SlideShare a Scribd company logo
DATA COMMUNICATION &
NETWORKING
ISSUES IN REAL WORLD
H . M . V . T . W B A N D A R A
E P 1 9 9 6
D A T A C O M M U N I C A T I O N & C O M P U T E R N E T W O R K S ( P S T 3 2 2 2 7 )
CONTENT
• Introduction
• Data Communication & Networking Issues
– Security Issues
– Transmission Impairments
– Social Issues
– Health Issues
– Environmental Issues
Introduction
• What is Data Communication and
Networking?
• History & Evolution
• Current Situation
Data Communication & Networking Issues
• Security Issues
• Transmission Impairments
• Social Issues
• Health Issues
• Environmental Issues
Security Issues
Security Issues
 Denial of Service(Dos) and Distributed Denial of Service Attacks
 Type of attack which affects the availability of resources and services
to legitimate users.
 There are two common types; Flooding attacks and Crash attacks
 Disrupts networks, servers and websites
 Man-in-the-middle Attack
 Type of attack where one party intrudes another party by intercepting
the communication.
 Attackers steal log in credentials, banking information and highly
confidential private information
 Happens mostly with unsecured public networks or hacked home WiFi
connections.
Security Issues
 IP Spoofing
 Gaining unauthorized access to machines by manipulating the IP
packets.
 Attacker identifies the host and finds the IP address trusted by the
host and send data packets to the host.
 Involves altering the packet header with fake source IP address, a
checksum and the order value.
 ARP spoofing attacks & DNS server spoofing attacks
 To overcome these types of attacks implementing packet filering, use
of spoofing detection software, use cryptographic network protocols
such as TLS, SSH and HTTPS
Security Issues
 Eavesdropping
 Involves illegal interception of private communication which may be a
telephone conversation, instant message, email, fax message or
videoconference to steal information.
 Attackers make use of network monitoring tools on computers which
facilitate data interception and stealing of confidential data
 Port Scan
 It is a method used to gather network information by making use of a
program.
 Attacker tries to find out which ports are free and responding for a
particular IP address and finds vulnerabilities with the port to launch an
attack
 Attackers gain information such as operating system of the target
computer, applications installed and versions of those applications
Security Issues
 Social Engineering
 Involves manipulation of people to reveal personal and confidential
information
 Attacker collects information about the target to gain understanding.
 Based on the information collected attacker tries to design and launch
an attack
 Common types of attacks are baiting, phishing, vishing, pretexting,
Scareware and honey trap.
 Masquerade
 Attacker act as a legitimate user who has access to a system and gain
greater priviledges than they are authorized for.
 Launched with stolen login IDs and passwords
Security Issues
 Masquerade
 Phishing attacks are a type of variation Masquerade attacks.
 Attackers can setup a similar website of a existing actual website and
users are sent with requests to change the usernames and passwords
with the fake website.
 If the user respond to the website by changing the login credentials,
attacker can easily get access to the user account.
Security Issues
 Session Hijacking
 Type of web based attack to networks and systems which is working
based on the concept of sessions.
 Session refers to a certain amount of time period which two
computers or two parties in a computer system or network
communicate with each other.
 Attackers try to intercept active sessions and try to takeover the
session in gaining access to the network or system.
 This type of an attack is not detectable at all, but if the website or the
system is not responding or stops working for no reason, then there
might be a session hijacking.
Transmission Impairments
Transmission
 Transmission is the process of communication of data and information by the
propagation and processing of signals via a data transferring medium.
 There are two types of transmissions called Analog Transmission and Digital
Transmission.
 Analog transmission involves transmitting of analog signals containing
both analog data such as voice and digital data with binary content.
 Digital transmission signals are composed of binary component and can
be transmitted only to a limited distance.
 Due to this reason only analog signals are used with long distance
transmissions.
Transmission Impairments
 These type signals which are being used in transmissions are subjected to
different types of imperfections during the transmission of data.
 That is the signals which are received at the receiver’s end are not the
same signals which are being sent at the sender’s end.
 These imperfections are called as Transmission Impairments
 There are three types of transmission impairments
 Attenuation
 Distortion
 Noise
Transmission Impairments
 Attenuation
 It is the decrease in signal strength
with the loss of energy.
 Happens mainly due to the resistance
from the medium and increases with
the increased distance of
transmission.
 Amplifiers are being used to get back
the original signal.
Transmission Impairments
 Distortion
 It is the change of shape of signals in
transmission.
 Can be seen generally with composite
signals with different frequencies
 The main cause for distortion is the
propagation of signals through media at
different speeds and when arriving at the
destination, it causes each component to
