Академический Документы
Профессиональный Документы
Культура Документы
The term Client/server refers to the concept of sharing the work involved in processing data
between the client computer and the most powerful server computer.
The client/server network is the most efficient way to provide:
Databases and management of applications such as Spreadsheets, Accounting,
Communications and Document management.
Network management.
Centralized file storage.
The client/server model is basically an implementation of distributed or cooperative processing.
FTP- Short for File Transfer Protocol, the protocol for exchanging files over the Internet. FTP
works in the same way as HTTP for transferring Web pages from a server to a user's browser
and SMTP for transferring electronic mail across the Internet in that, like these technologies, FTP
uses the Internet's TCP/IP protocols to enable data transfer. FTP is most commonly used
to download a file from a server using the Internet or to upload a file to a server (e.g., uploading a
Web page file to a server).
SMTP- Short for Simple Mail Transfer Protocol, a protocol for sending e-mail messages
between servers. Most e-mail systems that send mail over the Internet use SMTP to send
messages from one server to another; the messages can then be retrieved with an e-mail
client using either POP or IMAP.
DNS- Short for Domain Name System (or Service or Server), an Internet service that
translates domain names into IP addresses. Because domain names are alphabetic, they're easier
to remember. The Internet however, is really based on IP addresses.
SNMP- Short for Simple Network Management Protocol, a set of protocols for managing
complex networks. The first versions of SNMP were developed in the early 80s. SNMP works by
sending messages, called protocol data units (PDUs), to different parts of a network. SNMP-
compliant devices, called agents, store data about themselves in Management Information Bases
(MIBs) and return this data to the SNMP requesters.
TCP- Abbreviation of Transmission Control Protocol, and pronounced as separate letters. TCP is
one of the main protocols in TCP/IP networks. Whereas the IP protocol deals only with packets,
TCP enables two hosts to establish a connection and exchange streams of data. TCP guarantees
delivery of data and also guarantees that packets will be delivered in the same order in which they
were sent.
UDP- UDP (User Datagram Protocol) is a communications protocol that offers a limited amount
of service when messages are exchanged between computers in a network that uses the Internet
Protocol (IP). UDP is an alternative to the Transmission Control Protocol (TCP) and, together
with IP, is sometimes referred to as UDP/IP. Like the Transmission Control Protocol, UDP uses
the Internet Protocol to actually get a data unit (called a datagram) from one computer to another.
Unlike TCP, however, UDP does not provide the service of dividing a message into packets
(datagrams) and reassembling it at the other end. Specifically, UDP doesn't provide sequencing of
the packets that the data arrives in.
IPSec-Internet Protocol Security (IPsec) is a technology protocol suite for securing Internet
Protocol (IP) communications by authenticating and/or encrypting each IP packet of a
communication session. IPsec also includes protocols for establishing mutual
authentication between agents at the beginning of the session and negotiation of cryptographic
keys to be used during the session.
IPsec is an end-to-end security scheme operating in the Internet Layer of the Internet
Protocol Suite. It can be used in protecting data flows between a pair of hosts (host-to-
host), between a pair of security gateways (network-to-network), or between a security
gateway and a host (network-to-host).
ICMP-The Internet Control Message Protocol (ICMP) is one of the core protocols of
the Internet Protocol Suite. It is used by the operating systems of networked computers to
send error messages indicating, for example, that a requested service is not available or
that a host or router could not be reached. ICMP can also be used to relay query
messages.
IGMP-The Internet Group Management Protocol (IGMP) is an
Internet protocol that provides a way for an Internet computer to report
its multicast group membership to adjacent routers. Multicasting allows one
computer on the Internet to send content to multiple other computers that have
identified themselves as interested in receiving the originating computer's
content.
Other LAN types include Token Ring, Fast Ethernet, Fiber Distributed Data Interface (FDDI),
Asynchronous Transfer Mode (ATM) and Local Talk. Ethernet is popular because it strikes a
good balance between speed, cost and ease of installation. These benefits, combined with wide
acceptance in the computer marketplace and the ability to support virtually all popular network
protocols, make Ethernet an ideal networking technology for most computer users today.
