Вы находитесь на странице: 1из 120

MS 102

MODULE 3 : LECTURE 1
COMPUTER NETWORKS AND INTERNET

1/29/2020 1
Outline

 Computer Networks
 Network Topologies
 The Internet
 Network Applications

1/29/2020 2
COMPUTER NETWORK

 A network is a group of two or more personal co


mputers or devices linked together.
 A network is simply a collection of computers or
other hardware devices that are connected togeth
er, either physically or logically, using special ha
rdware and software, to allow them to exchange
information and cooperate.

1/29/2020 3
Computer Networks

 Two computers

Three computers Many computers

1/29/2020 4
What is a Computer network?

 The connection may be


in a wired or wireless 192.168.1.2
environment
192.168.1.1
 Each computer on a
network is identified by
a unique number called
an IP address.
192.168.1.3

192.168.1.5
192.168.1.4
1/29/2020 5
Connecting Computers

 Can be connected in two ways:


 Wired connection:
 UTP Cables,
 coaxial cables,
 fiber optic cables

 Wireless connection
 Access points

1/29/2020 6
Connecting Computers

UTP Cable
Coaxial Cable

Optic Fiber Cable Wireless Router


1/29/2020 7
Connecting Computers

 Wired
connection

 Wireless
Connection

1/29/2020 8
Computer Networks

 A network

1/29/2020 9
Components of a Computer Net
wk
 There are five component in a computer n
etwork.

10
Components of a Computer Net
wk
1. Sender: Message source
2. Message: Message to be transferred
3. Channel: Path through which message pas
ses
4. Protocol: A set of rules that governs com
munication over a network
5. Receiver: Message recipient

11
What is a protocol?

 A protocol is a set of rules that governs commun


ications between computers on a network.
 In order for two computers to talk to each other,
they must be speaking the same language.
 Many different types of network protocols and st
andards are required to ensure that your compute
r can communicate with another computer locate
d on the next desk or half-way around the world.

1/29/2020 12
Common Communication Protocols

 Hypertext transfer protocol (HTTP) is a method


of transmitting the information on the web.
 HTTP basically publishes and retrieves the HTT
P pages on the World Wide Web.
 HTML is a language that is used to communicat
e between the browser and web server. The infor
mation that is transferred using HTTP can be pla
in text, audio, video, images, and hypertext.

1/29/2020 13
Common Communication Protocols

 File Transfer Protocol (FTP) or file transfer protocol is u


sed to transfer (upload/download) data from one comput
er to another over the internet or through or computer net
work.
 FTP is a most commonly communication protocol for tra
nsferring the files over the internet.

1/29/2020 14
Common Communication Protocols

 Internet Protocol (IP): is a protocol by which data is sent


from one computer to another on the Internet.
 Each computer (known as a host) on the Internet has at l
east one IP address that uniquely identifies it from all oth
er computers on the Internet.
 When you send or receive data (for example, an e-mail n
ote or a Web page), the message gets divided into little c
hunks called packets.
 Each of these packets contains both the sender's Internet
address and the receiver's address.

1/29/2020 15
Types of Computer Networks

 Computer networks can be classified based


on
 size of network (geographical locations),
 structure and

 mode of connectivity.

1/29/2020 16
Types of Computer Networks

A. Structure and Relationship


Computer networks can involve two or more comp
uters.
When only two computers are networked, they for
m peer-to-peer networking.
The resources which are shared are those found in
the two shared computers.
Peers are both suppliers and consumers of the reso
urces
1/29/2020 17
Types of Computer Networks

 Peer to peer network

1/29/2020 18
1. Peer-to-Peer Networks

 A peer-to-peer network is suitable for small


offices where there are only 3-4 machines o
n the network.
 One disadvantage is that, if one workstation
is switched off, the files on that station cann
ot be accessed from the rest of the network.

1/29/2020 19
Peer-to-Peer Networks

 Each workstation communicates directly wit


h every other workstation, without going thr
ough a server.
 Security is not centrally controlled.
 Backup is the responsibility of individual us
ers.
 This type of network is less expensive.

1/29/2020 20
Types of Computer Networks

Client –server network


Client-server model is possible in which onl
y one or more servers is/are selected to be sou
rce of supply resources to the client computers

1/29/2020 21
2. Client-Server Networks

 A client/server network is a system where o


ne or more computers called clients connect
to a central computer named a server to shar
e or use resources.
 Different devices on the network are treated
as clients or servers.
 The client devices send requests for service
e.g. printing or retrieval of data.
1/29/2020 22
Client-Server Networks

The server devices can be peripherals such as


a printer, or it can be the file server itself.
If the server goes down, everyone is affected
.

