SlideShare a Scribd company logo
1 of 44
Networks
A network is two or more computer that are linked together for sharing the
same resources. The resources may be printer , scanner and the internet.
Network devices
To establish the networking some network devices are needed.
Router
Each computer linked to the internet have a unique IP address (internet protocol
) . An IP address looks like the : 123.456.1.98.
When data is send from one network to another , its goes in the packets.
Each packet have the details of the destination address of the network .
Computer on the same network all have the same first part of the IP address.
Routers are the devices that read the address information to determine the final
destination of the packet , via the stored information router direct the packet to
the next network journey.
Router
Then data packet is received by the other router to send to final destination.
Router can be used to connect to join several wireless networks or wired
network together.
Routers behaves like an gateways so that computer network can be
communicate together.
Network interface cards (NIC)
Before computer connect to network it must have the NIC . In most of modern
computers NIC is in build in the computers.
These card directly going to connect to mother board and outer socket used to
connect to a network via cables.
NIC does the following :
 It prepares the data for sending
It control the flow of data from computer to the transmission media.
Hubs
It is simply used to enable computer to share files and hardware's like scanner and
printers.
We know that data flow into the packets on the network . A hub contains multiple
ports . When a packet arrives at one port it is transferred to another port so that
all networks computer can see all the packets.
Every device on the network will receive the packet of data.
Switches
Its work same as hub but work in the smart way . Switches read the packet of
data and send on the correct computers.
Because it only sends the data to the correct computer so it reduce the traffic on
the network ; thus speed up the network.
Bridges
Bridges are used to connect to LAN together . When one of the LAN send the
message on the network then all LAN devices receives the message.
LAN is divided into a series of smaller LAN’s. If a message pass from one
computer in LAN to different LAN then the message needs to pass between the
LAN using a bridge.
The advantage is subdividing a larger network is that reduces the traffic with a
different LAN.
A bridge therefore have only two ports in order to connect one LAN to another
one.
Modems
Modems are largely replaced by the routers cause of faster access of the internet.
A modem converts the data from the computer into sound that can be send along
ordinary telephone lines.
Once the data is received at another end then sound need to convert it back to
digital data using another modem.
The use of Wi-Fi and Bluetooth in networks
There are two main technologies that allow wireless communication between
computers.
Wi-Fi
Wi-Fi enables the devices to communicate with each other wirelessly . Areas
where the internet can access wirelessly using Wi-Fi known as access point or hot
spot , it can be find out in public places such as -: airports , coffee shops.
The range of the Wi-Fi depends on the type of wireless router being used , if
there are obstacles like as wall then the speed will going to minimum. The range
is 50 m inside and 100m outside.
The use of Wi-Fi and Bluetooth in networks
Advantage of wireless communication:
You can work wirelessly anywhere.
You can work in any environment like in trains , buses and in some air flights.
It is easier to keep area clean cause no wires.
No network wires so that the cost of installation is so low.
Disadvantage of wireless communication:
The danger of hackers.
There are some areas where you cannot get wireless network.
There are some evidence that there may be danger to health.
Bluetooth
Bluetooth is a wireless technology used for send the data in between short
distance range , its depend on power of signals.
Typically range is around 5m – 100 m .
Use of Bluetooth:
If you have wireless keyboard and mouse then they could use Bluetooth ,
printers also can be controlled via Bluetooth.
Communication between a wireless hands-free headset and a mobile phone.
We can create a small wireless network where computers are so near and low
bandwidth is not an problem.
Transferring small amount of the data like -: appointments , contacts details
between devices.
In many games its used Bluetooth consoles.
Setting and configuring a small network
For setting up small network , it can be done in following easy steps - :
1. Choose an ISP and then pay them for subscription charges and for the router
(Which have wireless access point).
2. Connect to the router to the telephone lines or cable point.
3. Connect any cabled device to the router using wires between the ports of the
routers and the NIC on the device.
4. Connect wireless device like -: laptop , printer using wireless network . You
will need to open the setting in your O.S and then set a new connection for
each device.
5. You will need a browser for access the internet for each device.
Web browser s/w
A web browser is an s/w that allow you to website pages or internet on your
devices.
Web browser read the instruction that how to display the web page on devices .
That instruction are made from HTML ( Hyper text markup language).
Web browser allow to user to find out certain information in these steps - :
1. Entering a URL (Universal resource locator).
2. A web / internet portal
3. Keyword searches
4. Links
5. Menus
Access to ISP
Connecting directly to the internet is really very expensive that is suitable for big companies.
Most of peoples are taking the internet services from the ISP .
These ISP provides you to access the internet as well as some other services -:
Storage on their server , where you can store your website.
E-mail facility
Instant or short messages
Access to news , weather, finance , games pages etc.
When you establish a network with the ISP , they generally supply you the wireless routers .
This will allow you to link devices wirelessly by that you can share the resources like - : printers
and other hardware devices.
****At the back of the router you can see some sockets where you can place Ethernet cable
can be connected.
The internet
The internet is a huge group of worldwide network making communication which
other.
When you connect to the internet it means you become a small part of this big
network.
Advantage of the Internet:
Huge amount of info can be access from anywhere and on anytime
Improved communication system - : IM,E-mails , Chatting
Online shopping/online banking
VOIP(Voice over internet protocol) -:By that we can make cheap call sending our
voice data over the internet , without paying to the long bills on the mobiles
phones example : Skype , We chat , viber.
Disable peoples can shop online.
The internet
Disadvantage of the Internet:
There are so many bogus or fake information reside on the internet . So we
have to careful before going to relay on that.
Cyber crime on internet are now very common on internet , so we have to be
careful to share our personal information.
There are so many gambling websites.
Hacking and virus problems
E-commerce
Sometime organization publish their website for promotional purpose or some
time for selling their good , this is known as E-commerce.
On these websites buyer can see the different products and then can add on their
virtual shopping basket.
After they have to do the payment for their purchasing via card or online banking
method.
They have to fill there contact details for delivery of the product at their door.
The difference between Internet and WWW
The internet is a huge networks of the small network that going to
communicate with each other.
The WWW is the way of accessing all that information on all these networked
computers.
Intranets
AN intranet is an private network , that is used by the same organization peoples
