Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

Fa13 7718-ch7 9-singh


Published on

CS 901 #7718 | TIA Chapters 7 & 9 | Singh

Published in: Technology
  • Be the first to comment

  • Be the first to like this

Fa13 7718-ch7 9-singh

  1. 1. Technology in Action Overview of Chapter 7 & 9 By Harbakshish Singh
  2. 2. Fundamentals of Networking A computer network has two or more computers There are two categories of networks (LANs and WANs) They are connected via software and hardware Any device connected to network is called node
  3. 3. Advantages of Networks Share an Internet connection Conserve Resources Centralized Administration Lower cost licensing Share printers and other peripheral devices Share files and communicate with computers Avoid file duplication and corruption
  4. 4. Disadvantages of Networks Viruses Hacking Network failure Expert support required Cost Slow service
  5. 5. Ways to classify Networks PAN (A personal area network) LAN (A local area network) MAN (A metropolitan area network) HAN (A home area network) WAN (A wide area network)
  6. 6. What are Layers Physical Layer Application Layer Data Link Layer Presentation Layer Session Layer Network Layer Transport Layer
  7. 7. Types of Layers and their use
  8. 8. Function of Layers
  9. 9. TCP/IP Model Consists of four layers Link/Network Interface Application Internet Transport
  10. 10. Example of TCP/IP
  11. 11. Types Home Networks Ethernet networks are the most common networks used in home networking. Wired Ethernet home networks use the gigabit Ethernet standard. Most Ethernet networks use a combination of wired and wireless connections, depending on the data throughput required. Wired connections usually achieve higher throughput than wireless connections. Wireless Ethernet networks are identified by a protocol standard: 802.11 a/b/g/n. • 802.11n is the most current standard.
  12. 12. Connection-oriented vs. Connectionless Communication • POP (Popular Post Office Protocol) used for sending email messages require email client and server verification • VoIP (Voice over IP) used to make call without verifying first whether another device is there.
  13. 13. Example of Connection between e-mail client and server
  14. 14. Example of Connectionless communication
  15. 15. Components of Network • A means of connecting the nodes on the net- work (cables or wireless technology) • Special hardware devices that allow the nodes to communicate with each other and to send data • Software that allows the network to run
  16. 16. Ways to Connect to Internet • Cable transmits data over coaxial cable that is also used for cable television. • DSL uses twisted-pair wire, similar to that used for telephones. • Fiber-optic cable uses glass or plastic strands to transmit data via light signals. • Satellite is a connection option for those who do not have access to faster broadband technologies. • WiFi allows users to connect to the Internet wire-lessly but is not as fast as a wired connection. • Mobile broadband is a 3G or 4G service delivered by cell-phone networks.
  17. 17. Securing Wireless Change your network name (SSID) Implement media access control Limit your signal range Disable SSID broadcast Create a passphrase Apply firmware upgrade Change the default password on your router Turn on security protocols
  18. 18. Some networking facts A network with computers acting as both clients and servers is a peer-to-peer network Connection-oriented communication requires the client and server to acknowledge the transmission A router connects LANs and directs packets to the correct LAN Ethernet is the standard A hub repeats frames down every attached network cable
  19. 19. Cybercrime and Identity Theft By Harbakshish Singh
  20. 20. Cybercrime The computer as a target- attacking the computers of others The computer as an accessory- using computer as a fancy filing cabinet to store illegal or stolen information The computer as a weapon- using a computer to commit crime
  21. 21. Examples of Cybercrime • • • • • Identity theft Credit Card theft Computer viruses Illegal access of computer systems Auction fraud
  22. 22. Example Cybercrime in current news Six arrested in $45 million global cybercrime scheme The six arrested Monday were "cashers" in the scheme, withdrawing approximately $2.8 million from more than 140 ATMs in New York City Worldwide ATM heist that stole $45 million from two Middle East banks
  23. 23. Cybercrime news article
  24. 24. Types of Viruses Boot sector viruses Logic bombs and time bombs Worms Scripts and macro viruses E-mail viruses Encryption viruses
  25. 25. What is social engineering, and how do I avoid falling prey to phishing? Social engineering schemes use human interaction, deception, and trickery to fool people into revealing sensitive information such as credit card numbers and passwords. Phishing schemes usually involve e-mails that direct the unwary to a website that appears to be legitimate, such as a bank site, but that is specifically designed to capture personal information for committing fraud. To avoid phishing scams, you should never reply directly to any e-mail asking you for personal information and never click on a link in an e-mail to go to a website. Don't fall for scareware scams that attempt to frighten you by pretending there is something wrong with your computer.
  26. 26. Protect Physical Computer Assets Computing devices should be kept in clean environments You should protect all electronic devices from power surges by hooking them up through surge protectors Mobile devices can be protected from theft by installing software that will (1) set off an alarm if the computer is moved; (2) help recover the computer, if stolen, by reporting the computer's whereabouts when it is connected to the Internet; and/or (3) allow you to lock or wipe the contents of the digital device remotely.
  27. 27. The End Presentation By Harbakshish Singh