1/29/2020 23
Types of Computer Networks

B. Network Size or Geographical Location


Computer networks can be classified by the area (
geographical) they cover.
Networked computers in a room cover a small area
and are classified differently from networked comput
ers covering the whole city or a country.
This type of classification results involves
 Local Area Network (LAN),
 Metropolitan Area Network (MAN), and
 Wide Area Network (WAN).
1/29/2020 24
Types of Computer Networks

Local Area Network (LAN)


Computer network covers a small area such
as a room, home, school or office building.
It is useful for sharing resources like files, p
rinter, scanner, games, and other applications.
Its speed is very high.

1/29/2020 25
TYPES OF NETWORKS

 LAN

1/29/2020 26
TYPES OF NETWORKS

Advantages of LAN Networks


 Resources (e.g. printers, scanners, modems) can be sha
red
 Information can be shared (e.g. transfer of files, an Intr
anet)
 Applications can be installed on one computer and be
made available across a network
 E-mail can be sent between users
 Easy to set up new users and equipment
 Different types of computer can communicate with eac
h other
1/29/2020 27
TYPES OF NETWORKS

Disadvantages of LAN Networks


 Users are dependant on the server. If this fails, cer
tain applications or hardware devices may not be a
vailable
 A badly managed network is worse than a standalo
ne machine. Much depends on the skill of the net
work manager.
 Networks have more security issues than standalon
es (e.g. hackers)
 Network traffic can degrade performance
1/29/2020 28
Types of Computer Networks

Metropolitan Area Network (MAN)


A computer network that covers the whole
metropolitan area.
For example a computer network covering t
he whole city of Dar es Salaam.

1/29/2020 29
TYPES OF NETWORKS

 MAN

1/29/2020 30
Types of Computer Networks

Wide Area Network (WAN)


Computer network that is not restricted in a
geographical area it covers large area such as t
he whole country, or different continents.
For example, the Internet is a public WAN.
Big private companies like Microsoft, IBM,
etc. have their own private WAN.

1/29/2020 31
TYPES OF NETWORKS

 WAN

1/29/2020 32
Types of Computer Networks

C. Mode of Connectivity
Basing on the modes of connectivity, a computer netw
ork includes wireless networks and wired networks.
Wired network is using UTP cable for networking in s
mall area.
For long distance connectivity Fibre Optic Cable (FOC
) facilitates the connectivity is used.
In wireless networks, the transmission of signals is don
e without the presence of physical wire.

1/29/2020 33
Advantages of Computer Networ
ks

1. Connectivity and Communication


2. Data Sharing
3. Hardware Sharing
4. Internet Access.
5. Internet Access Sharing
6. Data Security and Management:
7. Performance Enhancement and Balancing
8. Entertainment

1/29/2020 34
NETWORK TOPOLOGIES

 Physical layout of computers on a network


 Three fundamental shapes:
 Bus
 Ring
 Star
 May create hybrid topologies
 Topology integral to type of network, cabling infra
structure, and transmission media used

1/29/2020 35
NETWORK TOPOLOGIES

Bus
 Single cable connects all network nodes without in
tervening connectivity devices
 Devices share responsibility for getting data from o
ne point to another
 Terminators stop signals after reaching end of wire
 Prevent signal bounce
 Inexpensive, not very scalable
 Difficult to troubleshoot, not fault-tolerant
1/29/2020 36
NETWORK TOPOLOGIES

Bus topology

1/29/2020 37
NETWORK TOPOLOGIES

 Advantages of Bus Topology


 Works well for small networks
 Relatively inexpensive to implement
 Easy to add to it

1/29/2020 38
NETWORK TOPOLOGIES

 Disadvantages of
Bus Topology
 Management costs can be high
 Potential for congestion with network traffic

1/29/2020 39
NETWORK TOPOLOGIES

Ring Topology

1/29/2020 40
NETWORK TOPOLOGIES

Advantages of Ring Topology


 Easier to manage; easier to locate a defectiv
e node or cable problem
 Well-suited for transmitting signals over lon
g distances on a LAN
 Handles high-volume network traffic
 Enables reliable communication
1/29/2020 41
NETWORK TOPOLOGIES

