Networking Concepts
Networking Concepts
CHAPTER 15
Networking concepts
OBJECTIVES
15.1 Introduction
A Network is an inter-connection of autonomous computers. Two computers
are said to be interconnected if they are capable of exchanging the information.
Central to this definition is the fact that the computers are autonomous. This
means that no computers on the network can start, stop or control another.
15.1.1 Network Goals:
The network goals are as listed below.
(i) Resource Sharing: The aim is to make all the programs, data and
peripherals available to anyone on the network irrespective of the physical location
of the resources and the user.
(ii) Reliability: A file can have copies on two or three different machines, so if
one of them is unavailable, the other copies could be used. For military, banking
and many other applications it is great of importance.
(iii) Cost Factor: Personal computers have better price/performance ratio than
micro computers. So it is better to have PC’s, one per user with data stored on
one shared file server machine.
(iv) Communication Medium: Using a network, it is possible for managers,
working far apart, to prepare financial report of the company. The changes at
one end can be immediately noticed at another and hence it speeds up co-
operation among them.
15.1.2 Need of Networking:
1. File sharing provides sharing and grouping of data files over the network.
2.Print sharing of computer resources such as hard disk and printers etc.
3. email tools for communication with the e-mail address.
4. Remote access able to access data and information, around the globe.
5.Sharing database to multiple users at the same time by ensuring the intergrity.
15.2.1 ARPANET
The Advanced Research Projects Agency Network (ARPANET) was one of the
world’s first operational packet switching networks, the first network to implement
TCP/IP, and the progenitor of what was to become the global Internet. The network
was initially funded by the Advanced Research Projects Agency (ARPA, later
DARPA) within the U.S. Department of Defense for use by its projects at
universities and research laboratories in the US. The packet switching of the
Networking concepts 377
ARPANET, together with TCP/IP, would form the backbone of how the Internet
works.
15.2.2 OSI Reference Model
Layer Name of unit exchanged
Host A Host B
Generally the structure of the address gives you some information about
how to get to the system. We normally refer to systems by name, rather than by
Internet address. When we specify a name, the network software looks it up in a
database, and comes up with the corresponding Internet address. Most of the
network software deals strictly in terms of the address. TCP/IP is built on
“connection less” technology. Information is transferred as a sequence of “data
grams”.
Each of these datagrams is sent through the network individually. There are
provisions to open connections (i.e., to start a conversation that will continue for
sometime). However at some level, information from those connections is broken
up into datagrams, and those datagrams are treated by the network a completely
separate. For example, suppose you want to transfer a 15000 octet file. Most
networks can’t handle a 15000 octet datagram. So the protocols will break this
up into something like thirty 500 octet datagrams each. Each of these datagrams
will be sent to the other end. At that point, they will be put back together into
the 15000 octet file. However while those datagrams are in transmit, the network
doesn’t know that there is any connection between them. It is perfectly possible
that datagram 14 will actually arrive before datagram 13. It is also possible that
somewhere in the network, an error will occur, and some datagram won’t get
through at all. In that case, that datagram has to be sent again. Note by the way
that the terms datagram and packet often seem to be nearly interchangeable.
Technically, data gram is the right word to use when describing TCP/IP.
380 Networking concepts
A data gram is a unit of data, which is what the protocols deal with.
In most cases a packet simply contains a data gram, so there is very little
difference. However they can differ at times.
OSI TCP/IP
Application Application
Presentation
Session Transport
Transport
Network Internet
Physical
The HTTP has various built-in request methods which allow users to read
a web page, or to read a web page’s header, or to store a web page, or to append
to a named resource or to remove the web page or to connect two existing resources
or to break an existing connection between two resources.
Networking concepts 381
One of the original services on the internet was designed to allow for
transferring files from one system to another. It goes by the name ftp which
stands for file transfer protocol. Files of any type can be transferred, although
you may have to specify whether the file is an ASCII or Binary file. They can be
transferred to any system on the internet provided that the permissions are set
accordingly.
Advantages of FTP
(i) It is very useful to transfer the files from one network to another.
(ii) It is an effective way to get a geographically dispersed group to co-operate
on a project.
(iii) It is popular way to share information over the internet. FTP works as a
client/server process.
Serial line IP (SLIP) was the first protocol for relaying the IP packets over
dial-up lines. It defines an encapsulation mechanism, with little ease. There is
no support for dynamic address assignment, link testing or multiplexing different
protocols over a single link. SLIP has been largely supplanted by PPP.
networks around the globe. The common use of Internet standards allows users
connected to one network to communicate with users on another network.