Fiber Optic Cable- A technology that uses glass (or plastic) threads (fibers) to transmit data. A
fiber optic cable consists of a bundle of glass threads, each of which is capable of transmitting
messages modulated onto light waves.
Fiber optics has several advantages over traditional metal communication lines:
Fiber optic cables have a much greater bandwidth than metal cables. This means
that they can carry more data.
Fiber optic cables are less susceptible than metal cables to interference.
Fiber optic cables are much thinner and lighter than metal wires.
Data can be transmitted digitally (the natural form for computer data) rather than
analogically.
This cable is smaller and can carry a vast amount of Network protocols are standards that allow
computers to communicate. A protocol defines how computers identify one another on a network,
the form that the data should take in transit, and how this information is processed once it reaches
its final destination. Protocols also define procedures for handling lost or damaged transmissions
or "packets." TCP/IP (for UNIX, Windows NT, Windows 95 and other platforms), IPX (for
Novell NetWare), DECnet (for networking Digital Equipment Corp. computers), AppleTalk (for
Macintosh computers), and NetBIOS/NetBEUI (for LAN Manager and Windows NT networks)
are the main types of network protocols in use today.
Twisted Pair Cables
These come in two flavors of unshielded and shielded.
Shielded Twisted Pair (STP)-Is more common in high-speed networks. The biggest difference
you will see in the UTP and STP is that the STP use's metallic shield wrapping to protect the wire
from interference.-Something else to note about these cables is that they are defined in numbers
also. The bigger the number the better the protection from interference. Most networks should go
with no less than a CAT 3 and CAT 5 is most recommended.
-Now about connectors. This is important and most likely need the RJ-45 connector. Most
commonly connectors are available in two flavors and this is BNC (Bayonet Naur Connector)
used in thicknets and the RJ-45 used in smaller networks using UTP/STP.
Unshielded Twisted Pair (UTP) -This is the most popular form of cables in the network and the
cheapest form that you can go with. The UTP has four pairs of wires and all inside plastic
sheathing. The biggest reason that we call it Twisted Pair is to protect the wires from interference
from themselves. Each wire is only protected with a thin plastic sheath.
Ethernet Cabling Now to familiarize you with more on the Ethernet and it's cabling we need to
look at the 10's. 10Base2 is considered the thin Ethernet, thinnet, and thinwire which uses light
coaxial cable to create a 10 Mbps network. The cable segments in this network can't be over 185
meters in length.
10Base5, this is considered a thicknet and is used with coaxial cable arrangement such as
the BNC connector. The good side to the coaxial cable is the high-speed transfer and
cable segments can be up to 500 meters between nodes/workstations.
10BaseT, the “T” stands for twisted as in UTP (Unshielded Twisted Pair) and uses this
for 10Mbps of transfer. The down side to this is you can only have cable lengths of 100
meters between nodes/workstations. The good side to this network is they are easy to set
up and cheap! This is why they are so common an ideal for small offices or homes.
100BaseT is considered Fast Ethernet uses STP (Shielded Twisted Pair) reaching data
transfer of 100Mbps. This system is a little more expensive but still remains popular as
the 10BaseT and cheaper than most other type networks. This on of course would be the
cheap fast version.
10BaseF, the F stands for fiber optics. This arrangement is a little more complicated and
uses special connectors and NIC's along with hubs to create its network.. An important
part of designing and installing an Ethernet is selecting the appropriate Ethernet medium.
Network Topologies:
A network topology is the geometric arrangement of nodes and cable links in a LAN, There are
five topology's to think about when you get into networks. These are the star, ring, hierarchical
(tree), mesh and the bus.
Star Topology- in a star topology each node has a dedicated set of wires connecting it to a central
network hub. Since all traffic passes through the hub, the hub becomes a central point for
isolating network problems and gathering network statistics.
Ring Topology-a ring topology features a logically closed loop. Data packets travel in a single
direction around the ring from BasicNetworking.one network device to the next. Each network
device acts as a repeater, meaning it regenerates the signal.
Bus Topology-, the bus topology, each node (computer, server, peripheral etc.) attaches directly
to a common cable. This topology most often serves as the backbone for a network. In some
instances, such as in classrooms or labs, a bus will connect small workgroups .
