SlideShare a Scribd company logo
1 of 51
COMPUTER NETWORK
DaVid Kawlni, Department of Computer Science
GOVT. SERCHHIP COLLEGE COACHING CENTRE
2022
WHAT IS A NETWORK?
A group of two or more similar
things or people
interconnected with each other is
called network.
EVOLUTION OF NETWORK
TYPES OF NETWORKS
TYPES OF NETWORKS
PAN
It is a network formed by connecting a few personal
devices like computers, laptops, mobile phones, smart
phones, printers etc.
USB
WIFI
BLUETOOTH
LAN
It is a network that connects computers,
mobile phones, tablet, mouse, printer, etc.,
placed at a limited distance.
The geographical area covered by a LAN can
range from a single room, a floor, an office
having one or more buildings in the same
premise, laboratory, a school, college, or
university campus.
MAN
Metropolitan Area Network (MAN) is
an extended form of LAN which
covers a larger geographical area like a
city or a town.
WAN
Wide Area Network connects computers and other
LANs and MANs, which are spread across different
geographical locations of a country or in different
countries or continents. Large business, educational and
government organisations connect their different
branches in different locations across the world
through WAN.
The Internet is the largest WAN that connects billions
of computers, smartphones and millions of LANs
from different continents.
NETWORK DEVICES
MODEM (MODULATOR-DEMODULATOR)
It refers to a device used for conversion between analog signals and digital bits.
ETHERNET CARD OR
NIC (NETWORK
INTERFACE CARD)
Ethernet card, also known as Network
Interface Card (NIC card in short) is a
network adapter used to set up a wired
network.
It acts as an interface between
computer and the network. It is a
circuit board mounted on the
motherboard of a computer
RJ 45
REGISTERED JACK
RJ 45 or Registered Jack-45 is an
eight-pin connector that is used
exclusively with Ethernet cables for
networking.
It is a standard networking
interface that can be seen at the
end of all network cables.
REPEATER
Data are carried in the form of signals over
the cable. These signals can travel a
specified distance (usually about 100 m).
A repeater is an analog device that works
with signals on the cables to which it is
connected. The weakened signal appearing
on the cable is regenerated and put back on
the cable by a repeater
HUB
A network device used to
connect different devices
through wires.
Data arriving on any of the
lines are sent out on all the
others.
SWITCH
A network switch is used to
connect multiple computers
or communicating devices.
ROUTER
A router is a network device
that can receive the data,
analyse it and transmit it to
other networks. A router
connects a local area network
to the internet.
GATEWAY
For simple Internet
connectivity at homes, the
gateway is usually the
Internet Service Provider that
provides access to the entire
Internet.
“
”
The World Wide Web (WWW) or web in short, is an ocean of
information, stored in the form of trillions of interlinked web
pages and web resources. The resources on the web can be
shared or accessed through the Internet.
Sir Tim Berners-Lee — a British computer scientist invented the
revolutionary World Wide Web in 1990
WORD WIDE WEB
HyperText Markup Language. It is a language which is used
to design standardised Web Pages so that the Web contents
can be read and understood from any computer. Basic
structure of every webpage is designed using HTML.
HTML
Uniform
Resource
Locator (URL)
• It is a unique address or path for each resource located on the web.
• Every page on the web has a unique URL.
• Examples are:
https://www.mhrd.gov.in,http://www.ncert.nic.in,http://www.airindia.in, etc.
• URL is sometimes also called web address.
• It contains other information that completes a web address, as depicted below:
“
”
A network protocol is an established set of rules that
determine how data is transmitted between different
devices in the same network.
PROTOCOLS
TYPES OF PROTOCOLS
• Transmission Control Protocol (TCP): TCP is a popular communication protocol which is
used for communicating over a network.
• Internet Protocol (IP): IP is designed explicitly as addressing protocol.
• Post office Protocol (POP): POP3 is designed for receiving incoming E-mails.
• Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing
E-Mail.
• File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to
another. Types of files may include program files, multimedia files, text files, and documents,
etc.
TYPES OF PROTOCOLS
• Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext
among two or more systems.
• Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text
Transfer Protocol Secure is a standard protocol to secure the communication among two
computers one using the browser and other fetching data from web server.
• Telnet: Telnet is a set of rules designed for connecting one system with another.
• Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as
displaying documents from isolated sites.
E-MAIL (ELECTRONIC MAIL)
TODAY’S LARGEST CRYPTOCURRENCIES
• Bitcoin – INR – 26,95,596
• Ethereum – INR – 1,93,402
• Tether – INR 73.45
• Cardano – INR 129.19
• Binance Coin – INR 26,618
• Dogecoin – INR 29.130
• XRP – INR 77.9
• USD Coin – INR 77.299
• Polkadot – INR 1,843
• Uniswap – INR 2,123
Top 5 Crypto Trading Apps in India 2022
• WazirX
• CoinSwitch Kuber
• Unocoin
• ZebPay
• CoinDCX.
CYBER SECURITY
WHAT IS CYBER SECURITY?
Cyber security is the practice of defending computers,
servers, mobile devices, electronic systems, networks, and
data from malicious attacks.
Integrity refers to protecting
information from being
modified by unauthorized
parties.
Availability is making sure
that authorized parties are
able to access the
information when
needed.
Confidentiality is about
preventing the disclosure of
data to unauthorized parties.
CYBER ATTACKS
WEB BASED ATTACKS
• Injection attacks
• DNS Spoofing
• Session Hijacking
• Phishing
• Brute force
• Denial of Service
• Dictionary attacks
• URL Interpretation
• File Inclusion attacks
• Man in the middle attacks
SYSTEM BASED ATTACKS
• Virus
• Worm
• Trojan horse
• Backdoors
• Bots
SQL INJECTION
DNS SPOOFING
PHISHING
BRUTE FORCE
VIRUSES
Malware
• Malware is the
name that is
given to any
type of
software that
could harm a
computer
system,
interfere with
and gather a
user's data, or
without the
owner's
knowledge or
permission.
Trojan horse
• A type of
malware that
uses malicious
code to install
software that
seems ok, but
is hidden to
create back
doors into a
system.
Worm
• A worm is a
standalone
piece of
malicious
software that
replicates
itself in order
to spread to
other
computers.
Spyware
• Spyware can
monitor and
log the activity
that is
performed on
a target
system, like
log key
strokes, or
gather credit
card and other
information.
Adware
• Adware is
software
which can
automatically
cause pop-up
and banner
adverts to be
displayed in
order to
generate
revenue for its
author or
publisher.
IT ACT 2000
• The Information Technology Act, 2000 (also known as ITA-2000, or the IT
Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17
October 2000.
• It is the primary law in India dealing with cybercrime and electronic
commerce.
• The original Act contained 94 sections, divided into 13 chapters and 4
schedules.