The term nodes refer to the computer that are attached to a network
and are seeking to share the resources of the network. Of course, if
there were no nodes, there would be no network at all.
(ii) Server
Servers can be of two types: (1) non-dedicated servers and (2) dedicated
servers
15.4.4 Types of Servers
Non-dedicated Servers
On small networks, a workstation that can double as a server is known as
non-dedicated server since it is not completely dedicated to the cause of serving.
Such servers can facilitate the resource-sharing among the work stations on a
proportionately smaller scale. Since one computer works as a work station and
as well as server, it is slower and requires more memory. The networks using
such a server are known as PEER-TO-PEER networks.
Dedicated Servers
On bigger network installations, there is a computer reserved for server’s
job and its only job is to help workstations access data, software and hardware
resources. It does not double-up as a workstations and such a server is known
as dedicated server. The networks using such server are known as MASTER-
SLAVE networks.
On a network, there may be several servers that allow the workstations to
share specific resources. For example, there may be a server exclusively for
serving files related request like storing files, deciding about their access privileges
and regulating the amount of space allowed for each user. This server is known
as file server. Similarly there may be printer server and modem server. The
Networking concepts 383
Fig 6.1
Figure 15.4 LAN topology
Metropolitan Area Networks (MANs)
Metropolitan Area Networks (MANs) are the networks spread over a city.
For example, cable TV networks that are spread over a city can be termed as
Metropolitan Area Networks (MANs). The purpose of a MAN is also the sharing of
the hardware and the software resources among its users.
The networks spread across the countries are known as WANs. A Wide
Area Networks (WANs) is a group of computers that are separated by large
distances and tied together. It can even be a group of LANs that are spread
across several locations and connected together to look like one big LAN. The
Networking concepts 385
The next task is to distinguish between LANs and WANs. LANs are different
in the following important respects.
2. While WANs usually operate at speeds of less than 1 mbps (one mega bits
per second), LANs normally operate at between 1 and 10 mbps. Using
optical fiber technology, it is possible to achieve space of the order of
hundreds of mbps.
386 Networking concepts
3. Because of the short distances involved, the error rates in LANs are much
lower than in WANs. LANs error rate is thousand times lower than in
WANs, so are normal.
4. The distance limitations involved in LANs normally mean that the entire
network is under the ownership and control of a single organization. This
is in sharp contrast to WANs, where the network is normally operated by
the countries post and telecommunications authorities rather than by its
users.
LAN WAN
1 Diameter of not more than a few Span entire countries.
kilometers.
2 A total data rate of at least Data rate less than one mbps.
several mbps.
3 Complete ownership by a single Owned by multiple organizations.
organization.
4 Very low error rates. Comparatively higher error rates.
This topology consists of a central node to which all other nodes are
connected by a single path. It is the topology used in most existing information
networks involving data processing or voice communications.
Another popular topology for data networks is the linear. This consists of a
single length of the transmission medium (normally coaxial cable) onto which
the various nodes are attached. The topology is used in traditional data
communication network where the host at one end of the bus communicates
with several terminals attached along its length.
The transmission from any station travels the length of the bus, in both
directions, and can be received by all other stations. The bus has terminators at
either end which absorb the signal, removing it from the bus.
388 Networking concepts
1. Short cable length and simple wiring layout. Because there is a single
common data path connecting all nodes, the linear topology allows a very
short cable length to be used. This decreases the installation cost, and
also leads to a simple, easy to maintain wiring layout.
2. Fault isolation is difficult. In the star topology, a defective node can easily
be isolated from the network by removing its connection at the center. If a
node is faulty on the bus, it must be rectified at the point where the node
is connected to the network.
The third topology that we will consider is the ring or the circular. In this
case, each node is connected to two and only two neighboring nodes and is
transmitted onwards to another. Thus data travels in one direction only, from
node to node around the ring. After passing through each node, it returns to the
sending node, which removes it.
It is important to note that data gets through rather than travels past each
node. This means that the signal may be amplified before being repeated on the
outward channel. node to node around the ring. After passing through each
node, it returns to the sending node, which removes it.
2. No wiring closet space required. Since there is only one cable connecting
each node to its immediate neighbors, it is not necessary to allocate space
in the building for wiring closet.
3. Suitable for optical fibers. Using optical fibers offers the possibility of very
high speed transmission. Because traffic on a ring travels in one direction,
it is easy to use optical fibers as a medium of transmission.
