Computer Networks
- The collection of interconnected computers is called computer network.
- Two computers are said to be connected if they are capable of sharing and exchanging information or resources.
Advantages
- Resource Sharing
- Reliability
- Cost Effectiveness
- Communication Medium
Elaborating Every Advantage
Resource Sharing
Resource sharing means to make all programs, data and peripherals available to anyone on the network irrespective of physical location of the resources and the user.
Advantages
Reliability means to keep the copy of a file on two or more diffrent machines , so if one of them is unavailable ,then its other copy can be used.
Cost Factor
Cost factor means it greatly reduces the cost since the resources can be shared.
Communication Medium
Communication medium one can send messages and whatever the changes at one one end which can be immediately noticed at another end.
Types Of Network
PAN
A Personal Area Network is a computyer network organized around an individual person. I generally covers a range of less than 10 mts . PAN’s can be constructed with cables or wirelessly.
LAN
- A Local Area Network (LAN)
- Its a network that is confined to a relatively small area.
- It is generally limited to a geographic area such as achool or lab or office building.
- It is generally privately owned networks over a distance of not more than 5 Kms.
- A hardware as well as software resources are shared through LAN.
- In LAN , one computer is designated as file server , which stores all the software that can be shared by computers attached to a network.
- Computers connected to the server are called workstation .
MAN
- MAN is the networks cover of a group of nearby corporate offices or a city and might be either private or public.
- I refers to the network that is spread over an area as big as city
WAN
- These are the networks spread over large diatances , say across countries or even continents through cabling or satellite uplinks are called WAN.
- It can be a group of LAN’s that are spread across several locations and connected together.
- It facilitate fast and efficient exchange of information at lesser cost and higher speeds.
- The largest WAN is Internet
Comparision Between LAN And WAN
LAN |
WAN |
It is spread over a small area. |
It is spread over a very large area |
It usually costs less to set it up |
It costs much to set it up. |
It is usually a single network |
It is usually a network of many networks. |
Switching Techniques
- Switching techniques are used for transmitting data across networks.
Types Of Circuit Switching
Circuit Switching
- In the circuit switching technique , firstly a complete end to end transmission path between the source and the destination computer is established and then message is transmitted through the path.
- The main advantage of this technique is guaranteed delivery of the message. Mostly used for voice communication.
Packet Switching
- In this technique fixed size of packets can be transmitted across network.
Message Switching
- In message switching technique , no physical path is established between sender and receiver in advance.
- Thus each node receives the entire message , stores it entirely in disk , and transmits the message to the next node if it is not the destination node.
- This type of network is also called Store -and-forward network.
Comparision Between Switching Technique
Criteria |
Circuit Switching |
Packet Switching |
Message Switching |
Path established in advance |
YES |
NO |
NO |
Store and Forward Technique |
NO |
YES(Stored in main menory) |
YES (Stored in Disk) |
Message followsmultiple routes |
NO |
YES |
YES |
Block Size |
No Block Size |
No Limit on BLock |
Limit on Block Size |
Data Communication Technologies
- Channel
- Bandwidth
- Data Transfer Rate
Channel
- Channel is the medium used to carry information or data from one point to another.
- Physical medium like cables over which the information is exchanged is called channel.
Bandwidth
- Data transfer rates that can be supported by a network is called its bandwidth.
- Bandwidth is directly proportional to the amount of data transmitted or received per unit time.
- Example ,it takes more bandwidth to download an image file in 1 sec than to download a page of text in 1 sec.
- Large sound files , vedios , animated mivies requires more bandwidth.
- High bandwidth channels are called broadband channels.
- Low bandwidth channels are called narrowband channels.
- Bandwidth refers tot the diffrence between highest and lowest frequencies of a transmission channel.
- It is the range of frequencies contained in a composite signal or the range of frequencies a channel can pass.
- It is measured as:
Data Transfer Rate
- It identifies the number of data elements (bits) sent in 1 sec.
- The data transfer rate represents the amount of data transferred per second by a communication channel or a computing or a storage device.