arrive at different times.
 Then there will observe a different phase
at the receiver’s end than the original
phase.
Transmission Impairments
 Noise
 Mixing of unwanted random signals
with original signals is referred as the
Noise in data transmission.
 There exists different types of noises
 Induced Noise – Created from
different sources such as motors
and appliances. These devices act
as sending antenna and
transmission medium acts as the
receiving antenna in creating a
noise effect.
Transmission Impairments
 Noise
 Thermal Noise – Created due to movement of electrons in wires
(transmission medium) which generates an additional signal.
 Crosstalk – Generates when two wires which transmit data affects the
other wire creating an unwanted signal generation.
 Impulse Noise – Created due to high energy which results for a very
short period of time, from huge electric sources such as power lines
and lightings.
Social Issues
Social Issues
 Data Communication and Networking technologies have brought many
advancements, efficiencies, enhancements and reliabilities to the lives of
people.
 At the same time, it has contributed in creating many issues for the society
too.
 That is in the process of communicating with all these digital means and
modes, there could arise many issues and contradictions which will drive
away all the efficiencies and productivity factors of data communication
and networking.
Social Issues
 The most common types of Social issues
are
 Digital Divide
 Addiction to Internet/ Social
media
 Creating misunderstandings
and issues between family
members
 Privacy Issues
 Social Isolation
 Accidents
Social Issues
 Digital Divide
 It is the gap between those who have
adequate access to computers, internet and
other digital improvements in the technology
and those who do not.
 It is a type of inequality that has aroused in a
new way with technological advancements in
the fields of computing and data
communication and networking.
Social Issues
 Digital Divide
 Main factors of Digital Divide are access
to internet and its advancements, quality
of connection, cost for the services,
amount of bandwidth and limits of
connectivity.
 Digital divide may work against
education and learning career of
individuals, knowledge acquisition,
public participation of people in
discussions and decision making
activities etc.
Social Issues
 Internet / Social Media Addiction
 Addiction to internet or social media is a
huge issue associated with data
communication and networking.
 It will affect badly for the social lives of
individuals
Ex: Not having enough experience on having
social relationships, getting into fights easily,
loss of morals and social values, not
identifying the value of listening and
understanding ideas, feelings and thoughts
of other people.
Social Issues
 Creation of family problems
 With the addiction of internet, there may
arise many issues and problems in family
lives of people.
Ex: Less interaction with each other, no
time discuss with each other, getting
into inappropriate relationships,
divorces and breakage of relationships
Social Issues
 Privacy Issues
 Affect to the privacy of individuals is another
social issue associated with data
communication and networking.
 Blackmailing, slandering, insulting, child
abuse, sexual harassments, cyberbullying
are some ways which affects privacy
 Tragic events occur such as suicides,
murders, fights and other terrible events.
Social Issues
 Social Isolation
 With people trying to be with computers
and digital devices, all the time they may get
isolated in the society
 People tend to get into long distance and
virtual relationships with social media and
internet while their real life relationships are
damaged.
Social Issues
 Accidents
 When people use mobile phones and
other digital devices while driving and
while walking on road accidents can
occur.
 Sometimes not having the enough
attention while driving can result in
accidents.
Health Issues
 With modernization of the world with advancement in the technologies related
to data communication and computing, many health issues and risks are
resulted.
 Use of computers for long durations and with the incorrect behaviors of
individuals when using the computers, it might result in physical, mental and
social health risks.
 Most common types of health hazards are
 Back pain, shoulder and arm injuries, injuries in neck area, injuries with
hand and fingers
 Vision and hearing problems
 Headaches and mental stress or depression
 Obesity
Health Issues
 Injuries related to back pain
Health Issues
 Repetitive Strain Injury
Health Issues
 Digital Eye Strain
Health Issues
 Obesity
Environmental Issues
 Use of computers, digital devices and other equipment for data
communication and networking can cause negative impacts on environment
too.
 The most common problem is the electronic waste or E-waste.
 Landfilling
 Contamination of soil and water with non-biodegradable materials,
heavy metals such as lead, mercury and cadmium and toxic chemical
substances
 Can cause deadly diseases to human beings when consumed those
contaminated water and plant material
Environmental Issues
 Land filling due to e-waste
Environmental Issues
 Contamination of waterways
Environmental Issues
 Other Environmental issues include
 High energy consumption
By 2017 the number of computers in the world is
estimated to be two billion. In every future ten years of
time this will be doubled.
 Degradation of natural resources
Use of fossil fuels and other energy sources to in energy
generation
THANK YOU!