Networking concepts 391
2. Difficult to diagnose faults. The fact that failure of one node will affect all
others has serious imprecations for fault diagnosis. It may be necessary to
examine a series of adjacent nodes to determine the faulty one. This
operation may also require diagnostic facilities to be built into each node.
A variation of bus topology is the tree topology. The shape of the network
is that of an inverted tree with the central root branching and sub branching to
the extremities of the network.
Graph Topology
Mesh Topology
In this topology, each node is connected to more than one node to provide
an alternative root in the case the host is either down or too busy. It is an
extension to P-P network.
ADVANTAGES:
1. It is simple and physically flexible.
5. It is inexpensive.
DISADVANTAGES:
1. Its low bandwidth capabilities make it unsuitable for broadband
applications.
(i) Unshielded Twisted Pair (UTP) Cable: UTP cabling is used for variety
of electronic communications. It is available in the following five
categories:
Type Description
CAT1 Voice-grade communications only; No data
transmission
CAT2 Data-grade transmission up to 4 Mbps
CAT3 Data-grade transmission up to 10 Mbps
CAT4 Data-grade transmission up to 16 Mbps
CAT5 Data-grade transmission up to 1000 Mbps
The UTP cables can have maximum segment length of 100 meters.
(i) Thicknet: This form of coaxial cable is thicker than thinet. The
thicknet coaxial cable segments can be upto 500 meters long.
(ii) Thinnet: This form of coaxial cable is thinner and it can have
maximum segment length of 185 meters i.e, using this cable, nodes
having maximum distance of 185 meters can be joined.
Optical Fibers
Optical Fibers consist of thin strands of glass or glass like material which
are so constructed that they carry light from source at one end of the fiber to a
detector at the other end. The light sources used are either light emitting diodes
(LEDs) or laser diodes (LDs). The data to be transmitted is modulated onto the
light beam using frequency modulation techniques. The signals can then be
picked up at the receiving end and demodulated. The bandwidth of the medium
is potentially very high. For LEDs, this range between 20 and 150 mbps and
higher rates are possible using LDs.
4. Fiber optic cables can be used for broadband transmission where several
channels (i.e., bands of frequency) are handled in parallel and where it is
396 Networking concepts
2. Signals from one signal antenna may split up and propagate by slightly
different paths to the receiving antenna. When these out of phase signals
recombine, they interfere, reducing the signal strength.
3. Microwave propagation is susceptible to weather effects like rains, thunder
storms, etc.
4. Bandwidth allocation is extremely limited.
5. The cost of design, implementation and maintenance of microwave links
is high.
Radio Wave
The transmission making use of radio frequencies is termed as radio-wave
transmission.
Any radio setup has two parts:
The transmitter
The receiver
The transmitter takes some sort of message (it could be the sound of someone’s
voice, pictures for a TV set, data for a radio modem or whatever), encodes it onto
a sine wave and transmits it with radio waves. The receiver receives the radio
waves and decodes the message from the sine wave it receives. Both the
transmitter and receiver use antennas to radiate and capture the radio signal.
ADVANTAGES:
1. Radio-wave transmission offers mobility.
2. It proves cheaper than digging trenches for laying cables and maintaining
repeaters and cables if cables get broken by a variety of causes.
3. It offers freedom from land acquisition rights that are required for laying,
repairing the cables.
DISADVANTAGES:
1. Radio-wave communication is an insecure communication.
4. Satellites can cover large areas of the earth. This is particularly useful for
sparsely populated areas.
DISADVANTAGES:
1. Technological limitations preventing the deployment of large, high gain
antennas on the satellite platform.
2. Over-crowding of available bandwidths due to low antenna gains.
3. The high investment cost and insurance cost associated with significant
probability of failure.
4. High atmospheric losses above 30 GHz limit carries frequencies.
Other Unguided Media
Apart from microwaves, radio waves and satellites, two other unguided media
are also very popular. These are infrared and laser waves.
1. Infrared
This type of transmission uses infrared light to send the data. The infrared light
transmits data through the air and can propagate throughout a room (bouncing
off surfaces), but will not penetrate walls. The infrared transmission has become
common in PDAs (Personal Digital Assistants) e.g., hand held devices like palm
pilots etc. The infrared transmission is considered to be secure one.
2. Laser
The Laser transmission requires direct line-of-sight. It is unidirectional like
microwave, but has much higher speed than microwaves. The laser transmission
requires the use of a laser transmitter and a photo-sensitive receiver at each
end. The laser transmission is point-to-point transmission, typically between
buildings. But lasers have a certain disadvantage, which is: it can be adversely
affected by weather.