Tree Topology- This particular type of network topology is based on a hierarchy of nodes. The
highest level of any tree network consists of a single, 'root' node, this node connected either a
single (or, more commonly, multiple) node(s) in the level below by (a) point-to-point link(s).
These lower level nodes are also connected to a single or multiple nodes in the next level down.
Tree networks are not constrained to any number of levels, but as tree networks are a variant of
the bus network topology, they are prone to crippling network failures should a connection in a
higher level of nodes fail/suffer damage. Each node in the network has a specific, fixed number of
nodes connected to it at the next lower level in the hierarchy, this number referred to as the
'branching factor' of the tree.
Mesh Topology- The value of fully meshed networks is proportional to the exponent of the
number of subscribers, assuming that communicating groups of any two endpoints, up to and
including all the endpoints.
Fully connected network-A fully connected network is a communication network in which
each of the nodes is connected to each other. A fully connected network doesn't need to
use switching nor broadcasting. However, its major disadvantage is that the number
of connections grows quadratically with the number of nodes and so it is extremely impractical
for large networks. A two-node network is technically a fully connected network.
Partially connected- The type of network topology in which some of the nodes of the network
are connected to more than one other node in the network with a point-to-point link – this makes
it possible to take advantage of some of the redundancy that is provided by a physical fully
connected mesh topology without the expense and complexity required for a connection between
every node in the network.
Hub-A common connection point for devices in a network. Hubs are commonly used to
connect segments of a LAN. A hub contains multiple ports. When apacket arrives at one port, it is
copied to the other ports so that all segments of the LAN can see all packets.
A passive hub serves simply as a conduit for the data, enabling it to go from one device (or
segment) to another. So-called intelligent hubs include additional features that enables an
administrator to monitor the traffic passing through the hub and to configure each port in the hub.
Intelligent hubs are also called manageable hubs.
A third type of hub, called a switching hub, actually reads the destination address of each packet
and then forwards the packet to the correct port.
Bridge-A bridge is usually placed between two separate groups of computers that talk with each
other, but not that much with the computers in the other group. The job of the bridge is to
examine the destination of the data packets one at a time and decide whether or not to pass the
packets to the other side of the Ethernet segment. The result is a faster, quieter network with less
collisions. A bridge device filters data traffic at a network boundary. Bridges reduce the amount
of traffic on a LAN by dividing it into two segments. Bridges operate at the data link layer (Layer
2) of the OSI model. Bridges inspect incoming traffic and decide whether to forward or discard it.
Router-A router is a device that forwards data packets between computer networks, creating an
overlay internetwork. A router is connected to two or more data lines from different networks.
When a data packet comes in one of the lines, the router reads the address information in the
packet to determine its ultimate destination. Then, using information in its routing table or routing
policy, it directs the packet to the next network on its journey. Routers perform the "traffic
directing" functions on the Internet. A data packet is typically forwarded from one router to
another through the networks that constitute the internetwork until it reaches its destination node.
IP Address
An Internet Protocol address (IP address) is a numerical label assigned to each device (e.g.,
computer) participating in a computer network that uses the Internet Protocol for
communication. An IP address serves two principal functions: host or network
interface identification and location addressing.
The designers of the Internet Protocol defined an IP address as a 32-bit number and this system,
known as Internet Protocol Version 4 (IPv4), is still in use today. However, due to the enormous
growth of the Internet and the predicted depletion of available addresses, a new version of IP
(IPv6), using 128 bits for the address, was developed in 1995.IP addresses are binary numbers,
but they are usually stored in text files and displayed in human-readable notations, such as
172.16.254.1 (for IPv4), and 2001:db8:0:1234:0:567:8:1 (for IPv6).The Internet Assigned
Numbers Authority (IANA) manages the IP address space allocations globally and delegates
five regional Internet registries (RIRs) to allocate IP address blocks to local Internet
registries (Internet service providers) and other entities.
There are five classes of available IP ranges: Class A, Class B, Class C, Class D and Class E,
while only A, B, and C are commonly used. Each class allows for a range of valid IP addresses.
Below is a listing of these addresses.
Internet
What is Internet?