More Related Content

What's hot

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
Ahtasham Ali
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
Atlantic Training, LLC.
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
Sibesh Singh
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Yumna Ali
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
Ramki M
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
lorrflores
 
negative aspects of I.T.
negative aspects of I.T.negative aspects of I.T.
negative aspects of I.T.
Hriday Vittal
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
Marc Kuhn
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
Nishant Pahad
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
Sweta Kumari Barnwal
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
ICT Frame Magazine Pvt. Ltd.
 
Technology creates social isolation
Technology creates social isolation Technology creates social isolation
Technology creates social isolation
sstone5
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
Alan Raj
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
Jahangirnagar University
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
SocialNetworkingGroup
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
Doha qaradeh
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
DakshPratapSingh1
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
Rishabh Kataria
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
CarlosE15
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
Noorhidayu Yussof
 

What's hot (20)

Cyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham AliCyber crime(presentation) by Ahtasham Ali
Cyber crime(presentation) by Ahtasham Ali
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Cybercrime Awareness
Cybercrime AwarenessCybercrime Awareness
Cybercrime Awareness
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Impact of computers on Society
Impact of computers on SocietyImpact of computers on Society
Impact of computers on Society
 
Cyber safety by Lorraine Flores
Cyber safety by Lorraine FloresCyber safety by Lorraine Flores
Cyber safety by Lorraine Flores
 
negative aspects of I.T.
negative aspects of I.T.negative aspects of I.T.
negative aspects of I.T.
 
Cyberbullying
CyberbullyingCyberbullying
Cyberbullying
 
Web security for e-commerce
Web security for e-commerceWeb security for e-commerce
Web security for e-commerce
 
Hackers and cyber crimes
Hackers and cyber crimesHackers and cyber crimes
Hackers and cyber crimes
 
Cyber security awareness presentation nepal
Cyber security awareness presentation nepalCyber security awareness presentation nepal
Cyber security awareness presentation nepal
 
Technology creates social isolation
Technology creates social isolation Technology creates social isolation
Technology creates social isolation
 
Advantages and disadvantages of social media
Advantages and disadvantages of social mediaAdvantages and disadvantages of social media
Advantages and disadvantages of social media
 
Social engineering: A Human Hacking Framework
Social engineering: A Human Hacking FrameworkSocial engineering: A Human Hacking Framework
Social engineering: A Human Hacking Framework
 
Social_Networking_Project
Social_Networking_ProjectSocial_Networking_Project
Social_Networking_Project
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Cybersecurity
Cybersecurity Cybersecurity
Cybersecurity
 
cyber stalking
cyber stalking cyber stalking
cyber stalking
 
Cyberbullying
Cyberbullying Cyberbullying
Cyberbullying
 
Cyberstalking
CyberstalkingCyberstalking
Cyberstalking
 

Similar to Data Communication Networking Issues in Real World

Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
A REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITYA REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITY
ijiert bestjournal
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
University of Delhi
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
heidirobison
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
politegcuf
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
IMRAN KHAN
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
DiegoMtzS
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
pharmaindexing
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
Christopher Lisasi
 
Presentation 1 security
Presentation 1 securityPresentation 1 security
Presentation 1 security
Okonkwo uzonna
 
INTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRIINTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRI
Deepika Chettri
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey96
 