in one campus.
Schools are using the intranet for keep the details of teachers record , student
records , time table and other things.
Parts of an intranet can be available to anyone in the organization , but some
personal details are only accessed by certain peoples.
Restriction of the certain part for others is done by allotting the user their unique
ID and password.
The difference between Intranet and internet
Intranet Internet
Intranet stands for Internal restrict access
network
Internet stands for INTER national network
It contains information about certain
organization.
Internet contains information about
everything.
Intranet can be used by some employees of
the organization.
Internet can be used by everyone.
In intranet we can block the websites via using
proxy server.
Via a internet can be accessed any website.
Intranet
Advantages of intranet -:
Intranets are ideal to use in schools for preventing the certain website or
unwanted information.
The internal mail system is more secure then using the internet.
Only that information is accessible to the users that is don’t going to waste
their time.
Two types of network LAN and WAN
LAN WAN
LAN stands for local area network WAN stands for wide area network
Covers small area ( one site or in a one
building)
Cover large geographical area (countries ,
different building , cities )
Use cables , wireless , infra red owned by
organization
Expensive equipment's supplied by companies
(satellite links)
Less expensive More expensive
WLAN
Wireless local area network where the computers can communicate via wirelessly
in on building example : in one home all the peoples can access the internet.
Advantage of WLAN over cabled LAN - :
Cheaper cause less cabling is needed.
It is easy to link the devices such as printer and scanners.
In the range of wireless you can work anywhere.
Disadvantage of WLAN over cabled LAN - :
In some area of building the signals may be low.
Signals may be hacked by the hackers.
Wireless signals are not reliable , cause data transfer rate may be not so high.
Electronic equipment can be cause of the disturbance of signals.
Advantage and disadvantage of using different devices to
access the internet
We can access the internet from different devices , each devices have their advantage
and disadvantages.
Internet access through smartphone
Advantage - :
Internet can be accessed anywhere even from Wi-Fi and mobile signals.
Stay connected while you are walking
Disadvantage - :
It is possible that children's could access the unsuitable content ,cause its not easy to
monitor.
Some website have trimmed version for the smartphones.
Small screen and keyboard is frustrating.
It will be with you every time , so you are checking mails and other stuff , so you are
missing social life.
Advantage and disadvantage of using different devices to
access the internet
Internet access through tablet
Advantage - :
Tablets are lightweight , easy to carry.
Tablets have larger screen in compare to smartphone so easy to work.
Disadvantage - :
Tablets have smaller screen in comparison to desktop and laptop computers.
Tablets comes with virtual keyboard which is not easy to work.
It can cause health problems cause of awkward positions.
Advantage and disadvantage of using different devices to
access the internet
Internet access through Laptop computer
Advantage - :
Smaller and lighter in comparison to desktop ( portable ) .
Have a large screen in comparison to tablet and smart phones , so easy to work.
Have keyboard so its makes easy for typing large amount of the data.
Can be used when flat surface is not there.
Disadvantage - :
Not portable in comparison to tablet and smart phone.
Screen and keyboard are attached so it may caused of health problem in longer run.
Advantage and disadvantage of using different devices to
access the internet
Internet access through Desktop computer
Advantage - :
Full size key board makes it easy for typing large data.
Most of the websites are designed to be open on desktop , so it have better view of websites.
These are better ergonomically because the monitor and keyboard can be adjusted.
Disadvantage - :
No portable , no easy to carry ( cause heavy weight ).
Hard to use in standing position.
Network issues and communication
We are going to look here problems associated with the network.
Security issue regarding data transfer
If one computer network together with the another computers then there can be thread of
security breach.
If the computer network is connected with the internet then the security risk is even greater.
Security can be compromised in the following ways :
Password interception
We have different password on the internet for chatting, online banking and the other stuff. If
these password are known by the others then they can read your mails, remove your pics , and
money can be stolen from your bank account.
Virus Attack
Virus are major thread for any network . Its an program (instruction of the codes ) who make
itself replicates and then may cause of different damages to the computer and the network.
Some following damages are can be done by the virus :
oDisplay annoying messages on the screen
oDelete your program and data
oUsing computer resources , so it make it slowly.
oSpy on user , to collect the information about the password and other details.
Viruses are going to be created everyday and the every virus have their own damages so you
cannot say what will be the damages will be going to occur cause of the virus.
We must have anti-virus on our computer these antiviruses s/w can detect the virus and delete
it . We must have to upgrade the definition of our antivirus , cause the old anti virus cannot
detect the new developed viruses.
Virus Attack
How to prevent from virus :
oInstall anti-virus s/w
oDo not open the e-mails from unknown sources.
oKeep upgrade your antivirus.
oHave a clear policy for the employees.
oDo not allow the video , games and other things on the organization system.
oDo not open the attachment of e-mail from the unknown resources.
oAvoid to users to use their own removable media in the organization computer network.
Hackers accessing the network
Hacking the process to access the computer system without the permission from the user.
In most cases hackers are going to try user password or they have cracking program by that they
can generate millions of the possible password and try each of them in the turn.
Sometime key-logging or spyware software are installed on the victim computers , and victim is
don’t have knowledge about this and in this case whatever the victim pressing the key on
keyboard its going to be recorded .
Now these record keys hackers can use to extract password , card details and other personal
data.
Use firewall : A firewall can be an s/w or h/w or both , that going to look the data packet is send
or received by the computers . It can allow or block the data . It logs the data is leaving and the
data sent from the computer. It means it can detect unknown IP address and also stop the user
for accessing unauthorized sites.
Hackers accessing the network
Use anti-spyware: This is the special s/w that you can run on your computer , it detect and
remove any spyware program , if your computer have. Spyware s/w is used for collecting the
password and other information by the crackers.
Change password regularly: Its an good habit to change your password in regular intervals
,cause suppose if your password is compromised then still he can use your password for short
while.
Protecting access by using user-IDs/usernames and password
System security is making sure that only authorized peoples can log in there system so regarding
that the system have user ids and password.
Identifying user to the system(User – IDs): A user id is the name or the number given by the
system administrator . Some privileges are going to give by the system administrator on the
network.
The network manager can be track the account activity done by certain user account, So he can
also track the improper use of the internet.