Disadvantages of Ring Topology


 Expensive
 Requires more cable and network equipment
at the start
 Not used as widely as bus topology
 Fewer equipment options
 Fewer options for expansion to high-speed com
munication
1/29/2020 42
NETWORK TOPOLOGIES

Star Topology

1/29/2020 43
NETWORK TOPOLOGIES

 Every node on the network is connected through a cent


ral device

1/29/2020 44
NETWORK TOPOLOGIES

 Any single cable connects only two devices


 Cabling problems affect two nodes at most
 Requires more cabling than ring or bus networks
 More fault-tolerant
 Easily moved, isolated, or interconnected with oth
er networks
 Scalable
 Supports max of 1024 addressable nodes on logica
l network
1/29/2020 45
NETWORK TOPOLOGIES

Advantages of Star Topology


 Good option for modern networks
 Low startup costs
 Easy to manage
 Offers opportunities for expansion
 Most popular topology in use; wide variety
of equipment available
1/29/2020 46
NETWORK TOPOLOGIES

Disadvantages of Star Topology


 Hub is a single point of failure
 Requires more cable than the bus

1/29/2020 47
THE INTERNET

 The Internet is a global network of computer net


works. Sometimes called the Net
 It is a collection of thousands of computers conn
ected together worldwide, that connect the gover
nments, people and companies all over the world
 Each of these networks contains anywhere from
two to thousands of computers that are linked to
gether using special rules called protocols.

1/29/2020 48
Internet- A brief History

 Started as a research project to connect computers


together with packet switched networks.
 Internet was born in 1969 - called ARPANET
 1969 ARPANET connected computers at Univ of
California (LA), Stanford Univ, Univ of California
(SB), Univ. of Utah
 4 nodes were connected

1/29/2020 49
Internet- A brief History

 1971:15 nodes (23 hosts) on ARPANET.


 E-mail invented -- a program to send messages
across a distributed network.
 1973: First international connections to the
ARPANET: University College of London (
England) and Royal Radar Establishment (N
orway)

1/29/2020 50
Internet- A brief History

 1977:E-mail takes off, Internet becomes a


reality
 Number of hosts breaks 100.
 1984:Number of hosts breaks 1,000.
 1987: Number of hosts 28,000
 1989: Number of hosts breaks 100,000

1/29/2020 51
Internet- A brief History

 The web exploded


 1994 – 3.2 million hosts and 3,000 websites
 1995 – 6.4 million hosts and 25,000 websites
 1997 – 19.5 million hosts and 1.2 million website
s
 January 2001 – 110 million hosts and 30 million
websites

1/29/2020 52
Internet - World Usage

1/29/2020 53
Internet Usage- Tanzania

 The estimated number of Internet users in T


anzania by June 2013 according to TCRA re
port was 21% (9.3 million users)

1/29/2020 54
Uses of Internet

1. Email: communication in a fraction of seconds


with a person who is sitting in the other part of
the world.
2. Information: the internet is flooded with inform
ation.
3. Business: World trade has seen a big boom with
the help of the internet,
4. Social Networking: Today social networking sit
es have become an important part of the online
community.
5. Shopping: . Nowadays almost anything can be
bought with the use of the internet.
1/29/2020 55
Uses of Internet
6. Entertainment: all forms of entertainment from watchi
ng films to playing games online.
7. E-Commerce: business deals that involve the transfer o
f information across the globe via internet.
8. Services: Many services are now provided on the intern
et such as online banking, job seeking, purchasing ticke
ts for your favorite movies,
9. Job Search: there are plenty of job sites which connect
employers and job seekers.
10. Dating/Personals: Internet not only helps to find the ri
ght person but also to continue the relationship.

1/29/2020 56
Common Internet Terms

 Hypertext Markup Language (HTML) is a


language used to create web pages
 A markup language is a modern system f
or annotating a document in a way that is s
yntactically distinguishable from the text.

1/29/2020 57
Common Internet Terms

 World wide web (www) is a system of int


erlinked hypertext documents accessed via
the Internet
 The documents are formatted in a markup
language called HTML (HyperText Marku
p Language) that supports links to other d
ocuments, as well as graphics, audio, and
video files.
1/29/2020 58
Common Internet Terms

 Web page: A web page or webpage is a docume


nt or information resource that is suitable for th
e World Wide Web and can be accessed through
a web browser and displayed on a monitor or mo
bile device.
 It is written in a markup language called HTML
 Typically, it contains text, pictures, sound, video
and hyperlinks

1/29/2020 59
Common Internet Terms

 Website: Is a collection of web pages that follow


the same theme and are connected together with
hyperlinks.