The Internet is a global system of interconnected computer networks that use the
standard Internet protocol suite (TCP/IP) to serve several billion users worldwide. It is a network
of networks that consists of millions of private, public, academic, business, and government
networks, of local to global scope, that are linked by a broad array of electronic, wireless and
optical networking technologies.
What is Intranet?
An intranet is a computer network that uses Internet Protocol technology to share information,
operational systems, or computing services within an organization. The term is used in contrast
to internet, a network between organizations, and instead refers to a network within an
organization.
What is Extranet?
An extranet is a computer network which allows controlled access from the outside, for specific
business or educational purposes. In a business-to-business context, an extranet can be viewed as
an extension of an organization's intranet that is extended to users outside the organization,
usually partners, vendors, and suppliers, in isolation from all other Internet users.
History of Internet
Owners of Internet
No one person, company, Institution or govt. organization owns the Internet. No one entity
governs it or even has a controlling interest. The internet is truly a collaborative, collective
enterprise-
The World Wide Web Consortium (W3C)sets the standards for HTML and other
specifics of the web.
The Internet Engineering Task Force (IETF) focus on the evolution of the Internet with a
specific eye toward keeping the Internet running smoothly as a whole.
The Internet Engineering Steering Group(IESG)is a related organization responsible for
managing IETF activities and the Internet Standard process.
The Internet Architecture Board (IAB) is responsible for defining the overall architecture
of the internet(the backbone and all the networks attached to it).Providing guidance and
broad direction to the IETF.
The Internet Society (ISOC) is supervisory organization made up of individuals,
corporations, nonprofit organizations and govt. agencies from the internet community.
The group comments on Internet policies and practices and oversees a number of other
boards and task forces-including the IAB and IESG dealing with Internet policy issues.
The Internet Assigned Numbers Authority (IANA) and the Internet Network Information
Center (InterNIC) lead the organization, responsible for assigning IP addresses and
domain names respectively.
A simple syntax.
A system that can be created quickly and inexpensively.
Extending the file system metaphor, such as searches.
Gopher combines document hierarchies with collections of services, including WAIS,
the Archie and Veronica search engines, and gateways to other information systems such as
FTP and Usenet.
8. Veronica-Very Easy Rodent oriented Netwide Index to Computer Archives, is a program that
allowed you to search the files of the Internet's Gopher servers for a particular search string.
Like Archie, Veronica's equivalent program for FTP servers, Veronica is an indexing spider that
visits the Gopher sites, reads the entire directory and files names, and then indexes them in one
large index.
9. Internet Relay Chat-Internet Relay Chat (IRC) is a protocol for live interactive Internet text
messaging (chat). It is mainly designed for group communication in discussion forums,
called channels, but also allows one-to-one communication via private message as well as chat
and data transfer, including file sharing. IRC was created by Jarkko Oikarinen in August 1988.
10. News Group (USENET)- Usenet is one of the oldest computer network communications
systems still in widespread use. It was conceived in 1979 and publicly established in 1980.
Usenet is a worldwide distributed Internet discussion system, public messaging and bulletin
board system.
11. WWW-The World Wide Web (abbreviated as WWW or W3, commonly known as the web),
is a system of interlinked hypertext documents accessed via the Internet. With a web browser, one
can view web pages that may contain text, images, videos, and other multimedia,
and navigate between them via hyperlinks.
1989-1990 – Tim Berners-Lee invents the World Wide Web, employee of the CERN (European
Council for Nuclear Research)near Geneva, Sir Tim Berners-Lee, now Director of the World
Wide Web Consortium (W3C), wrote a proposal in March 1989 for what would eventually
become the World Wide Web is a
In 1994 – Mark Andresen invents MOSAIC at National Center for Super Computing
Applications (NCSA)
WWW Components
– Structural Components
– Clients/browsers – to dominant implementations
– Servers – run on sophisticated hardware
– Caches – many interesting implementations
– Internet – the global infrastructure which facilitates data transfer
– Semantic Components
– Hyper Text Transfer Protocol (HTTP)- The Hypertext Transfer Protocol (HTTP) is
an application protocol for distributed, collaborative, hypermedia information systems.
HTTP is the foundation of data communication for the World Wide Web. Hypertext is a
multi-linear set of objects, building a network by using logical links called hyperlinks
between the nodes (e.g. text or words). HTTP is the protocol to exchange or transfer
hypertext. The standards development of HTTP was coordinated by the Internet
Engineering Task Force (IETF) and the World Wide Web Consortium (W3C).
