0% found this document useful (0 votes)
194 views

Cs Project Class 12 Cbse

The document provides an overview of key computer network and communication technologies concepts including wireless/mobile computing, internetworking terms, network security, and computer viruses. It discusses technologies such as Wi-Fi, WiMax, VoIP, chat, video conferencing, and web hosting. Formats such as HTML, XML, and scripting languages that power modern web development are also covered at a high level. The document serves as an introductory guide to fundamental concepts in computer networks and communications.

Uploaded by

KV Adithyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
194 views

Cs Project Class 12 Cbse

The document provides an overview of key computer network and communication technologies concepts including wireless/mobile computing, internetworking terms, network security, and computer viruses. It discusses technologies such as Wi-Fi, WiMax, VoIP, chat, video conferencing, and web hosting. Formats such as HTML, XML, and scripting languages that power modern web development are also covered at a high level. The document serves as an introductory guide to fundamental concepts in computer networks and communications.

Uploaded by

KV Adithyan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 22

Computer Networks - ll

By : Sharon Jino
Class : Xll A
Table of Contents
1. Wireless / Mobile Computing Technologies

2. Internet Working Terms & Concepts

3. Network Security Concepts

4. Computer Viruses
Communication Technologies for the Modern World
Communication technologies have revolutionized
the modern world by enabling instant and global
connectivity. From the internet and smart phones
to social media and video conferencing, these
technologies have transformed how we
communicate, collaborate, and share
information. They have made the world more
interconnected, facilitated remote work and
learning, and accelerated the exchange of ideas
and information across borders. In today's fast-
paced and interconnected society,
communication technologies are the backbone of
our personal, professional, and social lives,
shaping the way we interact and stay informed.

In summary, communication technologies have


become an integral part of modern life,
profoundly impacting how we communicate,
work, learn, and interact with the world. Their
ongoing development and responsible use will
shape the future of society in countless ways.
SMS , Chat and Video Conferencing
SMS (Short Message Service) : SMS is a text messaging service
that allows users to send short written messages, typically
limited to 160 characters. It's a widely used form of
communication on mobile phones, offering a quick and
convenient way to exchange information and stay in touch.

Chat : Chat refers to real-time text-based communication


often facilitated through messaging apps or platforms. It
enables instant conversations between individuals or groups,
supporting multimedia elements like images and emoji. Chat
has become a prevalent mode of communication for both
personal and professional interactions.

Video Conferencing : Video conferencing involves real-time


audio and video communication between people in different
locations, typically over the internet. It enables face-to-face
meetings, collaboration, and discussions without the need for
physical presence. Video conferencing has gained significant
importance, especially for remote work and virtual meetings,
in recent years.
Voice over Internet Protocol (VoIP)

Voice over Internet Protocol (VoIP) : VoIP is a


technology that enables voice communication and
multimedia sessions over the internet, allowing users
to make phone calls and conduct audio and video
conversations using IP networks rather than traditional
phone lines. VoIP is cost-effective, versatile, and has
revolutionized how we communicate, offering services
like Skype, Zoom, and Whatsapp for voice and video
calls.

In summary, VoIP has revolutionized communication


by providing cost-effective, versatile, and globally
accessible voice and multimedia services. Its
integration capabilities, mobility, and scalability make
it an essential tool in the modern world for both
individuals and businesses.
Connecting Wirelessly to the Internet :
Wi-fi and WiMax
1. Wi-Fi (Wireless Fidelity) :

⦿ Wi-Fi, short for Wireless Fidelity, is a ubiquitous technology for wireless


communication.

⦿ It operates using radio waves, allowing devices like smartphones and laptops to
connect to the internet and local networks without physical cables.

⦿ Wi-Fi routers or access points create local hotspots that provide wireless
connectivity within a limited range, typically a few hundred feet.

⦿ Wi-Fi is widely used in homes, businesses, public spaces, and educational


institutions, making it an essential part of modern connectivity.