1/29/2020 60
Common Internet Terms

 Hyperlink: Is a link between documents that when


clicked takes you into the related document wherev
er it may be
 When the mouse pointer is passed over a hyperlin
k it changes from an arrow to a pointing hand

1/29/2020 61
Common Internet Terms

 Protocol: is a set of rules that governs communications b


etween computers on a network.
 Universal Resource Locator: the address of a Web page.
 URL is a four-part addressing scheme that tells the We
b browser:
 What transfer protocol to use for transporting the file
 The domain name of the computer on which the file r
esides
 The pathname of the folder or directory on the compu
ter on which the file resides
 The name of the file
1/29/2020 62
Structure of a Uniform Resource Locator

pathname
protocol
http://wwww.mwananchi.go.tz/michezo/index.htm

filename
Domain name

http => Hypertext Transfer Protocol

1/29/2020 63
Domain Names

 Standard top-level domain names that form the


basis of both a geographical and non-geograph
ical naming system are:
 www.aaa.com >>commercial organizations
 www.bbb.edu/ac >>educational organizations

 www.ccc.gov >>government institutions

 www.ddd.mil >>military groups

 www.eee.net >>major network support centres

 www.fff.org >>organizations other than the abo


ve
 www.ggg.int >>international organizations

1/29/2020 64
Internet Service Provider (ISP)

 Is a company that offers its customers


access to the Internet
 Internet access is provided via mode
ms
 Examples:
 Vodacom,
 Airtel,
 Tigo,
 Zantel,
 TTCL and
1/29/2020  Sasatel 65
NETWORK APPLICATIONS

 Network applications support businesses a


nd other types of organizations in all types o
f functions including those in the following
major categories:
 Communications
 Collaboration
 Web services

1/29/2020 66
1. Communication

 Electronic mail (e-mail) is the largest-volume app


lication running on the Internet.
 Electronic chat room is a virtual meeting place w
here groups of regulars come to “gab”.
 Internet telephony (VoIP) voice-over IP digitizes
your analog voice signals, sections them into packe
ts, and sends them over the Internet.

1/29/2020 67
1. Communication…

 Videoconference is when participants in one locati


on can see participants at other locations and share
data, voice, pictures, graphics and animation by ele
ctronic means.
 Web conferencing is videoconferencing conducte
d over the Internet.
 Teleconferencing is the use of electronic communi
cation that allows two or more people at different l
ocations to hold a simultaneous conference.

1/29/2020 68
2. Collaboration

 Collaboration refers to efforts of two or more enti


ties (individuals, teams, groups or organizations) w
ho work together to accomplish certain tasks.
 Work group refers specifically to two or more ind
ividuals who act together to perform some task.
 Virtual group (team) is when group members are
in different locations.

1/29/2020 69
2. Collaboration …

 Virtual collaboration is the use of digital technolo


gies that enable organizations or individuals to coll
aboratively plan, design, develop, manage and rese
arch products, services and innovative applications
.

1/29/2020 70
3. Web Services

 Web services are applications, delivered over the I


nternet, that users can select and combine through
almost any device (from personal computer to mob
ile phones).
 It is able to expose and describe itself to other application
s, tell what services it does.
 It can be located by other applications via an online direc
tory.
 It can be invoked by the originating application by using
standard protocols.

1/29/2020 71
Cont…

World Wide Web(website)


 is a system of interlinked hypertext documents ac
cessed via the Internet. With a web browser, one
can view web pages that may contain text, image
s, videos, and other multimedia and navigate bet
ween them via hyperlinks.

1/29/2020 72
WEB BROWSER:
 Is a software program that is used for acce
ssing, retrieving, presenting and traversing
information resources on the web using U
RL.
 The purpose of a web browser is to read H
TML documents and compose them into v
isible or audible web pages.

1/29/2020 73
Cont…

 A Browser is a program that allows a person


to view pages over the Internet and to naviga
te/move from one page to another by the use
of links found in the webpages

1/29/2020 74
Cont…

 Any Browser will have the following basic features to


allow the person to view the pages successfully.
1. BACK BUTTON
 By clicking on it you will be able to go back one or more steps
.
2. GO BUTTON
 When you want to visit a website, type the address in the addr
ess bar and click GO button.
3. STOP BUTTON
 If you have typed a website and decide to cancel it before ope
ning, click on stop button then type a new address.