More Related Content

Similar to COMPUTER NETWORK.pptx

Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
FarhanMalik93
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
Kak Yong
 

Similar to COMPUTER NETWORK.pptx (20)

Networking
NetworkingNetworking
Networking
 
Computer 3
Computer 3Computer 3
Computer 3
 
Unit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internetUnit4 ppt1 introduction to internet
Unit4 ppt1 introduction to internet
 
Network Notes
Network Notes Network Notes
Network Notes
 
Networking
NetworkingNetworking
Networking
 
Data Communication & Network
Data Communication & NetworkData Communication & Network
Data Communication & Network
 
Networking
NetworkingNetworking
Networking
 
Module-1.pptx
Module-1.pptxModule-1.pptx
Module-1.pptx
 
Computer networks
Computer networksComputer networks
Computer networks
 
Lecture16.pdf
Lecture16.pdfLecture16.pdf
Lecture16.pdf
 
Introducing networks
Introducing networksIntroducing networks
Introducing networks
 
Week 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptxWeek 6 - Networking and the Internet.pptx
Week 6 - Networking and the Internet.pptx
 
Internet
InternetInternet
Internet
 
Dotson - Network Tutorial
Dotson - Network TutorialDotson - Network Tutorial
Dotson - Network Tutorial
 
Networks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptxNetworks-Internet-and-Internet-Protocols.pptx
Networks-Internet-and-Internet-Protocols.pptx
 
BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS BASIC CONCEPTS OF COMPUTER NETWORKS
BASIC CONCEPTS OF COMPUTER NETWORKS
 