- Data Transfer rate is measured in units of bits per seconds (bps) , Bps(Bytes per second)
- When applied to data rate , the multiplexer prefixer: ‘kilo’ , ‘mega’ , ‘tera’ etc..
- Kbps
- Gbps
- Tbps
- Transmission media is the medium over the messages are transmitted.
- A communication channel is also called as medium.
- Diffrent media have diffrent properties and is used in diffrent environments for various purposes.
Twisted Pair Cable
- It consists of two identical 1 mm thick copper wires insulated and twisted together. The twisted pair cables are twisted in order to reduce crosstalk and electromagnetic induction.
Advantages
- It is easy to install and maintain.
- It is very inexpensive.
Disadvantages
- It is incapable to carry a signal over long distances without the use of repeaters.
- Due to low bandwidth , these are not suitable for broadband applications.
Co-axial Cables
- It consists of a solid wire core surrounded by one or more foil or braided wire shields , each part is separated from other by some kind of plastic insulator. It is mostly used in cable wires.
Advantage
- Data transmission rate is better than twisted pair cables.
- It provides a cheap means of transporting multi-channel television signals around metropolitan areas.
Disadvantages
- Expensive than twisted pair cables.
- Difficult to manage and reconfigure.
Optical Fibre
- An optical fibre consists of thin glass fibres that can carry information in the form of visible light.
Advantages
- Transmit data over long distances with high security.
- Data transmission speed is high.
- Provides better noise immunity.
- Bandwidth is up to 10 Gbps.
Disadvantages
- Expensive as compared to other guided media.
- Needs special while installation.
Infrared
- The infrared light transmits data through the air and can propagate throughout a room , but will not penetrate walls. It is secure medium of signal transmission .The infrared transmission has become common in TV remotes ,automotive garage doors ,wireless speakers etc.
Radio Waves
- Radio waves are electromagnetic waves with a wavelength between 0.5cm and 30,000m. The transmission making use of radio frequencies is termed as radio-wave transmission.
Advantages
- Radio wave transmission offer mobility.
- It ischeaper than laying cables and fibres.
- It offers ease of communication over difficult terrain.
Disadvantages
- Radio wave communication is insecure communication.
- Radio wave propagation is susceptible to weather effects like rains , thunder storms etc.
Microwave
- The microwave transmission is a line of sight transmission. Microwave signals travel at a higher frequency than radio waves and are popularly used for transmitting data over long distances.
Advantages
- It is cheaper than lying cable or fiber.
- It hasthe ability to communicate over oceans.
Satellite Link
- The satellite transmission is also kind of line of sight transmission that is used to transmit signals throughout the world.
Advantages
- Area covered is quite large.
- No line of sight restrictions such as natural mountains ,tall buildings ,towers.
- Earth station which receives the signals can be in fixed position or relatively mobile.
Disadvantages
- Very expensive as compared to other transmission mediums.
- Installation is extremely complex.
- Signals sent to the stations can be tampered by external interference.
Network Devices
Networking hardware ,also known as network equipments or computer networking devices , are electronic devices which are required for communication and interaction between devices on a computer network.
- Ethernet Card
- Modem
- Bridge
- WiFi Card
- Hub
- Repeater
- Gateway
- RJ 45
- Switch
- Router
Modem
- Full form: Modulator or Demodulator.
- A modem is a hardware device that allows a computer or another devoce ,such as router or switch ,to connect to the Internet.
- As we know phone lines work on Analog signals ,while computer works on digital signal.
- So the role of modem is to convert Digital Signal to Analog so that it can be carried by telephone lines and other side it convert Analog signal to Digital Signals ,so that it can be carried by computer.
Types Of Modems
Internal Modems
The modems that are fixed within the computer.
External Modems
The modems that are connected externally to a computer as other peripherals are connected.
RJ-45
- RJ in RJ-45 stands for Registered Jack .It is a standard type of physical connector for network cables.
- RJ-45 connectors are most commonly seen with ethernet cables feature small plastic plugs on each end that are inserted into the RJ-45 jacks of Ethernat devices.