Preventing unauthorized access(The use of password): A password can be combination of the
letters , symbols and the numbers , its depend on the choice of the user. Whenever user enter
his password for login into the system its showing that password an asterisk signs.
If the password is wrong then the user cannot login the account , some networks are set up like
this that if the user enters the password three time wrong then the account going to be locked.
If user is genuine then he have to contact to network administrator and reset the password.
Protecting access by using user-IDs/usernames and password
Choosing a password (Strong vs. week password): There are so many programs are available by
that crackers can easily crack your password , it means if you are only using letters for the
password it can be easily cracked.
Weak passwords examples :
Amit
Shaolin
Angelina
A strong password does not mean to be long , it means itmust have symbols , letters , numbers.
If crackers attack on your computer and find out its not easy to crack your password then its
going to move another computer with weak passwords.
Strong passwords example :
D%2Gt^Ul
Authentication techniques
Many networks have the magnetic stripe card or ID card for entry in the system , but these
system also have username and password in the case of card have been stolen.
Biometric is an good choice for identifying the user , it can use the retinal scanning and
fingerprint scanning . Face recognition can be also used to identify the user.
Iris scanning is better then the retinal scanning because it can be carried out with regular video
cameras and even far as two feet and with the wearing glasses.
Advantage of biometric is that there is nothing to forget.
Encryption
The information needs to be secure when its going to travel on network , that’s why we are
using the method encryption.
Encryption scrambles the data and then send to the true receiver , now only he can unscramble
it.
If this data is interfere by any cracker , it will be meaningless to him.
This process is known as encryption.
It requires encryption and decryption keys for both ends.
Encryption used in many fields :
A. Sending card detail (For online shopping)
B. Online banking (fund transfer and other banking activities)
C. Confidential e-mails.
The Principles of a typical data protection act
The worldwide so much data travel on the internet ,for protection of the data against the
criminals , Many countries introduced the laws that laws are known as data protection act.
What is personal data:
A. Data about an identifiable person (Like : name , address , phone number)
B. Online banking (fund transfer and other banking activities)
C. Data that is more personal (Like : medical records , criminal records ,religious beliefs etc.)
The effect of wrong personal data:
A. Your medical record can be wrong , so you can get wrong treatment.
B. Wrong exam results can spoil your life.
Rights of the data subject and the holder
The person about whom the personal details are held is called subject.
The person in the organization who is holding this data is known as data holder.
A data protection act is a law that protect your data in the following ways :
Registration : Who is going to use the personal data that person must be registered to the data
holder. They must have to explain that for what cause they want this data and what are they
going to do with that data.
Individual can see their data : Anyone can apply for see their personal information that is hold
by the data holder , if there is something inaccurate then subject can correct it , but in some
condition you cant see your records like: any criminal cant see what the record police have
about you.
Data must be secure and up – to -date: Subject can took the organization in the court , if his
data not going to be secure by the organization.
Right for a person to claim compensation: If data processed unlawfully then subject could claim
for the compensation.
Network communication
There are different method provided by ICT for communication.
Physical fax : A physical fax contains a scanner , printer and modem . Firstly the document is
going to be scanned and then modem converts the data into a series of the sound that are send
along with the telephone lines.
To send the fax you have to enter the receiver fax machine number at the receiving end . The
modem at the other end converts the sound back into the data and then printer prints the
document.
At one time only one fax can be send or received.
Electronic/Internet faxing: Its used internet technology rather then the phone network for
sending and receiving the fax . All you need send the fax is a computer or mobile device which
have the internet.
Difference between physical fax & electronic fax
Electronic fax Physical fax
Its required the use of a computer network Its not required.
No phone lines are required. Phone lines required
You can print or save , its your choice. All physical faxes are printed
No machine is required Physical fax machine required.
More then one fax can send or receive Only one fax at a time
Email
An email is an electronic message send from one communication device to another one.
Advantage over to faxing:
1. Emails can be viewed without others seeing them but fax are usually print out when
everyone watching it.
2. Email can be viewed on portable device but physical fax can only be obtain by the fax
machine.
3. The receivers machine may be out of the paper. But emails don’t have that problems.
4. E-mail is cheap but one fax include the cost of phone lines , paper and ink.
Disadvantage:
1. Emails can spread the virus but faxing cannot do that.
2. Faxed signed document are legal but e-mails not
Video conferencing
Video –conferencing allow people to communicate with each other while they are in different
places , its provide real time , it means you can see each other. Peoples can share the data
while they are talking with each other.
It allow peoples to conduct virtual meetings. Desktop video conferencing include : Video card ,
sound card , webcam, microphone and s/w.
Advantage over to faxing:
1. Less stress for the employees , no worries to reach office.
2. Improved family life , more time can spend with family.
3. Save travelling time and money does not spend money for hotels.
4. Meeting can be called on short notice.
5. More environment friendly cause less peoples are travelling.
6. Fewer journey means less traffic jam.
Video conferencing
Disadvantage:
1. The initial cost for the equipment's is high.
2. Poor image and video quality.
3. People feel self-conscious.
4. Actual product cannot can not pass around between the members.
5. Lack face to face contact.
6. Synchronization problem with audio and video.
Web conferencing
Web conferencing is service that allow conferencing events to be shared with users who are in
remote location by using internet.
Usually there will be one sender and many receiver. Web conferencing is used for : Meeting ,
Lectures , Training events. We can share all type of data like voice , video , audio .
Audio conferencing:
It allow to conducting a meeting held by peoples in different locations. That allow to send the
voice.
Policing the internet
Many peoples think that there should be policing on the internet cause there are so many undesirable
site , But some other peoples think that user have to choose which information he / she want to
access.
There are two opinions , let see :
Yes , the internet should be policed:
Children can see vulgar movies.
Film , TV everything is regulate so internet should be regulate also.
There are lots of misinformation.
Every activities in society are policed so internet should be policed.
There are many undesirable websites which are going to tell you how to make explosive and other
things.
No , the internet should not be policed:
It is up to people what they want to see or read.
What is allowed in one country is not allowed in other country so you could not agree on what to
police do.
Free speech is fundamental right, it should not be removed.

