Вы находитесь на странице: 1из 24

In the name of Allah, the most Beneficent and the most Merciful

MEMBERS

Hamad Nadeem(062)
Maryam(015)
Isha(017)
Zaigham (002)

From: BS% Adp Abdullah(075)


1st Semester
NETWORKING | WEB | PROTOCOLS | SECURITY
MAIN TOPICS

Network Fundamentals Network | Uses | Classification | Topology

World Wide Web


Web| Browser | URL | Client-side Server-Side

Security
NETWORKING

➢ Definition
A network two or more computers that are linked in order to share resources

➢ Uses
Share Data or Files

Share Resources i.e. Printer

Send / Receive Emails

One Copy of Software can be Shared


TYPES

Local Area Network (LAN)

Speed: 10 Mbps to 1000 Mbps


Example: Private Network in a Building

Uses & Advantages

❖ One copy of software can be shared


❖ System resources can be shared
❖ Data is more secured
TYPES

Metropolitan Area Network (MAN)

Speed: 44 Mbps to 155 Mbps


Example: Cable Network in a City / State

Uses, Advantages & Disadvantages

❖ Connect entire city


❖ Connect two or more LANs
❖Higher data transfer speed
❖ More expensive
❖Difficult to maintain
TYPES

Wide Area Network (WAN)

Speed: 56Mbps to 50 Mbps


Example: Internet

Uses, Advantages & Disadvantages

❖ Connect with telephone lines


❖ Connects two or more LANs or WANs
❖ Lower data transfer speed
NETWORKING

Topology
Way to connect computers in a network OR Arrangement of computers in a network

Bus Topology

Star Topology

Ring Topology

Mesh Topology
NETWORKING

Bus Topology Star Topology


NETWORKING

Ring Topology Mesh Topology


DESCRIPTION

World Wide Web


The World Wide Web (www) is a huge collection of documents called web pages written in HTML
(Hyper Text Mark-up Language). These pages are linked to each other by hyperlink. When a hyperlink
takes you to a picture or a video, it is known as hypermedia.

The World Wide Web (www) was created in 1990 at CERN Switzerland, at the European Laboratory
for Particles Physics by a young scientist Tim Berners Lee. The world wide web is now managed by a
committee which is known as the World Wide Web Consortium (W3C)

A Website is a collection of related web pages.


A Web Server is a computer that delivers requested Web pages to
your computer
DESCRIPTION

Web Browsers
A Web Browser is an application that can read web pages written in Hyper Text Mark-up Language
(HTML). Browsing is using browser software to visit different websites on the World Wide Web.

Some Popular Web Browsers


➢ Google Chrome
➢ Internet Explorer
➢ Safari
➢ Opera
DESCRIPTION

Uniform Resource Locator (URL)


Every website on Internet has a unique address known as its URL. These are the web address.
The resource locator is an addressing system.

Examples
➢ https://www.youtube.com/
➢ https://mcom.pgc.edu.pk/
DESCRIPTION

Address Bar
All web browsers have an address bar. This is where we type URL or the address of the website you
want to visit.
When you enter the URL in the browser’s address bar, it causes Homepage of the site to appear.
DESCRIPTION

Creating a Web Page


The two basic steps required in making a web page:

➢ Create a HTML file


➢ Upload file to server

Web pages are generally sets of text files coded with special
notation called HTML that is interpreted by a web browser
program reading the file.
DIFFERENCE

Internet
Internet is a global system of interconnected computer network

Communicates with each other through TCP/IP

World Wide Web (www)


It is one of the services that run on internet

www is a system of interlinked hypertext documents accessed via Internet


Way of accessing information
ACTIVITIES

Client-side Activity
The client-side environment used to run scripts is usually a browser. The processing takes place on
the end users computer. The source code is transferred from the web server to the users computer
over the internet and run directly in the browser.

Server-side Activity
The server-side environment that runs a scripting language is a web server. A user's request is fulfilled
by running a script directly on the web server to generate dynamic HTML pages. This HTML is then
sent to the client browser. It is usually used to provide interactive web sites that interface to databases
or other data stores on the server.
ENCRYPTION

SECURITY
Network security is the process of taking physical and software preventative measures to protect
the underlying networking infrastructure from unauthorized access and misuse.

Computer emergency response team


In November 1988 a worm released into the Internet caused significant disruption of service.
Consequently, the U.S. Defense Advanced Research Projects Agency (DARPA) formed the Computer
Emergency Response Team (CERT).
TYPES

There are numerous ways that a computer system and its contents can be attacked via network
connections. Many of these incorporate the use of malicious software (collectively called malware).

FORMS OF ATTACK
➢ Virus
➢ Worms
➢ Trojan Horse
➢ Spyware
TYPES

virus
A virus is software that infects a computer by inserting itself into programs that already reside in
the machine. Then, when the “host” program is executed, the virus is also executed.

worms
A worm is an autonomous program that transfers itself through a network, taking up residence in
computers and forwarding copies of itself to other computers. A worm degrades the performance
of applications in entire network.

Trojan horse
A Trojan horse is a program that enters a computer system disguised as a desirable program, such
as a game or useful utility package, that is willingly imported by the victim.

spyware
Spyware (sometimes called sniffing software) which is a software that collects information about
activities at the computer. In other case, spyware is used for malicious purpose such as recording
the symbol sequence typed at the keyboard in search of passwords or credit card numbers.
PROTECTION

firewall
A primary prevention technique is to filter traffic passing through a point in the network, usually
with a program called a firewall.

Protection & cure


❖ Install any anti-virus program in your computer system
❖ Install proxy server software
❖ Don’t open SPAM in your emails
❖ Do not attach infected USB drives with your PC
DATA GATHERING

https://blog.udemy.com/lan-wan-man/
http://www.omnisecu.com/basic-networking/lan-and-wan-local-area-network-and-wide-area-network.php
https://www.slideshare.net/mohakvjain/presentation-on-world-wide-web-www
https://www.slideshare.net/SaranshArora9/www-or-world-wide-web
https://www.slideshare.net/wallypitt/technology-35765998
https://www.sqa.org.uk/e-learning/ClientSide01CD/page_18.htm
THE END

Very Thankful To: MamRimsha


Hamad
Presentation By: Maryam
Zaigham
Abdullah
Isha

Вам также может понравиться