Ethernet Card
- It is also known as NIC (Network Interface Card)
- It is a device that is *attached to each of the workstations and the server and helps the workstations establish all important connection the network.
- It contain RJ-45 slot to connect ethernet cable with RJ-45 connector.
- Each NIC attached to workstation has a unique number identifying it , known as MAC address.
- Also known as Network Interface Unit.
Hub
- A hub is a hardware device used to connect several computers together.
- A hub is a networking device with multiple ports that are used for connecting multiple computers or segments of LAN together.
- Sends the incomming data to all destinations
Types of Hub
Active Hub
It amplifies the signal as it moves from one connected device to another. These are like repeaters to extend the length of a network.
Passive Hub
It allows the signal to pass from one computer to another ,without any change.
Working Of Hub
- Hub is a multiplort repeater , which broadcasts all information to all other ports. Hence it is called as Non intelligent ** or **dumb device.
- Causes unnecessary traffic.
- Hub can send or receive information , but it can not do both at a same time.
Switch
A switch is responsible for filtering , i.e. transforming data in a specific way and for forwarding packets between LAN Segments
Working Of A Switch
- A switch has same job as that of a hub’s , i.e. to connect multiple computers . But ,a switch is a smart device.
- It can identify the intended destination and send the information only to the target computers.
- No unnecessary traffic generated.
- Can send and receive information at the same time.
Repeater
- A repeater is a device that amplifies and restore the signals for long distance transmission.
Bridge
- A bridge is a device that lets you link two networks together.
- Bridges are smart enough to know which commputers are on side of bridge , so they only allow those messages that need to get to the other side to cross the bridge.
- Bridges can handle networks that follow same protocol
Router
- A device that works like a bridge but can handle diffrent protocols.
- The router is responsible for forwarding data from one network to a diffrent network.
- If the destination is unknown to a router , it sends the traffic to another router which knows the destination.
Gateway
- A gateway is a device that connects dissimilar networks.
- It establishes an intelligent between a local area networks with completely diffrent structures.
WiFi Card
- Similar to Ethernet card , but it allows our computers to connect with other devices without wire , i.e. for wireless connectivity.
- It may be internal or external with built-in wireless radio and antenna the most common Wi-Fi card used in desktop computer are PCI express Wi-Fi card made it fit the PCI express card slot on the motherboard.
- It allows to connect our device to hotspot available.
- Advantage is that it allows computer to become part of a network without being physically connected through wire and can be placed anywhere.
Network Protocols
- In network there are variety of computers connected to each other and share data in many ways.
- *For interaction among these , some rules aare applied like how and when a device can send and receive data , how to send the data packet and how to receive.
- Some network protocols are given below:-
- HTTP
- FTP
- SMTP
- TCP/IP
- PPP
- IMAP
- POP3
- VoIP
- TELNET
HTTP
H: Hyper
T: Text
T: Transfer
P: Protocol
- HTTP is a protocol for the transfer of information on the internet and the World Wide Web.
- HTTP is a request /response standard between a client and a aserver. A client is the end-user ; the server is the web site.
FTP
F: File
T: Transfer
P: Protocol
- FTP is the simplest and the most secure way to exchange files over the internet. The objectives of FTP are:
- TO promote sharing of files(Computer programs and /or data)
- TO encourage indirect or implicit use of remote computers.
- To sheild a user from the variations in a file storage systems among diffrent hosts.
TCP/IP
T: Transmission
C: Control
P: Protocol
I: Internet
P: Protocol
- TCP is responsible for verifying the correct delivery of data from client to server. Data can be lost in the intermediate network. TCP adds support to detect errors or the lost data and to detect errors or lost data and to trigger retransmission until the data is correctly and completely received.
- TCP is a connection-oriented protocol that is first the connection is established between the sender and the receiver.
- TCP divides the large packets to to transmit into smaller data packets called Datagrams.
- At the receiving end , it also reassemble the packet from original message.