More Related Content

Similar to Chapter- 4.pptx

Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networksfarhan516
 
Computer networking project
Computer networking projectComputer networking project
Computer networking projectAshifimrankhan1
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking conceptsjessandy
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_projectkatiettoml
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview RANVIJAY GAUR
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)bluejayjunior
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfHonKencyTress
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second EditionMd Saylab
 
Computer networking
Computer networkingComputer networking
Computer networkingJayVerma35
 
Using computer networks as facility to share information
Using computer networks as facility to share informationUsing computer networks as facility to share information
Using computer networks as facility to share informationguestfe0065
 
Type of computer network
Type of computer networkType of computer network
Type of computer networkTapashRoy16
 

Similar to Chapter- 4.pptx (20)

Pranjal Mishra ppt
Pranjal Mishra pptPranjal Mishra ppt
Pranjal Mishra ppt
 
group 10.pptx
group 10.pptxgroup 10.pptx
group 10.pptx
 
Akki
AkkiAkki
Akki
 
Fg c
Fg cFg c
Fg c
 
INTERNET AS A NETWORK INFRASTRUCTURE ...
INTERNET AS A NETWORK INFRASTRUCTURE                                         ...INTERNET AS A NETWORK INFRASTRUCTURE                                         ...
INTERNET AS A NETWORK INFRASTRUCTURE ...
 