15.4.9 SWITICHING TECHNIQUES
Different types of switching techniques are employed to provide communication
between two computers. These are circuit switching, message switching and
packet switching.
Circuit Switching
In this technique, first the complete physical
connection between two computers is established and
then data are transmitted from the source computer
to the destination computer. That is, when a computer
places a telephone call, the switching equipment
within the telephone system seeks out a physical
copper path all the way from sender telephone to the
receiver’s telephone. The important property of this
Figure 15.16 Circuit
Networking concepts 399
Simplex
On this panel there is only one interface that is a transmitter and all other
interfaces is a receiver. The full bandwidth is completely for signals travelling
across transmitter to receiver or receivers. On this channel transmitting interface
cannot receive and receiving interface cannot transmit. For example Radio, TV,
etc uses Simplex channels.
Half Duplex
On this channel each interface works as transmitter and receiver, but only one
interface can transmit at a time. The full bandwidth of a channel is available to
the transmitting interface which will not receive while transmitting. Generally it
is used in Walkie-Talkies, Marine/Aviation, etc use Half Duplex channel.
Full Duplex
This channel has two ends, each serving as transmitter and receiver. Each
interface can transmit and receive at the same time. The modern telephone
system use Full Duplex channels. It is more expensive due to hardware for
increased number of channels and bandwidth.
400 Networking concepts
Hub
A hub is a hardware device used to connect several computers together.
A hub that contains multiple independent but connected modules of network
and internetworked equipment. A similar term is concentrator. A concentrator
is a device that provides a central connection point for cables from workstations,
servers and peripherals. In a star topology, twisted pair wire is run from each
workstation to a central concentrator.
Basically, hubs are multi slot concentrators into which a number multi
port cards can be plugged to provide additional access as the network grows in
size.
Hubs can be either passive or active.
1.Active Hubs: Electrically amplify the signal as it moves from one connected
device to another. Active concentrators are used like repeaters to extent
the length of a network.
2. Passive Hubs: Allow the signals to pass from one computer to another
without any change.
Hubs usually can support 8, 12 or 24 RJ-45 ports. These are often used
in a star or star wired ring topology and requires specialized software for port
management.
Switch
A switch is a device that is used to segment networks into different sub
networks called subnets or LAN segments. Segmenting the network into smaller
subnets prevents traffic overloading in a network.
402 Networking concepts
Router
A device that works like a bridge but can handle different protocols is
known as a router. For example, a router can link Ethernet to a mainframe.
If the destination is unknown to a router it sends the traffic (bound to
unknown destination) to another router (using logical addresses) which knows
the destination. A router differs from a bridge in a way that former uses logical
addresses and the latter uses physical addresses.
Networking concepts 403
15.5.1 Gateway
A Gateway is a device that connects dissimilar networks. A gateway operates
at the highest layer of network abstraction. It expands the functionality of routers
by performing data translation and protocol conversion. It is needed to convert
Ethernet traffic from the LAN, to SNA (Systems Network Architecture) traffic on
a legacy system. It then routes the SNA traffic to the mainframe. When the
mainframe answers, the reverse process occurs.
A gateway is actually a node on a network that serves as an entrance to
another network. In enterprises, the gateway is the computer that routes the
traffic from a workstation to the outside network that is serving the web pages.
In homes, the gateway is the ISP that connects the user to the internet.
In enterprises, the gateway node often acts as a proxy server (a machine
that is not actually a server but appears as a server) and a firewall (a system
designed to prevent unauthorized access to or from a private network). The gateway
is also associated with both a router, which use headers and forwarding tables
to determine where packets are sent, and a switch, which provides the actual
path for the packet in and out of the gateway.
GSM
GSM is short for Global System for Mobile communications, which is one
of the leading digital cellular systems. The GSM standard for digital cell phones
was established in Europe in the mid 1980s.
In covered areas, cell phone users can buy one phone that will work
anywhere where the standard is supported. To connect to the specific service
providers in these different countries, GSM uses simply switch Subscriber
Identification Module (SIM) cards. SIM cards are small removable disks that slip
in and out of GSM cell phones. They store all the connection data and
identification numbers you need to access a particular wireless service provider.
GSM uses narrow band (TDMA), which allows eight simultaneous calls on
the same radio frequency. TDMA is short for (Time Division Multiple Access), a
technology for delivering digital wireless service using Time Division Multiplexing.
