telecommunication
networks are Wide Area Network. These networks provide connectivity to MANs and
LANs. Since they are equipped with very high speed backbone, WANs use very
expensive network equipment.
7
WAN may use advanced technologies such as Asynchronous Transfer Mode (ATM),
Frame Relay, and Synchronous Optical Network (SONET). WAN may be managed by
multiple administration.
Advantages
 Shares software and resources with connecting workstations.
 Messages can be sent very quickly to anyone on the network such as pictures,
sounds or data.
 Share information/files over a larger are
Disadvantages
 Are expensive and generally slow.
 Need a good firewall to restrict outsiders from entering and disrupting the network
 Security is a real issue, protection against hackers and viruses adds more
complexity and expense.
 It requires network supervisors and technicians to be employed.
Internet
The Internet is a global system of interconnected computer networks that use the standard
Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks
that consists of millions of private, public, academic, business, and government networks of local
to global scope, that are linked by a broad array of electronic and optical networking
technologies.
8
It can be defined in many ways as follows:
 Internet is a world-wide global system of interconnected computer networks.
 Internet uses the standard Internet Protocol (TCP/IP).
 Every computer in internet is identified by a unique IP address.
 IP Address is a unique set of numbers (such as 110.22.33.114) which identifies a
computer location.
 A special computer DNS (Domain Name Server) is used to give name to the IP Address
so that user can locate a computer by a name.
 For example, a DNS server will resolve a name http://www.webduniya.com to a
particular IP address to uniquely identify the computer on which this website is hosted.
 Internet is accessible to every user all over the world.
Services of Internet
It allows us to access huge amount of information such as text, graphics, sound and software
over the internet. Following diagram shows the four different categories of Internet Services.
1.Communication Services
There are various Communication Services available that offer exchange of information with
individuals or groups.
1. E-mail: Sending and receiving E-mails around the world at minimal price.
9
2. Telnet: One can login on to other network via Internet as if one is a member of that
network this
done through utility called TELNET.
3. News group: One can participate in discussions on wide range of topics from
recreational activities to scientific researches via a utitility called use net news group.
4. Internet Relay Chat (IRC)
Allows the people from all over the world to communicate in real time.
5. Internet Telephony (VoIP)
Allows the internet users to talk across internet to any PC equipped to receive the call.
2.Information retrieval service
There exist several Information retrieval services offering easy access to information present on
the internet.
1. FTP: It is also used to send data inform of files from one computer to other with the
facility called FTP (File Transfer Protocol).
2. Gopher
Used to search, retrieve, and display documents on remote sites.
3. Archive
It is a search utility that search on the Internet based on file names or partial file names.
3. Web Services
Web services allow exchange of information between applications on the web. Using web
services, applications can easily interact with each other.
4. World Wide Web
WWW is also known as W3. It offers a way to access documents spread over the several servers
over the internet. These documents may contain texts, graphics, audio, video, hyperlinks. The
hyperlinks allow the users to navigate between the documents.
1. Videoconferencing: One can have a live talk with persons all round the world and can
held meetings as if sitting just by their side by video conferencing of multimedia
conferencing.
2. ON line Entrance Exams and Results: Students can give exams on line through the
Internet.
Advantages of Internet:
Now a day, using internet is almost everywhere. Internet has got its wide spread
acceptance due to the vast set of facilities provided by it. We can search for almost any topic on
the internet using a search engine. Thousands of pages of information is kept available on
10
various topics on the internet.
significant advantages…
Apart from providing information, internet has some more
 Electronic Mail (e-mail): e-mail is a fast, easy and economic way to send messages
to anyone having an internet account. Using e-mails, we can send text messages,
images etc., to anywhere
 in the universe. The information will be dispatched in seconds of time irrespective
of the distance.
 Downloading software and programs: using internet, we can download useful
software, programs etc. Using internet, we can update our existing programs like
antivirus etc., regularly in order keep our computer up to date. Apart from
downloading the software or programs, we can also upload them so that other people
on the internet can utilize them.
 Entertainment: thousands of games are made available on the internet free of cost
to get relaxed. Internet also allows us to review the current movies or any other
topics as well as to be a part of an interactive conversation with several people across
the universe.
 Online shopping and e-commerce: with the use of internet, shopping any article
can be done right from our home or office without visiting the shops. We can order
almost any kind of material like books, computers, software’s, dress etc.,
Internet Applications
1. Search engine
It can be used to search anything and everything. Most popular search engines are Google
and yahoo searches.
2. Shopping
Shopping has become easier with the advent of internet. You can buy or sell online.
3. Communication
This is a major role of the internet. It helps people to communicate either with the use of
social networking websites or through e mails. Even chatting is a major use of the
internet.
4. Job search
Nowadays, many people search for their jobs online as it is quicker and there is a larger
variety of job vacancies present.
5. Hobbies
Those who are having certain hobbies can try to improve on it by reading up on many
aspects of their hobby.
6. Research
Research papers are present online which helps in the researcher doing literature review.