Welcome to Computer Networks
Welcome to Computer NetworksWelcome to Computer Networks
Welcome to Computer Networks
 
Computer networking project
Computer networking projectComputer networking project
Computer networking project
 
Networking Concepts
Networking ConceptsNetworking Concepts
Networking Concepts
 
Class viii ch-1 networking concepts
Class  viii ch-1 networking conceptsClass  viii ch-1 networking concepts
Class viii ch-1 networking concepts
 
Kai
KaiKai
Kai
 
Katie & toms_computer_network_project
Katie & toms_computer_network_projectKatie & toms_computer_network_project
Katie & toms_computer_network_project
 
Data Communication and Computer Network Overview
Data Communication and Computer Network Overview Data Communication and Computer Network Overview
Data Communication and Computer Network Overview
 
Network
NetworkNetwork
Network
 
01 intro to internet (re-upload)
01 intro to internet (re-upload)01 intro to internet (re-upload)
01 intro to internet (re-upload)
 
ICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdfICT - Lecture Notes 5.pdf
ICT - Lecture Notes 5.pdf
 
Computer Network Second Edition
Computer Network Second EditionComputer Network Second Edition
Computer Network Second Edition
 
Computer networking
Computer networkingComputer networking
Computer networking
 
Using computer networks as facility to share information
Using computer networks as facility to share informationUsing computer networks as facility to share information
Using computer networks as facility to share information
 
Type of computer network
Type of computer networkType of computer network
Type of computer network
 
Assignment 1
Assignment 1  Assignment 1
Assignment 1
 

Recently uploaded

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...aditipandeya
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...akbard9823
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一3sw2qly1
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 

Recently uploaded (20)

Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
VIP 7001035870 Find & Meet Hyderabad Call Girls Dilsukhnagar high-profile Cal...
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
Sushant Golf City / best call girls in Lucknow | Service-oriented sexy call g...
 
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
定制(CC毕业证书)美国美国社区大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls KolkataLow Rate Call Girls Kolkata Avani 🤌  8250192130 🚀 Vip Call Girls Kolkata
Low Rate Call Girls Kolkata Avani 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 