3 computer network - basic concepts
3   computer network - basic concepts3   computer network - basic concepts
3 computer network - basic concepts
 
computer network - basic concepts
computer network - basic conceptscomputer network - basic concepts
computer network - basic concepts
 
Telecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless TechnologyTelecommunications, Internet and Wireless Technology
Telecommunications, Internet and Wireless Technology
 
Chapter 6.0
Chapter 6.0Chapter 6.0
Chapter 6.0
 

More from DaVidSilenceKawlni (6)

C Intro.ppt
C Intro.pptC Intro.ppt
C Intro.ppt
 
GSC Principal Farewell
GSC Principal FarewellGSC Principal Farewell
GSC Principal Farewell
 
Web Browser Privacy and Security
Web Browser Privacy and SecurityWeb Browser Privacy and Security
Web Browser Privacy and Security
 
the_story_of_noah’s_ark.ppt
the_story_of_noah’s_ark.pptthe_story_of_noah’s_ark.ppt
the_story_of_noah’s_ark.ppt
 
EkBharat.pdf
EkBharat.pdfEkBharat.pdf
EkBharat.pdf
 
WordParagraphFormatting.pptx
WordParagraphFormatting.pptxWordParagraphFormatting.pptx
WordParagraphFormatting.pptx
 

Recently uploaded

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Recently uploaded (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 