DIGITAL COMUNICATION.pdf
DIGITAL COMUNICATION.pdfDIGITAL COMUNICATION.pdf
DIGITAL COMUNICATION.pdf
PHaneef
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
malbert5
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
Pospos Pasiposo
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
ShailendraPandey92
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
IJNSA Journal
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
Sonali Srivastava
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
AASTHA76
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
Gorra Narsimhulu
 

Similar to Data Communication Networking Issues in Real World (20)

Types of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security ThreatsTypes of Cyber Crimes and Security Threats
Types of Cyber Crimes and Security Threats
 
A REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITYA REVIEW OF COMPUTER AND NETWORK SECURITY
A REVIEW OF COMPUTER AND NETWORK SECURITY
 
Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4Foundation Course: Information Technology UNIT 4
Foundation Course: Information Technology UNIT 4
 
L25 network fundamentals
L25   network fundamentalsL25   network fundamentals
L25 network fundamentals
 
Ecommerce security
Ecommerce securityEcommerce security
Ecommerce security
 
Introduction to internet (239 kb)
Introduction to internet (239 kb)Introduction to internet (239 kb)
Introduction to internet (239 kb)
 
Cybersecurity
CybersecurityCybersecurity
Cybersecurity
 
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
AN EFFICIENT SEMANTIC DATA ALIGNMENT BASED FCM TO INFER USER SEARCH GOALS USI...
 
N3275466 - Final Presentation Advance network (1)
N3275466 - Final Presentation  Advance network (1)N3275466 - Final Presentation  Advance network (1)
N3275466 - Final Presentation Advance network (1)
 
Presentation 1 security
Presentation 1 securityPresentation 1 security
Presentation 1 security
 
INTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRIINTERNET SERVICES BY DEEPIKA CHETTRI
INTERNET SERVICES BY DEEPIKA CHETTRI
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
DIGITAL COMUNICATION.pdf
DIGITAL COMUNICATION.pdfDIGITAL COMUNICATION.pdf
DIGITAL COMUNICATION.pdf
 
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docxRisk and Threat Assessment Report Anthony WolfBSA 5.docx
Risk and Threat Assessment Report Anthony WolfBSA 5.docx
 
Combuter term3 new
Combuter term3 newCombuter term3 new
Combuter term3 new
 
Shailendra Pandey.ppt
Shailendra Pandey.pptShailendra Pandey.ppt
Shailendra Pandey.ppt
 
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSESE-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
E-COMMERCE SYSTEMS SECURITY FOR SMALL BUSINESSES
 
Need For Ethical & Security Issue In It
Need For Ethical & Security Issue In ItNeed For Ethical & Security Issue In It
Need For Ethical & Security Issue In It
 
TERM PAPER NETWORKING .docx
TERM PAPER NETWORKING                                     .docxTERM PAPER NETWORKING                                     .docx
TERM PAPER NETWORKING .docx
 
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics studentsCOMPUTER NETWORKS NOTES usefull for computer and elctronics students
COMPUTER NETWORKS NOTES usefull for computer and elctronics students
 

Recently uploaded

学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
Trending Blogers
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
AanSulistiyo
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
saathvikreddy2003
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
ukwwuq
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
Trish Parr
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
cuobya
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 

Recently uploaded (20)

学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
Explore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories SecretlyExplore-Insanony: Watch Instagram Stories Secretly
Explore-Insanony: Watch Instagram Stories Secretly
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
Azure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdfAzure EA Sponsorship - Customer Guide.pdf
Azure EA Sponsorship - Customer Guide.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 
Design Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptxDesign Thinking NETFLIX using all techniques.pptx
Design Thinking NETFLIX using all techniques.pptx
 
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
制作原版1:1(Monash毕业证)莫纳什大学毕业证成绩单办理假
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
Search Result Showing My Post is Now Buried
Search Result Showing My Post is Now BuriedSearch Result Showing My Post is Now Buried
Search Result Showing My Post is Now Buried
 
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
假文凭国外(Adelaide毕业证)澳大利亚国立大学毕业证成绩单办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 