1/29/2020 75
Cont…

4. REFRESH BUTTON
 When a part of the website you are looking for d
oes not appear on the screen may be due to conn
ection problem click on Refresh button to re-load
a page

1/29/2020 76
Types of Browsers
1. Internet Explorer (IE)
 Most commonly used
browser
 Comes embedded in
Microsoft OS
 Represented as “e”
 Latest version is IE 9
(March 2011)
 For Windows Vista, 7 and
Server 2008

1/29/2020 77
Types of Browsers
2. Mozilla Firefox
 Officially announced in Feb
2004
 Second most popular after IE
 Represented by a world map
 Used with both MS Windows OS
and Linux distributions
 Latest version is Firefox 50 (Nov
2016)

1/29/2020 78
Types of Browsers
3. Safari
 A browser from Apple, Inc
 Included in Mac OS X
 Supports all the functions
found in other browsers
 Represented by a compass
bearing
 Latest version is Safari 5 (2016)

1/29/2020 79
Types of Browsers
4.Google Chrome
 A browser developed by Google
 Initial release in 2008
 Browser options similar to that of
Safari
 Setting and locations are similar to
IE
 Window design similar to
Windows Vista

1/29/2020 80
Types of Browsers
5. Opera
 Developed by Opera Software in
1996
 Mostly used with internet-
enabled mobile phones, PDAs
and Smartphone
 Compatible with all OS types
 Represented by a “O” symbol
 Latest version is Opera 11.62
(March, 2016)

1/29/2020 81
SEARCH ENGINES
 Is a means of searching for information that can be fou
nd on the internet.
 For example when accessing a search engine you mig
ht specify that you want to search for information abou
t ‘Polar Bears’ then search engine would return all the
URLs (addresses) it knows about it.
 Examples of search engines:
 www.google.com
 www.yahoo.com
 www.altavista.com
 www.cycons.com
 www.mamma.com
1/29/2020 82
Electronic mail

 Commonly known as email or e-mail, is a method of excha


nging digital messages from an author to one or more recipi
ents.
 Modern email operates across the Internet or other compute
r networks.
 Some early email systems required that the author and the r
ecipient both be online at the same time, in common with in
stant messaging

1/29/2020 83
Cont…

 Today's email systems are based on a store-and-forwar


d model.
 Email servers accept, forward, deliver and store messa
ges.
 Neither the users nor their computers are required to be
online simultaneously
 Email is a messaging system which can be used to tran
smit text messages and file attachments, attachments c
an be word processing documents, graphics, video and
sound.
1/29/2020 84
E-mail address

 E-mail addresses are made up of certain components th


at help to route it to the proper recipient, just like posta
l address on the envelope. E.g. jsmith@yahoo.com
 i) jsmith is the user name
 ii) @ is at sign which serves as a divider between e-m
ail sections.
 iii) yahoo.com is the domain name which is the name o
f the user’s email system or location

1/29/2020 85
READING AND SENDING E
-MAILS
 a) READING MAILS
 In the address bar, type e.g.www.yahoo.com, ww
w.google.com
 Click on mail button/link
 Type your e-mail address and password.
 Click sign in(if you already have an account
 Click on check mails/inbox
 Click on the Subject of the new received mail

1/29/2020 86
Cont…

 Remember to sign out after reading your me


ssages
 If you don’t have an account click on signup
/register then fill the form and follow instruc
tions to create your account.
 Remember to keep your password a secret a
nd never give it to anyone.

1/29/2020 87
Cont…

 b) SENDING
 After signing in with your correct email address and password
 Click on compose/new email message
 Type recipients e-mail address, subject and then type
the message
 Click Send

1/29/2020 88
Cont…

 TIPS.
 When sending an e-mail observe the following;
 TO: Enter the address of the recipient
 CC: To copy to other people, enter the addre
ss of the recipients separated by a comma
 BCC: The recipient entered here will not be se
en by other recipient
 SUBJECT: Enter the subject matter of your mes
sage, then enter the message in the body.

1/29/2020 89
SENDING AN E-MAIL WITH
ATTACHMENTS
 Compose a message as usual
 Click on attach file
 Click on browse
 Select the location e.g. C: drive, A: drive or from a fol
der.
 Select the file
 Click open /attach files
 Continue to message.
 Click send
 Remember to sign out after sending or receiving mails.