⦿ Continuous advancements in Wi-Fi technology have led to faster speeds, improved


security, and better performance for wireless networks.
2. WiMax (Worldwide Interoperability for
Microwave Access) :
⦿ WiMax, short for Worldwide Interoperability for Microwave Access, is a
wireless broadband technology with a wider coverage area than Wi-Fi.

⦿ It offers high-speed internet access over longer distances, often spanning


several miles, making it suitable for metropolitan and rural deployments.

⦿ WiMax has been used by internet service providers to bridge the digital
divide by offering broadband connectivity in areas with limited access to
wired internet infrastructure.

⦿ It operates based on IEEE 802.16 standards and has both fixed and mobile
variants, allowing for point-to-point and point-to-multipoint connections.

⦿ While WiMax was once promising, its popularity has waned in favor of 4G
and 5G cellular networks, which offer even broader coverage and higher
speeds for wireless communication.
Internetworking Terms and Concepts

Internetworking involves connecting different networks to enable data exchange. Key


terms include routers (network traffic directors), protocols (communication rules), IP
addresses (device identifiers), subnets (network segments), firewalls (security
barriers), gateways (network bridges), DNS (address translation), LAN (local network),
WAN (wide network), and topology (network structure). These concepts underpin
modern internet connectivity.

Ethernet : Common LAN technology using twisted-pair cables.


TCP/IP : Fundamental internet protocol suite for data exchange.
Packet : Small data unit transmitted over networks.
Modem : Device for connecting to the internet via phone or cable lines.
VPN (Virtual Private Network) : Secure network connection over the internet.
MAC Address**: Unique hardware identifier for network devices.
ISP (Internet Service Provider) : Company providing internet access.
Bandwidth : Data transfer capacity of a network.
Latency : Delay in data transmission over a network.
LAN Party : Social gaming event where participants connect their computers to a LAN
for multiplayer gaming.
Web Addresses and Web Pages

Web Addresses (URLs) : Web addresses, or URLs (Uniform


Resource Locators), are text-based identifiers that specify the
location of resources on the internet. They consist of a
protocol (e.g., "http://" or "https://"), a domain name (e.g.,
"www.example.com"), and a specific path or resource
identifier (e.g., "/page1.html"). URLs help users access
websites, documents, images, and other online content.

Web pages : Web pages are digital documents displayed in


web browsers. They contain text, images, videos, links, and
interactive elements. Web pages are created using HTML
(Hypertext Markup Language) and can be static (unchanging)
or dynamic (changing based on user interactions or data
inputs). They are the building blocks of websites and provide
information, functionality, and interactivity on the internet.
Domain Name System (DNS)

The Domain Name System (DNS) is like the internet's


phone book. It translates human-readable domain names
(e.g., www.example.com) into numeric IP addresses that
computers use to locate and connect to websites and
resources. DNS plays a crucial role in making web
navigation user-friendly by eliminating the need for users
to remember complex IP addresses and instead use easy-
to-remember domain names to access online content. The
Domain Name System serves as the internet's address
translator, converting human-friendly domain names into
machine-readable IP addresses. This system enables users
to access websites and online services with user-friendly
names instead of numerical codes. DNS plays a vital role in
the seamless and efficient functioning of the internet by
ensuring accurate and swift resource location and
retrieval.
Web Hosting and Web 2.0 / 3.0

Web Hosting : Web hosting is a service that provides


individuals and organizations with the means to make their
websites accessible on the internet. It involves storing
website files, databases, and other content on servers
connected to the web, allowing users worldwide to access
these resources through a web address.