– Hyper Text Markup Language (HTML)- Hyper Text Markup Language (HTML) is
the main markup language for creating web pages and other information that can be
displayed in a web browser. HTML elements form the building blocks of all websites. It
provides a means to create structured documents by denoting structural semantics for text
such as headings, paragraphs, lists, links, quotes and other items. It can
embed scripts written in languages such as JavaScript which affect the behavior of
HTML web pages. SGML (Standard Generalized Markup Language) is a standard
for how to specify a document markup language or tag set. SGML is not in itself a
document language, but a description of how to specify one. It is metadata.
Hypertext Markup Language (HTML), is an example of an SGML-based language.
eXtensible Markup Language (XML)- Extensible Markup
Language (XML) is a markup language that defines a set of rules for
encoding documents in a format that is both human-
readable and machine-readable. The design goals of XML emphasize
simplicity, generality, and usability over the Internet. It is a textual data
format with strong support via Unicode for the languages of the world.
Although the design of XML focuses on documents, it is widely used for
the representation of arbitrary data structures, for example in web
services.
Uniform Resource Identifiers (URIs)- URL stands for Uniform Resource Locator. A
URL is a formatted text string used by Web browsers, email clients and other software to
identify a network resource on the Internet. Network resources are files that can be plain
Web pages, other text documents, graphics, or programs.
URL strings consist of three parts (substrings):
1. Network protocol
2. Host name or address
3. File or resource location
URL Protocol -The 'protocol' substring defines a network protocol to be used to access a
resource. These strings are short names followed by the three characters '://' (a simple naming
convention to denote a protocol definition). Typical URL protocols include http://, ftp://,
and mailto://.
The term web server can refer to either the hardware (the computer) or the software (the computer
application) that helps to deliver web content that can be accessed through the Internet. The most
common use of web servers is to host websites, but there are other uses such as gaming, data
storage or running enterprise applications .The world's first web server, later known as CERN
httpd, which ran on NeXTSTEP.
Web Browser
Web Browser is a program used to view pages and navigate the WWW. Web Browser
sometimes referred to internet ‘Navigation Tools’. A web browser (commonly referred to as
a browser) is a software application for retrieving, presenting and traversing information
resources on the World Wide Web. An information resource is identified by a Uniform
Resource Identifier (URI) and may be a web page, image, video or other piece of
content. Hyperlinks present in resources enable users easily to navigate their browsers to
related resources. A web browser can also be defined as an application software or program
designed to enable users to access, retrieve and view documents and other resources on the
Internet.
NCSA Mosaic was the first browser, developed at the National Center for
Supercomputing Applications (NCSA).
Internet Explorer
Mozilla Firefox (which was developed from Mozilla (the open source version of
Netscape)).
Opera(a fast and stable browser that's compatible with most relatively operating systems)
Safari (a browser for Apple computers (at this writing, the third most popular browser).
Google Chrome
Konqueror
Arora
Dillo
Kazekhase
Amaya
NetPositive
QNX Voyager
Planetweb
Netscape
Lunascape
Flock (an open source browser based on Firefox and optimized for Web 2.0 features such
as blogging and social bookmarking .
Bookmark-In the context of the World Wide Web, a bookmark is a Uniform Resource
Identifier (URI) that is stored for later retrieval in any of various storage formats. All
modern web browsers include bookmark features. Bookmarks are called favorites or
Internet shortcuts in Internet Explorer.
History-As you browse the Internet, each of the items you view are saved locally on your
hard drive. This helps web pages you visit frequently load faster by loading the files from
your hard drive instead of having to downloading the web page again.
The Domain Name System (DNS) is a hierarchical distributed naming system for computers,
services, or any resource connected to the Internet or a private network. It associates various
information with domain names assigned to each of the participating entities. Most
prominently, it translates easily memorized domain names to the numerical IP
addresses needed for the purpose of locating computer services and devices worldwide. By
providing a worldwide, distributed keyword-based redirection service, the Domain Name
System is an essential component of the functionality of the Internet.