TDMA works by dividing a radio frequency into time slots and then allocating
slots to multiple calls. In this way, a single frequency can support multiple,
simultaneous data channels. GSM operates in the 900 MHz and 1800 MHz
bands.
The SIM – Subscriber Identity Module – is a chip card, the size of a postage
stamp. A SIM is a tiny computer chip that gives a cellular device its unique
phone number. It has memory, a processor and the ability to interact with the
Networking concepts 405
CDMA
When calls are made from the telephone, it signals the base station for a
connection, which is subsequently established through a switch center, exactly
as in conventional telephony. An incoming call is identified at the switch center
and rooted to the base station assigned to serve the telephone being called. The
wireless connection is then made, and the call is completed in a conventional
manner.
406 Networking concepts
The WLL system can operate with GSM handsets/mobile units, as well as
with GSM compatible subscriber units. The system is transparent to the central
office and subscribers, and interfaces with the most standard central office
switches and subscriber telephone equipment.
Advantages of WLL
(i) WLL facilities do not significantly suffer from weather damage, vandalism
and accidents.
(ii) WLL system offers better bandwidth than traditional telephone systems.
(iii) WLL system has much better bandwidth, superior customer service
features and quality can be provided.
15.7.1 GPRS
GPRS is the abbreviation for General Packet Radio Service. GPRS is used
for wireless communication using a mobile device. With this service you can
access the internet, send emails and large data, real time news, download games
and watch movies.
How does GPRS work?
You must be aware of how files are transferred from one location to another
on your computer. They are broken down into packets and sent across. Similarly
GPRS also uses the same function to transfer data through a network. The
information is split into the smaller units or packets and sent through the network
and is reassembled at the receiving end. GPRS provides a high speed data transfer,
typically between 56 kilo bits per second to 114 kilo bits per second. A user of
the GPRS network is charged only on the amount data is sent or received as
opposed to the duration of the connection.
1G Networks:
before that. 1G networks were conceived and designed purely for voice calls with
almost no consideration of data services.
2G Networks:
(GSM, CDMAOne, D-AMPS) are the first digital cellular systems launched
early 1990s, offering improved sound quality, better security and higher total
capacity. GSM supports circuit switched data (CSD), allowing users to place
dial-up data calls digitally, so that the networks switching station receives actual
ones and zeros rather than the screech of an analog modem.
2.5G Networks: (GPRS, CDMA2000 1x) are the enhanced versions of 2G networks
with theoretical data rates upto about 144k bit/s. GPRS offered the first always
on data service.
3G Networks:
(UMTS FDD and TDD, CDMA 2000 1x EVDO, CDMA 2000 3x, TD-SCDMA,
EDGE) are newer cellular networks that have data rates of 384k bit/sec and
more. The UN’s IMT – 2000 standard requires stationary speeds of 2Mbps and
mobile speeds of 384kbps for a “true” 3G.
3G is a specification for the third generation (analog cellular was the first
generation, digital PCS the second) of mobile communications technology. 3G
promises increased bandwidth, up to 384 Kbps when a device is stationary or
moving at pedestrian speed, 128 Kbps in a car and 2Mbps in fixed applications.
UMTS (Universal Mobile Telecommunication System) is a broadband, packet–
based transmission of text, digitized voice, video, and multimedia at data rates
up to and possibly higher than 2 megabits per second (Mbps).
4G Network:
(i) Support for Multiple Applications and Services — Efficient support for
unicast, multicast and broadcast services and the applications that rely
on them. Prompt enforcement of Service Level Agreements (SLA) along
408 Networking concepts
with privacy and other security features. Minimally, service classes include
delay sensitive, loss sensitive, delay and loss sensitive and best effort.
(ii) Quality of Service — Consistent application of admission control and
scheduling algorithms regardless of underlying infrastructure and operator
diversity.
(iii) Network Detection and Network Selection — A mobile terminal
that features multiple radio technologies or possibly uses software- defined
radios if economical, allows participation in multiple networks
simultaneously, thereby connecting to the best network with the most
appropriate service parameters (cost, QoS and capacity among others) for
the application. This requires establishing a uniform process for defining
eligibility of a terminal to attach to a network and to determine the validity
of link layer configuration.
5G Network:
• Real wireless world with no more limitation with access and zone issues.
• Wearable devices with AI capabilities.
• Internet protocol version 6 (IPv6), where a visiting care-of mobile IP address is
assigned according to location and connected network.