Web 2.0 / 3.0 : Web 2.0 refers to a shift in web


development and usage, emphasizing user-generated
content, collaboration, and interactive web applications.
Web 3.0, often referred to as the Semantic Web, is a
concept of a more intelligent and interconnected web that
uses artificial intelligence and data to provide more
context-aware and personalized experiences. These terms
reflect the evolving nature of the internet and its impact on
user engagement and functionality.
XML , HTML , DHTML
**XML (Extensible Markup Language)**: XML is a versatile markup
language used for structuring and encoding data in a format that is
both human-readable and machine-readable. It is often employed
for data exchange between different systems and is the foundation
of other markup languages like HTML.

**HTML (Hypertext Markup Language)**: HTML is the standard


markup language used for creating web pages. It structures content
on a webpage using elements and tags, defining the layout, text,
images, links, and multimedia elements that make up a web
document.

**DHTML (Dynamic Hypertext Markup Language)**: DHTML is a


combination of HTML, CSS (Cascading Style Sheets), and JavaScript.
It enables web pages to become more interactive and dynamic by
allowing elements to change or respond to user interactions
without requiring a full page reload. DHTML is a precursor to
modern web development and interactivity.
Web Scripting
Web Scripting : Web scripting refers to the use of
scripting languages like JavaScript, Python, or PHP to
add functionality and interactivity to web pages.
Scripting enables dynamic content updates, user
interactions, and the manipulation of webpage
elements in real-time. It plays a fundamental role in
modern web development, enhancing user experiences
and enabling web applications to respond to user input
and data. Web scripting is the practice of using
programming languages like JavaScript to create
interactive and dynamic elements on websites. These
scripts run on the user's web browser, enabling actions
like form validation, animations, and real-time updates
without requiring full page reloads. Web scripting
enhances user engagement and functionality in web
applications.
Comparing Client Side and Server Side Scripting
1. Client-Side Scripting :
⦿ Executes in the Browser : Client-side scripting, such as
JavaScript, runs on the user's web browser.
⦿ Enhanced User Interactivity : It enables dynamic and
interactive features directly on the user's device.
⦿ Code Visibility : Client-side script code is visible to users,
making it accessible for inspection and debugging by
developers.

2. Server-Side Scripting :
⦿ Executes on the Server : Server-side scripting, using
languages like PHP, Python, or Ruby , runs on the web server.
⦿ Enhanced Security : It is more secure for handling sensitive
data and logic as the code is not exposed to users.
⦿ Consistent Output : Server-side scripting ensures
consistent behavior across different web browsers, reducing
compatibility issues and delivering a uniform user experience.
Network Security Concepts

Network security concepts involve safeguarding computer networks


from unauthorized access and cyber threats. Key elements include
firewalls, encryption, authentication, access control, and antivirus
software. These concepts work together to protect data and ensure
network integrity.

➡ Network security aims to maintain the confidentiality, integrity, and


availability of data within a network, protecting it from unauthorized
access, data breaches, and cyber attacks.

➡ Regular updates and patch management are crucial to address


vulnerabilities and ensure that network security measures remain
effective against evolving threats.

➡ An effective network security strategy should be tailored to the


specific needs and risks of an organization, balancing protection with
accessibility to support business operations.
Related Terms

Cookies are small pieces of data stored on a user's web browser


by websites they visit. They serve various purposes, including
tracking user sessions, personalizing website experiences, and
remembering login credentials. While essential for website
functionality, they also raise privacy concerns and are subject to
regulations governing user data protection.

Hackers are individuals skilled in computer programming and


network security, often using their expertise for ethical
purposes, such as improving cyber security or finding
vulnerabilities.