DNS architecture is a hierarchical distributed database and an associated set of protocols that
define:
The Domain Name System is implemented as a hierarchical and distributed database containing
various types of data, including host names and domain names. The names in a DNS database
form a hierarchical tree structure called the domain namespace. Domain names consist of
individual labels separated by dots, for example: mydomain.microsoft.com.
A Fully Qualified Domain Name (FQDN) uniquely identifies the host’s position within the DNS
hierarchical tree by specifying a list of names separated by dots in the path from the referenced
host to the root.
Search Engine
A web search engine is a software system that is designed to search for information on
the World Wide Web. The search results are generally presented in a line of results often referred
to as search engine results pages (SERPs). The information may be a specialist in web pages,
images, information and other types of files. Some search engines also mine data available
in databases or open directories.
Example of search engine
Google.com
Ask.com
Yahoo.com
Bing.com
TripleMe.com
Shopzilla.com
Altavista.com
Webcrawler.com
Hotbot
Lycos etc.
Search agent-The web search agent can be referred as Web hunter. These programs
used by the search engines to access your web pages are called ‘spiders’, ‘crawlers’, ‘robots’ or
‘bots’. There are few parameters that should be defined for the web hunter. It should know the
target (i.e. the keyword or the phrase), where to start?, how many iterations of the target to find
(the more URLs the better),how long to look (time constraint) and by what method should it
choose paths (search methods).These issues need to be addressed by the software.
Meta search Engine-A meta search engine is a search tool that sends user requests to
several other search engines and/or databases and aggregates the results into a single
list or displays them according to their source. Metasearch engines enable users to enter
search criteria once and access several search engines simultaneously.
To send and receive e-mail messages you can use an e-mail program, also known as an e-mail
client such as Microsoft Outlook or Mozilla Thunderbird. When using an e-mail client you must
have a server that stores and delivers your e-mail this service is provided by your ISP but can also
be a service provided by another company. The e-mail client will connect to the server to
download all new e-mail and deliver any unsent e-mail. An alternative way of sending and
receiving e-mail and a more popular solution for most people is an online e-mail service
or webmail such as Hotmail, Gmail, and Yahoo Mail. Many of the online e-mail services
including the above examples are free or have a free account option.
The basic function involved in an email system are the message creation ,message transfer and
post-delivery processing. These are provided by the User Agent(UA) and a Message Transfer
Agent(MTA).
The UA is responsible for providing the text editing and proper presentation services to the end
user. It provides for other activities such as user friendly interaction ,security, priority provision,
delivery notification and distribution subsets.
The MTA is oriented towards the actual routing of the electronic move. It is responsible primarily
for the store and forward path, channel security and the actual routing through communication
media. Several MTAs taken together form the Message Transfer system Network.
E-mail Structure
An e-mail message usually in ASCII text format. Email can attach pictures, executable programs,
sound, video, and other binary files to your e-mail message. There are five sections of an e-mail
message
E-mail address
Header
The header of e-mail message is the uppermost section.it displays information regarding
the status of the messages. Header fields in an e-mail are
– To: field is where you type the e-mail address of who you are sending the e-mail address.
– Subject: Line shows the subject of the message. This is a short description i.e. typed by
the person who composed the message. If the subject starts with the letter Re: it indicates
that the message is a response to previous message.
– CC: or Carbon Copy field allows you to send a copy of the message to another e-mail
address, but is not a required field.
– BCC: or Blind carbon copy- in this option the recipient of the first e-mail copy does not
come to know the name of the other recipients, who receive the carbon copies of the
same message.
– From or Reply: To is a field that is automatically filled out and is where the e-mail will
return if a reply is made.
Body
The message body will be the location you type your message, it contains the actual
message.
Signature(optional)
The signature for an e-mail message is the personal information which automatically
appears at the bottom of the outgoing message.
Attachments(optional)
It allows users to attach a file to any e-mail message .Any file format such as word-
processing documents, spreadsheets, images or video files etc.
Email Protocols
SMTP-Simple Mail Transfer Protocol (SMTP) is an Internet standard for electronic mail (e-
mail) transmission across Internet Protocol (IP) networks. SMTP is a connection-oriented, text-
based protocol in which a mail sender communicates with a mail receiver by issuing command
strings and supplying necessary data over a reliable ordered data stream channel, typically
a Transmission Control Protocol (TCP) connection.