Data Communication Networking Issues in Real World

  • 1. DATA COMMUNICATION & NETWORKING ISSUES IN REAL WORLD H . M . V . T . W B A N D A R A E P 1 9 9 6 D A T A C O M M U N I C A T I O N & C O M P U T E R N E T W O R K S ( P S T 3 2 2 2 7 )
  • 2. CONTENT • Introduction • Data Communication & Networking Issues – Security Issues – Transmission Impairments – Social Issues – Health Issues – Environmental Issues
  • 3. Introduction • What is Data Communication and Networking? • History & Evolution • Current Situation
  • 4. Data Communication & Networking Issues • Security Issues • Transmission Impairments • Social Issues • Health Issues • Environmental Issues
  • 6. Security Issues  Denial of Service(Dos) and Distributed Denial of Service Attacks  Type of attack which affects the availability of resources and services to legitimate users.  There are two common types; Flooding attacks and Crash attacks  Disrupts networks, servers and websites  Man-in-the-middle Attack  Type of attack where one party intrudes another party by intercepting the communication.  Attackers steal log in credentials, banking information and highly confidential private information  Happens mostly with unsecured public networks or hacked home WiFi connections.
  • 7. Security Issues  IP Spoofing  Gaining unauthorized access to machines by manipulating the IP packets.  Attacker identifies the host and finds the IP address trusted by the host and send data packets to the host.  Involves altering the packet header with fake source IP address, a checksum and the order value.  ARP spoofing attacks & DNS server spoofing attacks  To overcome these types of attacks implementing packet filering, use of spoofing detection software, use cryptographic network protocols such as TLS, SSH and HTTPS
  • 8. Security Issues  Eavesdropping  Involves illegal interception of private communication which may be a telephone conversation, instant message, email, fax message or videoconference to steal information.  Attackers make use of network monitoring tools on computers which facilitate data interception and stealing of confidential data  Port Scan  It is a method used to gather network information by making use of a program.  Attacker tries to find out which ports are free and responding for a particular IP address and finds vulnerabilities with the port to launch an attack  Attackers gain information such as operating system of the target computer, applications installed and versions of those applications
  • 9. Security Issues  Social Engineering  Involves manipulation of people to reveal personal and confidential information  Attacker collects information about the target to gain understanding.  Based on the information collected attacker tries to design and launch an attack  Common types of attacks are baiting, phishing, vishing, pretexting, Scareware and honey trap.  Masquerade  Attacker act as a legitimate user who has access to a system and gain greater priviledges than they are authorized for.  Launched with stolen login IDs and passwords
  • 10. Security Issues  Masquerade  Phishing attacks are a type of variation Masquerade attacks.  Attackers can setup a similar website of a existing actual website and users are sent with requests to change the usernames and passwords with the fake website.  If the user respond to the website by changing the login credentials, attacker can easily get access to the user account.
  • 11. Security Issues  Session Hijacking  Type of web based attack to networks and systems which is working based on the concept of sessions.  Session refers to a certain amount of time period which two computers or two parties in a computer system or network communicate with each other.  Attackers try to intercept active sessions and try to takeover the session in gaining access to the network or system.  This type of an attack is not detectable at all, but if the website or the system is not responding or stops working for no reason, then there might be a session hijacking.
  • 13. Transmission  Transmission is the process of communication of data and information by the propagation and processing of signals via a data transferring medium.  There are two types of transmissions called Analog Transmission and Digital Transmission.  Analog transmission involves transmitting of analog signals containing both analog data such as voice and digital data with binary content.  Digital transmission signals are composed of binary component and can be transmitted only to a limited distance.  Due to this reason only analog signals are used with long distance transmissions.
  • 14. Transmission Impairments  These type signals which are being used in transmissions are subjected to different types of imperfections during the transmission of data.  That is the signals which are received at the receiver’s end are not the same signals which are being sent at the sender’s end.  These imperfections are called as Transmission Impairments  There are three types of transmission impairments  Attenuation  Distortion  Noise
  • 15. Transmission Impairments  Attenuation  It is the decrease in signal strength with the loss of energy.  Happens mainly due to the resistance from the medium and increases with the increased distance of transmission.  Amplifiers are being used to get back the original signal.
  • 16. Transmission Impairments  Distortion  It is the change of shape of signals in transmission.  Can be seen generally with composite signals with different frequencies  The main cause for distortion is the propagation of signals through media at different speeds and when arriving at the destination, it causes each component to arrive at different times.  Then there will observe a different phase at the receiver’s end than the original phase.
