Technology in Action Overview of Chapter 7 & 9

By Harbakshish Singh
Fundamentals of Networking
A computer
network has
two or more
computers

There are two
categories of
networks
(LANs and
WA...
Advantages of Networks
Share an Internet
connection
Conserve
Resources

Centralized
Administration

Lower cost
licensing

...
Disadvantages of Networks

Viruses

Hacking

Network
failure

Expert
support
required

Cost

Slow service
Ways to classify Networks
PAN (A
personal area
network)

LAN (A local
area network)

MAN (A
metropolitan
area network)

HA...
What are Layers
Physical
Layer
Application
Layer

Data Link
Layer

Presentation
Layer

Session Layer

Network
Layer

Trans...
Types of Layers and their use
Function of Layers
TCP/IP Model Consists of four layers

Link/Network
Interface

Application

Internet

Transport
Example of TCP/IP
Types Home Networks
Ethernet networks are the most
common networks used in home
networking.

Wired Ethernet home networks
...
Connection-oriented vs.
Connectionless Communication
• POP (Popular Post Office Protocol) used for sending
email messages ...
Example of Connection between e-mail client and server
Example of Connectionless communication
Components of Network
• A means of connecting the nodes on the
net- work (cables or wireless
technology)
• Special hardwar...
Ways to Connect to Internet
• Cable transmits data over coaxial cable that is also
used for cable television.
• DSL uses t...
Securing Wireless
Change your
network name
(SSID)

Implement media
access control

Limit your signal
range

Disable SSID
b...
Some networking facts
A network with computers
acting as both clients and
servers is a peer-to-peer
network

Connection-or...
Cybercrime and Identity Theft
By Harbakshish Singh
Cybercrime
The computer as a
target- attacking the
computers of others

The computer as
an accessory- using
computer as a
...
Examples of Cybercrime

•
•
•
•
•

Identity theft
Credit Card theft
Computer viruses
Illegal access of computer systems
Au...
Example Cybercrime in current news
Six arrested in $45 million
global cybercrime scheme

The six arrested Monday were
"cas...
Cybercrime news article
Types of Viruses

Boot
sector
viruses

Logic
bombs
and time
bombs

Worms

Scripts
and macro
viruses

E-mail
viruses

Encry...
What is social engineering, and how do I avoid
falling prey to phishing?

Social engineering schemes use human interaction...
Protect Physical Computer Assets
Computing devices should be kept in clean environments

You should protect all electronic...
The End
Presentation By Harbakshish Singh
Upcoming SlideShare
Loading in...5
×

Fa13 7718-ch7 9-singh

175

Published on

CS 901 #7718 | TIA Chapters 7 & 9 | Singh

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
175
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
3
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide
  • A personal area network (PAN) is used for communication among personal mobile devices using Bluetooth or WiFi wireless technologies.A local area network (LAN) connects nodes that are located in a small geographic area.A home area network (HAN) is a specific type of LAN located in a home.A metropolitan area network (MAN) is a large network in a specific geographic area.A wide area network (WAN) spans a large physical distance.
  • Fa13 7718-ch7 9-singh