1/29/2020 90
Downloading attachments (at
tached files)
 Login as usual
 Select the mail which contains the attachments
 Click on the subject e.g. Examination results
 Click on Download file name e.g. Examination result
s
 Click on Download attachments
 Click open if you want to read the attached file or click
on save if you want to save the attached file

1/29/2020 91
Take Home

 Discuss The uses of Emails


 Differentiate between Sign up and login

1/29/2020 92
E-Commerce

Meaning of e-Commerce
 Electronic Commerce (EC) is where business transacti
ons take place via telecommunications networks, espec
ially the Internet
 Electronic commerce describes the buying and selling
of products, services, and information via computer net
works including the Internet
 Electronic commerce is about doing business electroni
cally

1/29/2020 93
Cont…

 E-business: conducting business on the Inter


net, not only buying and selling but also serv
icing customers and collaborating with busin
ess partners.
 In practice, e-commerce and e-business are
often used interchangeably

1/29/2020 94
e-Commerce Applications

1 - 95
Benefits of e-Commerce

 Organizational benefits
 Global reach: can easily and quickly locate the best supplie
rs, more customers and more suitable business partners. i.e.
buy cheaper and sell more.
 Cost reduction: EC decreases the cost of creating, processin
g, distribution, storing and retrieving paper-based informati
on.
 Supply chain improvement: supply chain inefficiencies can
be minimized e.g.. Inventory and deliver delays
 Extended hours:24/7/365
 Customization: pull-type production (build-to-order)
 New business models: tendering (reverse auction), name-yo
ur-own-price model, affiliate marketing, viral marketing etc
.
1 - 96
Benefits of e-Commerce

 Vendors’ specialization: EC enables high degree of s


pecialization
 Lower communication cost: EC lowers telecommuni
cations cost.
 Efficient procurement: EC can reduce administrative
cost, purchasing prices, and reducing cycle time.
 Improved customer relations: EC enable close custo
mer relations
 Up-to-date company material: EC enables company i
nformation to be updated by the minute
 No city business permits and fees

1 - 97
Benefits of e-Commerce

1 - 98
Benefits of e-Commerce

 Participate in auctions: virtual auctions


 Electronic communities: consumers can interact
with other consumers
 Get it you way: customization and personalizatio
n of products and services

1 - 99
Disadvantages of e-commerce
 Some business processes are not suited to e-commerce, ev
en with improvements in technology
 Many products and services require a critical mass of pote
ntial buyers
 Costs and returns on e-commerce can be difficult to quanti
fy and estimate
 Cultural impediments: People are reluctant to change in or
der to integrate new technology
 The legal environment is uncertain: Courts and legislators
are trying to catch up
1 - 100
Computer Viruses

 A computer viruses is a destructive program that is bur


ied within an existing program.
 They are written by people with programming skills w
ho want to cause widespread problems for computer us
ers
 To protect data against viruses, always know the sourc
e of your software.
 When downloading software from the Internet always
save it and viruses check it before running it.

1/29/2020 101
Cont…

 Antivirus utilities are available and are a good ‘insuran


ce’ investment
 Computer virus is a software program written with mal
icious intentions.
 There are number of computer viruses that can impede
the functioning of your computer system.
 Let us see what are the different types of computer vir
uses

1/29/2020 102
Cont…

 Computer Virus is a malicious software program writte


n intentionally to enter a computer without the user's p
ermission or knowledge.
 It has the ability to replicate itself, thus continues to sp
read.
 Some viruses do little but replicate, while others can ca
use severe harm or adversely affect program and perfor
mance of the system. :

1/29/2020 103
Cont…

 A virus should never be assumed harmless a


nd left on a system.
 Most common types of viruses are mentione
d below

1/29/2020 104
Different Types of Computer V
iruses
 There are different types of computer viruse
s which can be classified according to their
origin, techniques, types of files they infect,
where they hide, the kind of damage they ca
use, the type of operating system or platform
they attack etc.
 Let us have a look at few of them

1/29/2020 105
Cont…

 Resident Virus
 This type of virus is a permanent as it dwells in t
he RAM.
 From there it can overcome and interrupt all the
operations executed by the system.
 It can corrupt files and programs that are opened,
closed, copied, renamed etc.
Examples: Randex, CMJ, Meve, and MrKlunky.