POP-the Post Office Protocol (POP) is an application-layer Internet standard protocol used by
local e-mail clients to retrieve e-mail from a remote server over a TCP/IP connection. POP
supports simple download-and-delete requirements for access to remote mailboxes (termed mail
drop in the POP. Although most POP clients have an option to leave mail on server after
download, e-mail clients using POP generally connect, retrieve all messages, store them on the
user's PC as new messages, delete them from the server, and then disconnect.
Internet Security
Many security systems based on encryption and firewalls are available and absolutely
impenetrable network system remains a faraway.
Authentication
Authentication is the act of confirming the truth of an attribute of a datum or entity. This might
involve confirming the identity of a person or software program, tracing the origins of an artifact,
or ensuring that a product is what its packaging and labeling claims to be. Authentication often
involves verifying the validity of at least one form of identification.
Cryptography
Cryptography is a term with Greek origin means “secret writing”. Cryptography refers to the
science and art of transforming messages to make them secure and immune to attacks. The
original message before being transformed is called plain text. After the message is transformed,
it is called cipher text. An encryption algorithm transform the plain text in to cipher text ;
decryption algorithm transform the cipher text back into plain text. The sender uses encryption
algorithm and the receiver uses decryption algorithm.
Cryptography algorithm (ciphers) divided into two categories:
1. Symmetric Key (also called secret key) cryptography algorithm-In symmetric key
cryptography, the same key is used by the sender (for encryption) and the receiver (for
decryption).The key is shared.
Algorithm: Stream algorithm, Block algorithm
2. Asymmetric Key (also called public key) cryptography algorithm-In asymmetric or
public key cryptography there are two keys: private key and a public key. The private key
is kept by receiver. The public key is announced to the public.
Algorithm: RSA (Named after Rivest, Shamir and Adleman) algorithm, Diffie-hellman algorithm
Digital signature
A digital signature is basically a way to ensure that an electronic document (e-mail, spreadsheet,
text file etc.) is authentic. Authentic means that you know who created the document and you
know that it has not been altered in any way since that person created it. Digital signature relies
on certain types of encryption to ensure authentication. Encryption is the process of taking all the
data that one computer is sending to another and encoding it into a form that only the other
computer will be able to decode. Authentication is the process of verifying that information is
coming from a trusted source.
Digital certificate
The most common use of digital certificate is to verify that a user sending a message is who he or
she claims to be, and to provide the receiver with the means to encode a reply. An individual
wishing to send an encrypted message applies for a digital certificate from a Certificate Authority
(CA). The CA issues an encrypted digital certificate containing the applicant’s Public Key and a
variety of other identification information. The recipient of an encrypted message uses the CA’s
public key to decode the digital certificate attached to the message ,verifies it as issued by the CA
and then obtains the sender’s public key and identification information held within the certificate.
With this information, the recipient can send an encrypted reply.
The most widely used standard for digital certificates is X.509.
Firewall
There are many mechanism available for firewall implementation .Each one has its own
advantage and drawback. Selection of the right type of firewall depends on an organization policy
and requirement.
Firewall act as a gatekeeper between a company’s internal network and the outside world. It act
as an electronic barrier to stop unauthorized entry. A firewall basically perform two important
functions-
1. Gatekeeping-Firewall act as a gatekeeper between the companies internal network and the
outside network. It examines the location from which the data enters your system and the decides,
based on your instruction whether or not to allow that information.
2. Monitoring-monitoring is one of the most important aspects of firewall design. Monitoring
can be active or passive.
In active monitoring a firewall notifies the manager whenever are incident occur via email or a
paper about suspicious online activity.
In passive monitoring a firewall locks a record of each incident in a file or disk. Then a manager
can analyze the log file periodically to determine whether attempts to access the organization’s
information have increased or decreased overtime.
Types of firewall
Packet Filtering-In this type the source and destination address and ports of incoming
TCP & UDP packets are examined and packets are denied or allow to enter based on a set
of predefined rules.
Application Gateway also called Proxy Server-In application gateway firewall product
used application proxy. These are written for specific internet services that run on a
server with two network connection, acting as a server to the application client and as a
client to the application server.