    1. 1. Technology in Action Overview of Chapter 7 & 9 By Harbakshish Singh
    2. 2. Fundamentals of Networking A computer network has two or more computers There are two categories of networks (LANs and WANs) They are connected via software and hardware Any device connected to network is called node
    3. 3. Advantages of Networks Share an Internet connection Conserve Resources Centralized Administration Lower cost licensing Share printers and other peripheral devices Share files and communicate with computers Avoid file duplication and corruption
    4. 4. Disadvantages of Networks Viruses Hacking Network failure Expert support required Cost Slow service
    5. 5. Ways to classify Networks PAN (A personal area network) LAN (A local area network) MAN (A metropolitan area network) HAN (A home area network) WAN (A wide area network)
    6. 6. What are Layers Physical Layer Application Layer Data Link Layer Presentation Layer Session Layer Network Layer Transport Layer
    7. 7. Types of Layers and their use
    8. 8. Function of Layers
    9. 9. TCP/IP Model Consists of four layers Link/Network Interface Application Internet Transport
    10. 10. Example of TCP/IP
    11. 11. Types Home Networks Ethernet networks are the most common networks used in home networking. Wired Ethernet home networks use the gigabit Ethernet standard. Most Ethernet networks use a combination of wired and wireless connections, depending on the data throughput required. Wired connections usually achieve higher throughput than wireless connections. Wireless Ethernet networks are identified by a protocol standard: 802.11 a/b/g/n. • 802.11n is the most current standard.
    12. 12. Connection-oriented vs. Connectionless Communication • POP (Popular Post Office Protocol) used for sending email messages require email client and server verification • VoIP (Voice over IP) used to make call without verifying first whether another device is there.
    13. 13. Example of Connection between e-mail client and server
    14. 14. Example of Connectionless communication
    15. 15. Components of Network • A means of connecting the nodes on the net- work (cables or wireless technology) • Special hardware devices that allow the nodes to communicate with each other and to send data • Software that allows the network to run
    16. 16. Ways to Connect to Internet • Cable transmits data over coaxial cable that is also used for cable television. • DSL uses twisted-pair wire, similar to that used for telephones. • Fiber-optic cable uses glass or plastic strands to transmit data via light signals. • Satellite is a connection option for those who do not have access to faster broadband technologies. • WiFi allows users to connect to the Internet wire-lessly but is not as fast as a wired connection. • Mobile broadband is a 3G or 4G service delivered by cell-phone networks.
    17. 17. Securing Wireless Change your network name (SSID) Implement media access control Limit your signal range Disable SSID broadcast Create a passphrase Apply firmware upgrade Change the default password on your router Turn on security protocols
    18. 18. Some networking facts A network with computers acting as both clients and servers is a peer-to-peer network Connection-oriented communication requires the client and server to acknowledge the transmission A router connects LANs and directs packets to the correct LAN Ethernet is the standard A hub repeats frames down every attached network cable
    19. 19. Cybercrime and Identity Theft By Harbakshish Singh
    20. 20. Cybercrime The computer as a target- attacking the computers of others The computer as an accessory- using computer as a fancy filing cabinet to store illegal or stolen information The computer as a weapon- using a computer to commit crime
    21. 21. Examples of Cybercrime • • • • • Identity theft Credit Card theft Computer viruses Illegal access of computer systems Auction fraud
    22. 22. Example Cybercrime in current news Six arrested in $45 million global cybercrime scheme The six arrested Monday were "cashers" in the scheme, withdrawing approximately $2.8 million from more than 140 ATMs in New York City Worldwide ATM heist that stole $45 million from two Middle East banks
    23. 23. Cybercrime news article
    24. 24. Types of Viruses Boot sector viruses Logic bombs and time bombs Worms Scripts and macro viruses E-mail viruses Encryption viruses
    25. 25. What is social engineering, and how do I avoid falling prey to phishing? Social engineering schemes use human interaction, deception, and trickery to fool people into revealing sensitive information such as credit card numbers and passwords. Phishing schemes usually involve e-mails that direct the unwary to a website that appears to be legitimate, such as a bank site, but that is specifically designed to capture personal information for committing fraud. To avoid phishing scams, you should never reply directly to any e-mail asking you for personal information and never click on a link in an e-mail to go to a website. Don't fall for scareware scams that attempt to frighten you by pretending there is something wrong with your computer.
    26. 26. Protect Physical Computer Assets Computing devices should be kept in clean environments You should protect all electronic devices from power surges by hooking them up through surge protectors Mobile devices can be protected from theft by installing software that will (1) set off an alarm if the computer is moved; (2) help recover the computer, if stolen, by reporting the computer's whereabouts when it is connected to the Internet; and/or (3) allow you to lock or wipe the contents of the digital device remotely.
    27. 27. The End Presentation By Harbakshish Singh
    1. A particular slide catching your eye?

      Clipping is a handy way to collect important slides you want to go back to later.

    ×