Crackers, on the other hand, use their skills maliciously to gain


unauthorized access to computer systems, steal data, or engage
in other illicit activities. They are considered cybercriminals.
Cyber Crimes
Cybercrimes are illegal activities conducted online,
encompassing various forms of cyber attacks, fraud,
identity theft, and digital vandalism. They pose
significant threats to individuals, organizations, and
society as a whole, and law enforcement agencies work
to combat and prevent them. Cybercrimes often
involve exploiting vulnerabilities in computer systems,
networks, or individuals to gain unauthorized access,
steal sensitive information, or disrupt online
operations. With the increasing reliance on digital
technologies, cybercrimes have become more
sophisticated and widespread, making cyber security
measures and law enforcement efforts essential to
protect against and prosecute cybercriminals. Common
examples of cybercrimes include phishing attacks,
malware distribution, ransom ware extortion, and
online scams, highlighting the diverse range of threats
in the digital realm.
IPR Issues
Intellectual Property Rights (IPR) issues pertain to legal
protections for creations of the mind, such as inventions,
artistic works, and brand identities. These issues revolve
around copyright, trademarks, patents, and trade secrets. IPR
safeguards innovation and creativity, but it also raises debates
on issues like copyright infringement, patent trolling, and
balancing public access with creator rights. Effective IPR
enforcement is crucial for fostering innovation while ensuring
fair compensation for creators and inventors. IPR issues are
increasingly relevant in the digital age due to the ease of
reproducing and sharing intellectual property online, leading to
debates over digital rights management (DRM) and file-sharing
platforms. These issues impact various industries, from
technology and entertainment to pharmaceuticals and fashion,
as companies seek to protect their intellectual assets while
navigating global markets with differing IPR laws. The balance
between protecting IPR and promoting innovation remains a
dynamic challenge, with ongoing international discussions and
legal frameworks evolving to address the complexities of the
modern intellectual property landscape.
Computer Viruses
Computer viruses are malicious software programs designed to
replicate and spread to other computers, causing harm. They can
corrupt or delete files, steal sensitive data, or disrupt computer
operations. Protecting against viruses requires up-to-date antivirus
software and cautious online behavior to prevent infections. These
viruses can cause a wide range of harm, from corrupting data and
stealing personal information to disrupting computer operations.
Preventative measures, such as installing antivirus software, regularly
updating systems, and exercising caution while downloading files or
clicking on links, are essential to protect against these digital threats.
Computer viruses often spread via infected email attachments,
downloads from untrusted websites, or through compromised
software, making it crucial to exercise caution when interacting with
digital content. The term "virus" is used broadly to describe various
forms of malicious software, including worms, Trojans, and ransom
ware, each with its own method of propagation and impact on
computer systems. Effective cyber security practices, including regular
system scans and backups, help mitigate the risks posed by computer
viruses and ensure the integrity and security of digital information.
Trojan Horse , Worms , Spam
Trojan Horse : A Trojan Horse, or simply a Trojan, is malicious software
disguised as legitimate or helpful, enticing users to install it. Once
installed, it can provide unauthorized access to a computer, steal
sensitive information, or perform other harmful actions without the
user's knowledge.

Worms : Worms are self-replicating malware that spread across


networks and systems by exploiting vulnerabilities. Unlike viruses, they
don't need a host file to attach to and can independently move from
one computer to another. They often overload networks, disrupt
services, or deliver other payloads.

Spam : Spam refers to unsolicited and often irrelevant or deceptive


emails or messages sent in bulk. Typically used for advertising or
phishing, spam can overwhelm email inboxes, waste time, and pose
security risks if users interact with malicious content. Effective spam
filters are employed to reduce its impact.
Network Security Threats

Network security threats are risks to the confidentiality, integrity,


and availability of data and resources in computer networks. They
include malware (e.g., viruses, ransom ware), phishing attacks,
hacking, denial of service (DOS), insider threats, and vulnerabilities
that, if exploited, can compromise network security. Protecting
against these threats involves robust security measures, regular
updates, and user awareness. Network security threats can have
severe consequences, including data breaches, financial losses, and
damage to an organization's reputation. The threat landscape is
continually evolving, with cybercriminals developing increasingly
sophisticated techniques, making proactive cyber security measures
vital. Effective network security requires a combination of
technology, policies, and user education to detect, mitigate, and
prevent threats from compromising network integrity.

You might also like