IP Sec- is a collection of protocols designed by the IETF to provide security for a packet at the
network level. IP Sec helps to create authenticated and confidential packets for the IP layer.
Cryptographic algorithms defined for use with IP Sec include:
HMAC-SHA1 for integrity protection and authenticity.
Triple DES-CBC for confidentiality.
AES-CBC for confidentiality.
Computer Crime
Computer crime refers to any crime that involves a computer and network. The Netcrime refers
to criminal exploitation of the internet. Cybercrimes are defined as “offences that are committed
against individuals or groups of individuals with a criminal motive to intentionally harm the
reputation of the victim or cause physical or mental harm to the victim directly or indirectly
,using modern telecommunication networks. Crime such as cracking, copyright infringement,
child pornography and child grooming, privacy when confidential information is lost or
intercepted, lawfully or otherwise may threaten a nation’s security and financial health.
Crimes that primarily target computer networks or devices include:
Computer viruses-A computer virus is a computer program that can replicate itself and
spread from one computer to another. A computer virus is an executable program.
Depend on the nature of a virus, it may cause damage of your hard disk contents, and/or
interfere normal operation of your computer. By definition, a virus program is able to
replicate itself. This means that the virus multiplies on a computer by making copies of
itself. This replication is intentional; it is part of the virus program. In most cases, if a file
that contains virus is executed or copied onto another computer, then that computer will
also be "infected" by the same virus.
When a virus is introduced to a computer system, it can attach itself to, or sometimes even
replace, an existing program. Thus, when the user runs the program in question, the virus is also
executed. This usually happens without the user being aware of it. A virus program contains
instructions to initiate some sort of "event" that affects the infected computer. Each virus has an
unique event associated with it. For examples:
– File virus: Most viruses fall into this category. A virus attaches itself to a file, usually a
program file.
– Boot sector virus: These viruses infect floppy and hard drives. The virus program will
load first, before the operating system.
– Macro Virus: This is a new type of virus that use an application's own macro
programming feature to distribute themselves. Unlike other viruses, macro viruses do not
infect programs; they infect documents.
– Virus Hoax: Although there are thousands of viruses discovered each year, there are still
some that only exist in the imaginations of the public and the press - known as virus
hoaxes. These viruses hoaxes DO NOT EXIST, despite rumor of their creation and
distribution.
Software such as anti-virus, anti-malware, and firewalls are relied upon by users at home,
small and large organizations around the globe to safeguard against malware attacks
which helps in identifying and preventing the further spread of malware in the network.
Crimes that use computer networks or devices to advance other ends include:
Cyberstalking-cyberstalking is the use of the Internet or other electronics means to stalk or
harass an individual, a group of individuals or an organization. It may include false
accusations, monitoring making threats identity theft, damage to data or equipment, the
solicitation of minors for sex or gathering information in order to harass.
Fraud and identity theft-computer fraud is any dishonest misrepresentation of fact
intended to let another to do or refrain from doing something which causes loss
Cyber terrorism-cyber terrorism is an act of terrorism committed through the use of
cyberspace or computer resources.
Phishing scams-is a way of attempting to acquire information such as username,
passwords and credit card details by masquerading as a trustworthy entity in an
electronic communication.
Legal aspects
Patent Law-The law of patents is a legal framework that establishes a patent system which supports and
encourages technological innovation and promotes economic development. A patent is not a right to
practise or use the invention. Rather, a patent provides the right to exclude others from making,
using, selling, offering for sale, or importing the patented invention for the term of the patent,
which is usually 20 years from the filing date subject to the payment of maintenance fees. A
patent is a limited property right the government gives inventors in exchange for their agreement
to share details of their inventions with the public. Like any other property right, it may be sold,
licensed, mortgaged, assigned or transferred, given away, or simply abandoned.
Copyright- designated by © (the circled capital letter "C"), Copyright is a legal concept, enacted
by most governments, giving the creator of an original work exclusive rights to it, usually for a
limited time. Generally, it is "the right to copy", but also gives the copyright holder the right to be
credited for the work, to determine who may adapt the work to other forms, who may perform the
work, who may financially benefit from it, and other related rights.