7. Studying
Now right from kinder garden children is exposed to internet and computers. They find
many useful things to learn on the internet (though with supervision). Up to doctorate
11
level education, people rely on internet for their education. Online educational books
have even reduced the need for a library.
What is Internet addressing?
A way to locate people, computers, and Internet resources. It can be
 IP (Internet Protocol) addresses and domain names
 Electronic mail addresses
 URLs
In general, Internet addressing is a systematic way to identify people, computers and Internet
resources.
On the Internet, the term "address" is used loosely. Address can mean many different things from
an electronic mail address to a URL.
 IP Address
An IP address is a unique number that identifies computers on the Internet; every computer
directly connected to the Internet has one. Every client, server and network device must have a
unique IP address for each network connection (network interface).
An IP address consists of four numbers separated by periods(dot). Each number must be between
0 and 255. An example is: 204.81.205.32
 Domain Name
Most computers on the Internet have a unique domain name.
Special computers, called domain name servers, look up the domain name and match it to the
corresponding IP address so that data can be properly routed to its destination on the Internet.
An example domain name is: healthyway.com
Domain names are easier for most people to relate to than a numeric IP address.
12
 Electronic Mail Address
Other networks may use different electronic mail addressing schemes within their own networks.
To be used in Internet e-mail, these addresses often need to be modified.
For example, within CompuServe an e-mail address consists only of two numbers separated by a
comma: 36547,891.


To convert this to an address that can be used on the Internet, the comma is
changed to a period and the number serves as the username.
The domain name is compuserve.com, so the Internet address would be:
36547.891@compuserve.com
 URLs
URL stands for Uniform Resource Locator. URLs are used to identify specific sites and files
available on the World Wide Web.
The structure of a URL is: protocol://server.subdomain.top-level-domain/directory/filename
Similar to an e-mail address, a URL is read like a sentence.
For example the URL
http://www.healthyway.com
Virus
Definition: A virus is a computer program that can copy itself and it can infect other programs
in a computer by modifying them without permission or knowledge of the user.
Different types of Viruses
Boot Sector Virus: A Boot Sector Virus infects the first sector of the hard drive, where the
Master Boot Record (MBR) is stored. The Master Boot Record (MBR) stores the disk's primary
partition table and to store bootstrapping instructions which are executed after the computer's
BIOS passes execution to machine code. If a computer is infected with Boot Sector Virus, when
the computer is turned on, the virus launches immediately and is loaded into memory, enabling it
to control the computer.
• File Deleting Viruses: A File Deleting Virus is designed to delete critical files which are the
part of Operating System or data files.
• Mass Mailer Viruses: Mass Mailer Viruses search e-mail programs like MS outlook for e-mail
addresses which are stored in the address book and replicate by e-mailing themselves to the
addresses stored in the address book of the e-mail program.
13
• Macro viruses: Macro viruses are written by using the Macro programming languages like
VBA, which is a feature of MS office package. A macro is a way to automate and simplify a task
that you perform repeatedly in MS office suit (MS Excel, MS word etc). These macros are
usually stored as part of the document or spreadsheet and can travel to other systems when these
files are transferred to another computers.
• Polymorphic Viruses: Polymorphic Viruses have the capability to change their appearance
and change their code every time they infect a different system. This helps the Polymorphic
Viruses to hide from anti-virus software.
• Armored Viruses: Armored Viruses are type of viruses that are designed and written to make
itself difficult to detect or analyze. An Armored Virus may also have the ability to protect itself
from antivirus programs, making it more difficult to disinfect.
• Stealth viruses: Stealth viruses have the capability to hide from operating system or anti-virus
software by making changes to file sizes or directory structure. Stealth viruses are anti-heuristic
nature which helps them to hide from heuristic detection.
• Polymorphic Viruses: Polymorphic viruses change their form in order to avoid detection and
disinfection by anti-virus applications. After the work, these types of viruses try to hide from the
anti-virus application by encrypting parts of the virus itself. This is known as mutation.
• Retrovirus: Retrovirus is another type virus which tries to attack and disable the anti-virus
application running on the computer. A retrovirus can be considered anti-antivirus. Some
Retroviruses attack the anti-virus application and stop it from running or some other destroys the
virus definition database.
• Multiple Characteristic viruses: Multiple Characteristic viruses has different characteristics
of viruses and have different capabilities.
There are six broad catagories that viruses fall under:
Boot Sector Virus - targets the boot sector of a hard drive and crucially effects the boot
proccess.
1. File Infection Virus - coded viruses that attach themselves to .exe files; compressed files
such as zip or drive files.
2. Multipartite Virus - cross between a file virus and a boot sector virus.
14
3. Network Virus - uniquely created to quickly spread throughout the local area network
and generally across the Internet as well. Typically moves within shared resources like
drives and folders.
4. Macro Virus - infects program files that use macros in the program itself, such as word
processors.
5. E-mail Virus - generally this is a macro virus which multiplies by sending itself to other
contacts in your address book, in hopes they'll activate the virus as well.
15
Download