Chapter- 4.pptx

  • 1. Networks A network is two or more computer that are linked together for sharing the same resources. The resources may be printer , scanner and the internet. Network devices To establish the networking some network devices are needed. Router Each computer linked to the internet have a unique IP address (internet protocol ) . An IP address looks like the : 123.456.1.98. When data is send from one network to another , its goes in the packets. Each packet have the details of the destination address of the network . Computer on the same network all have the same first part of the IP address. Routers are the devices that read the address information to determine the final destination of the packet , via the stored information router direct the packet to the next network journey.
  • 2. Router Then data packet is received by the other router to send to final destination. Router can be used to connect to join several wireless networks or wired network together. Routers behaves like an gateways so that computer network can be communicate together.
  • 3. Network interface cards (NIC) Before computer connect to network it must have the NIC . In most of modern computers NIC is in build in the computers. These card directly going to connect to mother board and outer socket used to connect to a network via cables. NIC does the following :  It prepares the data for sending It control the flow of data from computer to the transmission media.
  • 4. Hubs It is simply used to enable computer to share files and hardware's like scanner and printers. We know that data flow into the packets on the network . A hub contains multiple ports . When a packet arrives at one port it is transferred to another port so that all networks computer can see all the packets. Every device on the network will receive the packet of data.
  • 5. Switches Its work same as hub but work in the smart way . Switches read the packet of data and send on the correct computers. Because it only sends the data to the correct computer so it reduce the traffic on the network ; thus speed up the network.
  • 6. Bridges Bridges are used to connect to LAN together . When one of the LAN send the message on the network then all LAN devices receives the message. LAN is divided into a series of smaller LAN’s. If a message pass from one computer in LAN to different LAN then the message needs to pass between the LAN using a bridge. The advantage is subdividing a larger network is that reduces the traffic with a different LAN. A bridge therefore have only two ports in order to connect one LAN to another one.
  • 7. Modems Modems are largely replaced by the routers cause of faster access of the internet. A modem converts the data from the computer into sound that can be send along ordinary telephone lines. Once the data is received at another end then sound need to convert it back to digital data using another modem.
  • 8. The use of Wi-Fi and Bluetooth in networks There are two main technologies that allow wireless communication between computers. Wi-Fi Wi-Fi enables the devices to communicate with each other wirelessly . Areas where the internet can access wirelessly using Wi-Fi known as access point or hot spot , it can be find out in public places such as -: airports , coffee shops. The range of the Wi-Fi depends on the type of wireless router being used , if there are obstacles like as wall then the speed will going to minimum. The range is 50 m inside and 100m outside.
  • 9. The use of Wi-Fi and Bluetooth in networks Advantage of wireless communication: You can work wirelessly anywhere. You can work in any environment like in trains , buses and in some air flights. It is easier to keep area clean cause no wires. No network wires so that the cost of installation is so low. Disadvantage of wireless communication: The danger of hackers. There are some areas where you cannot get wireless network. There are some evidence that there may be danger to health.
  • 10. Bluetooth Bluetooth is a wireless technology used for send the data in between short distance range , its depend on power of signals. Typically range is around 5m – 100 m . Use of Bluetooth: If you have wireless keyboard and mouse then they could use Bluetooth , printers also can be controlled via Bluetooth. Communication between a wireless hands-free headset and a mobile phone. We can create a small wireless network where computers are so near and low bandwidth is not an problem. Transferring small amount of the data like -: appointments , contacts details between devices. In many games its used Bluetooth consoles.
  • 11. Setting and configuring a small network For setting up small network , it can be done in following easy steps - : 1. Choose an ISP and then pay them for subscription charges and for the router (Which have wireless access point). 2. Connect to the router to the telephone lines or cable point. 3. Connect any cabled device to the router using wires between the ports of the routers and the NIC on the device. 4. Connect wireless device like -: laptop , printer using wireless network . You will need to open the setting in your O.S and then set a new connection for each device. 5. You will need a browser for access the internet for each device.
  • 12. Web browser s/w A web browser is an s/w that allow you to website pages or internet on your devices. Web browser read the instruction that how to display the web page on devices . That instruction are made from HTML ( Hyper text markup language). Web browser allow to user to find out certain information in these steps - : 1. Entering a URL (Universal resource locator). 2. A web / internet portal 3. Keyword searches 4. Links 5. Menus
  • 13. Access to ISP Connecting directly to the internet is really very expensive that is suitable for big companies. Most of peoples are taking the internet services from the ISP . These ISP provides you to access the internet as well as some other services -: Storage on their server , where you can store your website. E-mail facility Instant or short messages Access to news , weather, finance , games pages etc. When you establish a network with the ISP , they generally supply you the wireless routers . This will allow you to link devices wirelessly by that you can share the resources like - : printers and other hardware devices. ****At the back of the router you can see some sockets where you can place Ethernet cable can be connected.
  • 14. The internet The internet is a huge group of worldwide network making communication which other. When you connect to the internet it means you become a small part of this big network. Advantage of the Internet: Huge amount of info can be access from anywhere and on anytime Improved communication system - : IM,E-mails , Chatting Online shopping/online banking VOIP(Voice over internet protocol) -:By that we can make cheap call sending our voice data over the internet , without paying to the long bills on the mobiles phones example : Skype , We chat , viber. Disable peoples can shop online.
  • 15. The internet Disadvantage of the Internet: There are so many bogus or fake information reside on the internet . So we have to careful before going to relay on that. Cyber crime on internet are now very common on internet , so we have to be careful to share our personal information. There are so many gambling websites. Hacking and virus problems
  • 16. E-commerce Sometime organization publish their website for promotional purpose or some time for selling their good , this is known as E-commerce. On these websites buyer can see the different products and then can add on their virtual shopping basket. After they have to do the payment for their purchasing via card or online banking method. They have to fill there contact details for delivery of the product at their door.
  • 17. The difference between Internet and WWW The internet is a huge networks of the small network that going to communicate with each other. The WWW is the way of accessing all that information on all these networked computers.