• One unified global standard.
• Pervasive networks providing ubiquitous computing: The user can
simultaneously be connected to several wireless access technologies and
Networking concepts 409
seamlessly move between them. These access technologies can be a 2.5G, 3G,
4G or 5G mobile networks, Wi-Fi, WPAN or any other future access technology.
In 5G, the concept may be further developed into multiple concurrent data transfer
paths.
• Cognitive radio technology, also known as smart-radio: allowing different radio
technologies to share the same spectrum efficiently by adaptively finding unused
spectrum and adapting the transmission scheme to the requirements of the
technologies currently sharing the spectrum. This dynamic radio resource
management is achieved in a distributed fashion, and relies on software defined
radio.
• High Altitude stratospheric Platform Station (HAPS) systems.
Features of 5G Technology:
• 5G technology offer high resolution for crazy cell phone user and bi-directional
large
bandwidth shaping. The advanced billing interfaces of 5G technology makes
it more attractive
and effective.
• 5G technology also providing subscriber supervision tools for fast action.
• The high quality services of 5G technology based on Policy to avoid error.
• 5G technology is providing large broadcasting of data in Gigabit which supporting
almost
65,000 connections.
• 5G technology offer transporter class gateway with unparalleled consistency.
• The traffic statistics by 5G technology makes it more accurate.
• Through remote management offered by 5G technology a user can get better
and fast solution.
• The remote diagnostics also a great feature of 5G technology.
• The 5G technology is providing up to 25 Mbps connectivity speed.
• The 5G technology also support virtual private network.
• The new 5G technology will take all delivery service out of business prospect
• The uploading and downloading speed of 5G technology touching the peak.
• The 5G technology network offering enhanced and available connectivity just
about the world.
EDGE
410 Networking concepts
The new EDGE air interface has been developed specifically to meet the
bandwidth needs of 3G. Enhanced Data rates for Global Evolution (EDGE) are a
ratio based mobile high speed data standard. It allows data transmission speeds
of 384 kbps to be achieved when all eight time slots are used. In fact, EDGE was
formerly called GSM384. This means a maximum bit rate of 48 kbps per time
slot. Even higher speed may be available in good ratio conditions. EDGE is
considered an intermediate step in the evolution to 3G WCDMA (Wideband CDMA),
although some carriers are expected to stop short of that final step.
Wi-Fi Hotspots
A hotspot is a venue that offers Wi-Fi access. The public can use a laptop,
Wi-Fi phone or other suitable portable devices to access the internet through a
WiFi Hotspot. Hotspots are public locations (such as libraries, hotels, airports,
etc) with free or fee-based wireless internet access. There are Wi-Fi hotspots in
thousands of locations around the world.
WiMax
WiMax is a wireless digital communications system. WiMax can provide
Broadband Wireless Access (BWA) up to 30 miles (50 km) for fixed stations and
3-10 miles (5-15 km) for mobile stations. WiMax requires a tower called WiMax
Base Station, similar to a cell phone tower, which is connected to the Internet
using a standard wired high-speed connection. But as opposed to a traditional
Internet Service Provider (ISP), which divides that bandwidth among customers
via wire, it uses a microwave link to establish a connection. In other words,
WiMax does not depend on cables to connect each end-point, the internet
connectivity to an end-user is provided through microwave link between the
tower and the user-endpoint, known as WiMax Subscriber unit.
Most viruses are spread by email attachment and warn them to be suspicious
of any files attached to unsolicited messages.
The following are characteristics of a computer virus.
1. It is able to replicate
2. It requires a host program as a carrier
3. It is activated by external action
4. Its replication ability is limited to the system.
Virus Prevention
Virus Prevention is not a difficult task. All you need to be is extra careful and
ensure to follow the following guidelines to lead virus free computing life.
1.Never use a “Foreign” disk or CD without scanning it for viruses.
2.Always scan files downloaded from the internet or other sources.
3.Never boot your PC from a floppy unless you are certain that it is virus free.
4.Write protect your disks.
5.Use licensed software.
6.Password protect your PC to prevent unattended modification.
7.Install and use antivirus software.
8.Keep antivirus software up to date.
Some of the antivirus are Kaspersky , Quick heal, K7, Norton 360, Micro trend
titanium, AVG, Panda, ESET Nod32, Avast.McAFee etc.,
Cloud tecnology: Cloud technology or cloud computing as it is more commonly
known today is a computing platform widely used by Information Technology
(IT) Service Companies.
Review questions