COMPUTER NETWORK.pptx

  • 1. COMPUTER NETWORK DaVid Kawlni, Department of Computer Science GOVT. SERCHHIP COLLEGE COACHING CENTRE 2022
  • 2. WHAT IS A NETWORK? A group of two or more similar things or people interconnected with each other is called network.
  • 6. PAN It is a network formed by connecting a few personal devices like computers, laptops, mobile phones, smart phones, printers etc. USB WIFI BLUETOOTH
  • 7. LAN It is a network that connects computers, mobile phones, tablet, mouse, printer, etc., placed at a limited distance. The geographical area covered by a LAN can range from a single room, a floor, an office having one or more buildings in the same premise, laboratory, a school, college, or university campus.
  • 8. MAN Metropolitan Area Network (MAN) is an extended form of LAN which covers a larger geographical area like a city or a town.
  • 9. WAN Wide Area Network connects computers and other LANs and MANs, which are spread across different geographical locations of a country or in different countries or continents. Large business, educational and government organisations connect their different branches in different locations across the world through WAN. The Internet is the largest WAN that connects billions of computers, smartphones and millions of LANs from different continents.
  • 11. MODEM (MODULATOR-DEMODULATOR) It refers to a device used for conversion between analog signals and digital bits.
  • 12. ETHERNET CARD OR NIC (NETWORK INTERFACE CARD) Ethernet card, also known as Network Interface Card (NIC card in short) is a network adapter used to set up a wired network. It acts as an interface between computer and the network. It is a circuit board mounted on the motherboard of a computer
  • 13. RJ 45 REGISTERED JACK RJ 45 or Registered Jack-45 is an eight-pin connector that is used exclusively with Ethernet cables for networking. It is a standard networking interface that can be seen at the end of all network cables.
  • 14. REPEATER Data are carried in the form of signals over the cable. These signals can travel a specified distance (usually about 100 m). A repeater is an analog device that works with signals on the cables to which it is connected. The weakened signal appearing on the cable is regenerated and put back on the cable by a repeater
  • 15. HUB A network device used to connect different devices through wires. Data arriving on any of the lines are sent out on all the others.
  • 16. SWITCH A network switch is used to connect multiple computers or communicating devices.
  • 17. ROUTER A router is a network device that can receive the data, analyse it and transmit it to other networks. A router connects a local area network to the internet.
  • 18.
  • 19. GATEWAY For simple Internet connectivity at homes, the gateway is usually the Internet Service Provider that provides access to the entire Internet.
  • 20.
  • 21. “ ” The World Wide Web (WWW) or web in short, is an ocean of information, stored in the form of trillions of interlinked web pages and web resources. The resources on the web can be shared or accessed through the Internet. Sir Tim Berners-Lee — a British computer scientist invented the revolutionary World Wide Web in 1990 WORD WIDE WEB
  • 22. HyperText Markup Language. It is a language which is used to design standardised Web Pages so that the Web contents can be read and understood from any computer. Basic structure of every webpage is designed using HTML. HTML
  • 23. Uniform Resource Locator (URL) • It is a unique address or path for each resource located on the web. • Every page on the web has a unique URL. • Examples are: https://www.mhrd.gov.in,http://www.ncert.nic.in,http://www.airindia.in, etc. • URL is sometimes also called web address. • It contains other information that completes a web address, as depicted below:
  • 24. “ ” A network protocol is an established set of rules that determine how data is transmitted between different devices in the same network. PROTOCOLS
  • 25. TYPES OF PROTOCOLS • Transmission Control Protocol (TCP): TCP is a popular communication protocol which is used for communicating over a network. • Internet Protocol (IP): IP is designed explicitly as addressing protocol. • Post office Protocol (POP): POP3 is designed for receiving incoming E-mails. • Simple mail transport Protocol (SMTP): SMTP is designed to send and distribute outgoing E-Mail. • File Transfer Protocol (FTP): FTP allows users to transfer files from one machine to another. Types of files may include program files, multimedia files, text files, and documents, etc.
  • 26. TYPES OF PROTOCOLS • Hyper Text Transfer Protocol (HTTP): HTTP is designed for transferring a hypertext among two or more systems. • Hyper Text Transfer Protocol Secure (HTTPS): HTTPS is abbreviated as Hyper Text Transfer Protocol Secure is a standard protocol to secure the communication among two computers one using the browser and other fetching data from web server. • Telnet: Telnet is a set of rules designed for connecting one system with another. • Gopher: Gopher is a collection of rules implemented for searching, retrieving as well as displaying documents from isolated sites.
  • 28.
  • 29.
  • 30.
  • 31.
  • 32.
  • 33. TODAY’S LARGEST CRYPTOCURRENCIES • Bitcoin – INR – 26,95,596 • Ethereum – INR – 1,93,402 • Tether – INR 73.45 • Cardano – INR 129.19 • Binance Coin – INR 26,618 • Dogecoin – INR 29.130 • XRP – INR 77.9 • USD Coin – INR 77.299 • Polkadot – INR 1,843 • Uniswap – INR 2,123
  • 34.
  • 35. Top 5 Crypto Trading Apps in India 2022 • WazirX • CoinSwitch Kuber • Unocoin • ZebPay • CoinDCX.
  • 36.
  • 37.
  • 38.
  • 39.
  • 41. WHAT IS CYBER SECURITY? Cyber security is the practice of defending computers, servers, mobile devices, electronic systems, networks, and data from malicious attacks.
  • 42. Integrity refers to protecting information from being modified by unauthorized parties. Availability is making sure that authorized parties are able to access the information when needed. Confidentiality is about preventing the disclosure of data to unauthorized parties.
  • 43. CYBER ATTACKS WEB BASED ATTACKS • Injection attacks • DNS Spoofing • Session Hijacking • Phishing • Brute force • Denial of Service • Dictionary attacks • URL Interpretation • File Inclusion attacks • Man in the middle attacks SYSTEM BASED ATTACKS • Virus • Worm • Trojan horse • Backdoors • Bots
  • 48.
  • 49.
  • 50. VIRUSES Malware • Malware is the name that is given to any type of software that could harm a computer system, interfere with and gather a user's data, or without the owner's knowledge or permission. Trojan horse • A type of malware that uses malicious code to install software that seems ok, but is hidden to create back doors into a system. Worm • A worm is a standalone piece of malicious software that replicates itself in order to spread to other computers. Spyware • Spyware can monitor and log the activity that is performed on a target system, like log key strokes, or gather credit card and other information. Adware • Adware is software which can automatically cause pop-up and banner adverts to be displayed in order to generate revenue for its author or publisher.
  • 51. IT ACT 2000 • The Information Technology Act, 2000 (also known as ITA-2000, or the IT Act) is an Act of the Indian Parliament (No 21 of 2000) notified on 17 October 2000. • It is the primary law in India dealing with cybercrime and electronic commerce. • The original Act contained 94 sections, divided into 13 chapters and 4 schedules.