  • 18. Intranets AN intranet is an private network , that is used by the same organization peoples in one campus. Schools are using the intranet for keep the details of teachers record , student records , time table and other things. Parts of an intranet can be available to anyone in the organization , but some personal details are only accessed by certain peoples. Restriction of the certain part for others is done by allotting the user their unique ID and password.
  • 19. The difference between Intranet and internet Intranet Internet Intranet stands for Internal restrict access network Internet stands for INTER national network It contains information about certain organization. Internet contains information about everything. Intranet can be used by some employees of the organization. Internet can be used by everyone. In intranet we can block the websites via using proxy server. Via a internet can be accessed any website.
  • 20. Intranet Advantages of intranet -: Intranets are ideal to use in schools for preventing the certain website or unwanted information. The internal mail system is more secure then using the internet. Only that information is accessible to the users that is don’t going to waste their time.
  • 21. Two types of network LAN and WAN LAN WAN LAN stands for local area network WAN stands for wide area network Covers small area ( one site or in a one building) Cover large geographical area (countries , different building , cities ) Use cables , wireless , infra red owned by organization Expensive equipment's supplied by companies (satellite links) Less expensive More expensive
  • 22. WLAN Wireless local area network where the computers can communicate via wirelessly in on building example : in one home all the peoples can access the internet. Advantage of WLAN over cabled LAN - : Cheaper cause less cabling is needed. It is easy to link the devices such as printer and scanners. In the range of wireless you can work anywhere. Disadvantage of WLAN over cabled LAN - : In some area of building the signals may be low. Signals may be hacked by the hackers. Wireless signals are not reliable , cause data transfer rate may be not so high. Electronic equipment can be cause of the disturbance of signals.
  • 23. Advantage and disadvantage of using different devices to access the internet We can access the internet from different devices , each devices have their advantage and disadvantages. Internet access through smartphone Advantage - : Internet can be accessed anywhere even from Wi-Fi and mobile signals. Stay connected while you are walking Disadvantage - : It is possible that children's could access the unsuitable content ,cause its not easy to monitor. Some website have trimmed version for the smartphones. Small screen and keyboard is frustrating. It will be with you every time , so you are checking mails and other stuff , so you are missing social life.
  • 24. Advantage and disadvantage of using different devices to access the internet Internet access through tablet Advantage - : Tablets are lightweight , easy to carry. Tablets have larger screen in compare to smartphone so easy to work. Disadvantage - : Tablets have smaller screen in comparison to desktop and laptop computers. Tablets comes with virtual keyboard which is not easy to work. It can cause health problems cause of awkward positions.
  • 25. Advantage and disadvantage of using different devices to access the internet Internet access through Laptop computer Advantage - : Smaller and lighter in comparison to desktop ( portable ) . Have a large screen in comparison to tablet and smart phones , so easy to work. Have keyboard so its makes easy for typing large amount of the data. Can be used when flat surface is not there. Disadvantage - : Not portable in comparison to tablet and smart phone. Screen and keyboard are attached so it may caused of health problem in longer run.
  • 26. Advantage and disadvantage of using different devices to access the internet Internet access through Desktop computer Advantage - : Full size key board makes it easy for typing large data. Most of the websites are designed to be open on desktop , so it have better view of websites. These are better ergonomically because the monitor and keyboard can be adjusted. Disadvantage - : No portable , no easy to carry ( cause heavy weight ). Hard to use in standing position.
  • 27. Network issues and communication We are going to look here problems associated with the network. Security issue regarding data transfer If one computer network together with the another computers then there can be thread of security breach. If the computer network is connected with the internet then the security risk is even greater. Security can be compromised in the following ways : Password interception We have different password on the internet for chatting, online banking and the other stuff. If these password are known by the others then they can read your mails, remove your pics , and money can be stolen from your bank account.
  • 28. Virus Attack Virus are major thread for any network . Its an program (instruction of the codes ) who make itself replicates and then may cause of different damages to the computer and the network. Some following damages are can be done by the virus : oDisplay annoying messages on the screen oDelete your program and data oUsing computer resources , so it make it slowly. oSpy on user , to collect the information about the password and other details. Viruses are going to be created everyday and the every virus have their own damages so you cannot say what will be the damages will be going to occur cause of the virus. We must have anti-virus on our computer these antiviruses s/w can detect the virus and delete it . We must have to upgrade the definition of our antivirus , cause the old anti virus cannot detect the new developed viruses.
  • 29. Virus Attack How to prevent from virus : oInstall anti-virus s/w oDo not open the e-mails from unknown sources. oKeep upgrade your antivirus. oHave a clear policy for the employees. oDo not allow the video , games and other things on the organization system. oDo not open the attachment of e-mail from the unknown resources. oAvoid to users to use their own removable media in the organization computer network.
  • 30. Hackers accessing the network Hacking the process to access the computer system without the permission from the user. In most cases hackers are going to try user password or they have cracking program by that they can generate millions of the possible password and try each of them in the turn. Sometime key-logging or spyware software are installed on the victim computers , and victim is don’t have knowledge about this and in this case whatever the victim pressing the key on keyboard its going to be recorded . Now these record keys hackers can use to extract password , card details and other personal data. Use firewall : A firewall can be an s/w or h/w or both , that going to look the data packet is send or received by the computers . It can allow or block the data . It logs the data is leaving and the data sent from the computer. It means it can detect unknown IP address and also stop the user for accessing unauthorized sites.
  • 31. Hackers accessing the network Use anti-spyware: This is the special s/w that you can run on your computer , it detect and remove any spyware program , if your computer have. Spyware s/w is used for collecting the password and other information by the crackers. Change password regularly: Its an good habit to change your password in regular intervals ,cause suppose if your password is compromised then still he can use your password for short while.