1/29/2020 106
Cont…

 Direct Action Viruses


 The main purpose of this virus is to replicate and take action w
hen it is executed.
 When a specific condition is met, the virus will go into action
and infect files in the directory or folder that it is in as well as
directories that are specified in the AUTOEXEC.BAT file pat
h.
 This batch file is always located in the root directory of the har
d disk and carries out certain operations when the computer is
booted.
Examples: Vienna virus.

1/29/2020 107
Cont…

 Overwrite Viruses
 Virus of this kind is characterized by the fact that it d

eletes the information contained in the files that it inf


ects, rendering them partially or totally useless once
they have been infected.
 The only way to clean a file infected by an overwrite

virus is to delete the file completely, thus losing the


original content.
Examples: Way, Trj.Reboot, Trivial.88.D

1/29/2020 108
Cont…

 Boot Sector Virus


 This type of virus affects the boot sector of a floppy or
hard disk.
 This is a crucial part of a disk, in which information of
the disk itself is stored along with a program that make
s it possible to boot (start) the computer from the disk.

1/29/2020 109
Cont…

 The best way of avoiding boot sector viruses


is to ensure that floppy disks are write-prote
cted and never starting your computer with a
n unknown floppy disk in the disk drive.
Examples: Polyboot.B, AntiEXE

1/29/2020 110
 Web Scripting Virus
 Many web pages include complex code in order to create an interesting and i
nteractive content.
 This code is often exploited to bring about certain undesirable actions.
 Worms
 A worm is a program very similar to a virus; it has the ability to self-replicat
e and can lead to negative effects on your system. But they can be detected a
nd eliminated by anti-viruses.

Examples of worms include: PSWBugbear.B, Lovgate.F, Trile.C, Sobig.D,


Mapson.

1/29/2020 111
 Trojans or Trojan Horses
 Another unsavory breed of malicious code are Tr
ojans or Trojan horses, which unlike viruses do n
ot reproduce by infecting other files, nor do they
self-replicate like worms. In fact, it is program w
hich disguises itself as a useful program or applic
ation

1/29/2020 112
How do you get a virus in your
computer
 Email: You get an email from a person that contains o
ne or more viruses.
 If the attachment is opened, the viruses may infect files
in the computer.
 The viruses might also send emails to people from you
r email address book or email folders automatically.
 So, you should not open unknown attachments in emai
ls or do a virus scanning after opening them.

1/29/2020 113
Cont…

 Internet: If you download an exe file or a data file fro


m the Internet or other shared networks, viruses might
be transferred to your computer.
 Sometimes the free software programs on the Internet
have viruses especially if downloading from sources su
ch as Torrent or Usenet news groups.
 Therefore, if necessary, you should download files fro
m trusted resources.

1/29/2020 114
Cont…

 Peripheral devices: The devices such as M


P3 player, USB thumb drive, Memory card
or CD Rom are also means for spreading vir
uses.
 So, remember to do a virus scan for them aft
er they are connected to your computer

1/29/2020 115
Symptoms of virus infection

 Your computer has unusual activity (e.g. programs cra


shing a lot or running slowly).
 Messages or images (unrelated to your current task) co
me up unexpectedly.
 A program may start up unexpectedly.
 Your firewall informs that a certain application is tryin
g to connect to the Internet (unrelated to what you are
working on).
 Your friends say that they get emails from you but you
did not send any to them.
1/29/2020 116
Cont…

 You receive many system error announcements. (Note:


This may also come from another activity such as a har
dware problem or genuine system error)
 Windows does not run when you start up your comput
er. (Note: This may also come from a hard disk proble
m)
 You realize that folders and files are removed or chang
ed.
 You find that there's an access to your hard disk (one o
f the small light is blinking) even though there are no p
rograms running.
1/29/2020 117
Measures to take against compu
ter viruses
 Make backups on a regular basis
 Ready to reinstall your system if damaged by a virus
 Protect your network connection with a firewall.
 Use antivirus software
 Regularly update your operating system
 Do not install and run software suspicious
 Restrict access to your computer

1/29/2020 118
Cont…

 If you're using Internet Explorer, try moving


to another browser
 Use spam protection

1/29/2020 119
Review Questions

1. Discuss different types of threats to comput


er operations
2. Differentiate between e-commerce and e-bu
siness
3. Outline different ways to deal with compute
r viruses

1/29/2020 120

Вам также может понравиться