  • 17. Transmission Impairments  Noise  Mixing of unwanted random signals with original signals is referred as the Noise in data transmission.  There exists different types of noises  Induced Noise – Created from different sources such as motors and appliances. These devices act as sending antenna and transmission medium acts as the receiving antenna in creating a noise effect.
  • 18. Transmission Impairments  Noise  Thermal Noise – Created due to movement of electrons in wires (transmission medium) which generates an additional signal.  Crosstalk – Generates when two wires which transmit data affects the other wire creating an unwanted signal generation.  Impulse Noise – Created due to high energy which results for a very short period of time, from huge electric sources such as power lines and lightings.
  • 20. Social Issues  Data Communication and Networking technologies have brought many advancements, efficiencies, enhancements and reliabilities to the lives of people.  At the same time, it has contributed in creating many issues for the society too.  That is in the process of communicating with all these digital means and modes, there could arise many issues and contradictions which will drive away all the efficiencies and productivity factors of data communication and networking.
  • 21. Social Issues  The most common types of Social issues are  Digital Divide  Addiction to Internet/ Social media  Creating misunderstandings and issues between family members  Privacy Issues  Social Isolation  Accidents
  • 22. Social Issues  Digital Divide  It is the gap between those who have adequate access to computers, internet and other digital improvements in the technology and those who do not.  It is a type of inequality that has aroused in a new way with technological advancements in the fields of computing and data communication and networking.
  • 23. Social Issues  Digital Divide  Main factors of Digital Divide are access to internet and its advancements, quality of connection, cost for the services, amount of bandwidth and limits of connectivity.  Digital divide may work against education and learning career of individuals, knowledge acquisition, public participation of people in discussions and decision making activities etc.
  • 24. Social Issues  Internet / Social Media Addiction  Addiction to internet or social media is a huge issue associated with data communication and networking.  It will affect badly for the social lives of individuals Ex: Not having enough experience on having social relationships, getting into fights easily, loss of morals and social values, not identifying the value of listening and understanding ideas, feelings and thoughts of other people.
  • 25. Social Issues  Creation of family problems  With the addiction of internet, there may arise many issues and problems in family lives of people. Ex: Less interaction with each other, no time discuss with each other, getting into inappropriate relationships, divorces and breakage of relationships
  • 26. Social Issues  Privacy Issues  Affect to the privacy of individuals is another social issue associated with data communication and networking.  Blackmailing, slandering, insulting, child abuse, sexual harassments, cyberbullying are some ways which affects privacy  Tragic events occur such as suicides, murders, fights and other terrible events.
  • 27. Social Issues  Social Isolation  With people trying to be with computers and digital devices, all the time they may get isolated in the society  People tend to get into long distance and virtual relationships with social media and internet while their real life relationships are damaged.
  • 28. Social Issues  Accidents  When people use mobile phones and other digital devices while driving and while walking on road accidents can occur.  Sometimes not having the enough attention while driving can result in accidents.
  • 29. Health Issues  With modernization of the world with advancement in the technologies related to data communication and computing, many health issues and risks are resulted.  Use of computers for long durations and with the incorrect behaviors of individuals when using the computers, it might result in physical, mental and social health risks.  Most common types of health hazards are  Back pain, shoulder and arm injuries, injuries in neck area, injuries with hand and fingers  Vision and hearing problems  Headaches and mental stress or depression  Obesity
  • 30. Health Issues  Injuries related to back pain
  • 34. Environmental Issues  Use of computers, digital devices and other equipment for data communication and networking can cause negative impacts on environment too.  The most common problem is the electronic waste or E-waste.  Landfilling  Contamination of soil and water with non-biodegradable materials, heavy metals such as lead, mercury and cadmium and toxic chemical substances  Can cause deadly diseases to human beings when consumed those contaminated water and plant material
  • 35. Environmental Issues  Land filling due to e-waste
  • 37. Environmental Issues  Other Environmental issues include  High energy consumption By 2017 the number of computers in the world is estimated to be two billion. In every future ten years of time this will be doubled.  Degradation of natural resources Use of fossil fuels and other energy sources to in energy generation