  • 32. Protecting access by using user-IDs/usernames and password System security is making sure that only authorized peoples can log in there system so regarding that the system have user ids and password. Identifying user to the system(User – IDs): A user id is the name or the number given by the system administrator . Some privileges are going to give by the system administrator on the network. The network manager can be track the account activity done by certain user account, So he can also track the improper use of the internet. Preventing unauthorized access(The use of password): A password can be combination of the letters , symbols and the numbers , its depend on the choice of the user. Whenever user enter his password for login into the system its showing that password an asterisk signs. If the password is wrong then the user cannot login the account , some networks are set up like this that if the user enters the password three time wrong then the account going to be locked. If user is genuine then he have to contact to network administrator and reset the password.
  • 33. Protecting access by using user-IDs/usernames and password Choosing a password (Strong vs. week password): There are so many programs are available by that crackers can easily crack your password , it means if you are only using letters for the password it can be easily cracked. Weak passwords examples : Amit Shaolin Angelina A strong password does not mean to be long , it means itmust have symbols , letters , numbers. If crackers attack on your computer and find out its not easy to crack your password then its going to move another computer with weak passwords. Strong passwords example : D%2Gt^Ul
  • 34. Authentication techniques Many networks have the magnetic stripe card or ID card for entry in the system , but these system also have username and password in the case of card have been stolen. Biometric is an good choice for identifying the user , it can use the retinal scanning and fingerprint scanning . Face recognition can be also used to identify the user. Iris scanning is better then the retinal scanning because it can be carried out with regular video cameras and even far as two feet and with the wearing glasses. Advantage of biometric is that there is nothing to forget.
  • 35. Encryption The information needs to be secure when its going to travel on network , that’s why we are using the method encryption. Encryption scrambles the data and then send to the true receiver , now only he can unscramble it. If this data is interfere by any cracker , it will be meaningless to him. This process is known as encryption. It requires encryption and decryption keys for both ends. Encryption used in many fields : A. Sending card detail (For online shopping) B. Online banking (fund transfer and other banking activities) C. Confidential e-mails.
  • 36. The Principles of a typical data protection act The worldwide so much data travel on the internet ,for protection of the data against the criminals , Many countries introduced the laws that laws are known as data protection act. What is personal data: A. Data about an identifiable person (Like : name , address , phone number) B. Online banking (fund transfer and other banking activities) C. Data that is more personal (Like : medical records , criminal records ,religious beliefs etc.) The effect of wrong personal data: A. Your medical record can be wrong , so you can get wrong treatment. B. Wrong exam results can spoil your life.
  • 37. Rights of the data subject and the holder The person about whom the personal details are held is called subject. The person in the organization who is holding this data is known as data holder. A data protection act is a law that protect your data in the following ways : Registration : Who is going to use the personal data that person must be registered to the data holder. They must have to explain that for what cause they want this data and what are they going to do with that data. Individual can see their data : Anyone can apply for see their personal information that is hold by the data holder , if there is something inaccurate then subject can correct it , but in some condition you cant see your records like: any criminal cant see what the record police have about you. Data must be secure and up – to -date: Subject can took the organization in the court , if his data not going to be secure by the organization. Right for a person to claim compensation: If data processed unlawfully then subject could claim for the compensation.
  • 38. Network communication There are different method provided by ICT for communication. Physical fax : A physical fax contains a scanner , printer and modem . Firstly the document is going to be scanned and then modem converts the data into a series of the sound that are send along with the telephone lines. To send the fax you have to enter the receiver fax machine number at the receiving end . The modem at the other end converts the sound back into the data and then printer prints the document. At one time only one fax can be send or received. Electronic/Internet faxing: Its used internet technology rather then the phone network for sending and receiving the fax . All you need send the fax is a computer or mobile device which have the internet.
  • 39. Difference between physical fax & electronic fax Electronic fax Physical fax Its required the use of a computer network Its not required. No phone lines are required. Phone lines required You can print or save , its your choice. All physical faxes are printed No machine is required Physical fax machine required. More then one fax can send or receive Only one fax at a time
  • 40. Email An email is an electronic message send from one communication device to another one. Advantage over to faxing: 1. Emails can be viewed without others seeing them but fax are usually print out when everyone watching it. 2. Email can be viewed on portable device but physical fax can only be obtain by the fax machine. 3. The receivers machine may be out of the paper. But emails don’t have that problems. 4. E-mail is cheap but one fax include the cost of phone lines , paper and ink. Disadvantage: 1. Emails can spread the virus but faxing cannot do that. 2. Faxed signed document are legal but e-mails not
  • 41. Video conferencing Video –conferencing allow people to communicate with each other while they are in different places , its provide real time , it means you can see each other. Peoples can share the data while they are talking with each other. It allow peoples to conduct virtual meetings. Desktop video conferencing include : Video card , sound card , webcam, microphone and s/w. Advantage over to faxing: 1. Less stress for the employees , no worries to reach office. 2. Improved family life , more time can spend with family. 3. Save travelling time and money does not spend money for hotels. 4. Meeting can be called on short notice. 5. More environment friendly cause less peoples are travelling. 6. Fewer journey means less traffic jam.
  • 42. Video conferencing Disadvantage: 1. The initial cost for the equipment's is high. 2. Poor image and video quality. 3. People feel self-conscious. 4. Actual product cannot can not pass around between the members. 5. Lack face to face contact. 6. Synchronization problem with audio and video.
  • 43. Web conferencing Web conferencing is service that allow conferencing events to be shared with users who are in remote location by using internet. Usually there will be one sender and many receiver. Web conferencing is used for : Meeting , Lectures , Training events. We can share all type of data like voice , video , audio . Audio conferencing: It allow to conducting a meeting held by peoples in different locations. That allow to send the voice.
  • 44. Policing the internet Many peoples think that there should be policing on the internet cause there are so many undesirable site , But some other peoples think that user have to choose which information he / she want to access. There are two opinions , let see : Yes , the internet should be policed: Children can see vulgar movies. Film , TV everything is regulate so internet should be regulate also. There are lots of misinformation. Every activities in society are policed so internet should be policed. There are many undesirable websites which are going to tell you how to make explosive and other things. No , the internet should not be policed: It is up to people what they want to see or read. What is allowed in one country is not allowed in other country so you could not agree on what to police do. Free speech is fundamental right, it should not be removed.