- IP is responsible for moving packet of data from node to node. IP forwards each packet based on a four byte destination address(the IP number) .The Internet authorities assign ranges of numbers to different organisations .The organisations assign groups of their numbers to departments. IP operates on gateway machines that move data from department to organization to region and then around the world.
- Internet protocol is responsible for providing address of each packet is a sign with destination IP address.
PPP
- PPP stands for Point to Point Protocol.
- It is a communication protocol of the data link layer that is used to transmit multi-protocol data between two directly connected point-to-point computers.
- It is a byte oriented protocol that is widely used in broadband communications having heavy loads and high speeds.
SMTP
- SMTP stands for Simple Mail Transfer Protocol.
- SMTP is a set of communication guidelines that allows software to transmit an electronic mail over the internet.
- It is a program used for sending messages to computer users based on email address.
IMAP
- IMAP stands for Internet Message Acccess Protocol.
- It is a standard protocol for accessing E-Mail from local server.
- It is a client/server protocol in which E-Mail is received and held for the user by Internet server.
- As this requires only a small data transfer , this works well over a slow connection such as Modem.
- Only if a user requests to read a specific message , then it will be downloaded from the server.
POP3
- POP3 stands for Post Office Protocol.
- It is a client-server protocol in which email is received and held for you by your internet server
- Periodically you check yourmailbox on the server and download any email probably using POP3.
- I also allows to download the received messages on the local machine using tool like Outlook so that user can read them even when they are not connected to the internet. The user choose to leave copies of the mails on the server as well.
- The advantage is that once messagesare downloaded , the user can cut the Internet Connection and read his.her Email at own leisure without incurring further communication cost.
VoIP
- VoIP stands for Voice over Internet Protocol.
- It is a protocol that enables voice communication over the internet through the compression of voice into data packets that can be effectively transmitted over data network and then convert back into voice at receiving end.
- It uses packet switching (store and forward).
- It is an elternative to traditional telephone Network.
Remote Login
- Remote login is a network application that permits a user sitting at a diffrent location to work on a specific program on another computer.
- The user need ID of that computer generated by remote login application.
- It is done only when both PC’s are connected to the Internet.
- The main programs are : Telnet , AnDesk , Teamviewer.
Telnet
- Telnet is one of the earliest remote protocols on the internet.
- Through telnet , an administrator or another user can access someone as computer remotely.
- On the web , HTTP and FTP protocols allow you to request specific files from remote computers but not actually be log on as a user of that computer.
- With telnet , you logon as a regular user with whatever priveleges you may have been granted to specific application on and data on that computer.
Network Topologies
- Topology is an art of connecting diffrent computers in a network.
- The way in which the computers / devices are physically interconnected to form a network is called a Topology.
Types Of Topology
- Ring Topology
- Bus Topology
- Star Topology
- Tree Topology
Bus Topology
- In a bus topology , **all the nodes are connected to a main cable called backbone.
- If any node has to send some information to any other node , it sends the signal to the backbone.
- The signal travels through the entire length of the backbone and is received by the node for which it is intended.
Advantages
- It is easy to install
- It requires less cable length and hence , it is cost effective.
- Failure of a node does not affect the network.
Disadvantages
- In case of a cable fault , the entire network goes down.
- At a time , only one node can transmit data.
Star Topology
- In a Star topology , each node is directly connected to a hub / switch.
- I any node has to send any information to any other node , it sends the signal to the hub/switch.
- The star topology uses a separate cable for each node / workstation. The cable connects the node to a central device typically a HUB.
Advantages
- It is easy to install.
- It is easy to diagnose the fault in Star Topology.
- If one link fails , the network can still function.
Disadvantages
- Failure of Hub / Switch leads to failure of entire network.
- It requires more cable length as compared to Bus Topology.
Ring Topology
- In a ring topology , every computer is connected to the next computer in the ring and each transmit the signal , what it receives from the previous computer. The messages flow around the ring in one direction.
Advantages
- Easy to install and configure.
- Easy to detect the problem.
- All the data flows in one direction , reducing the chance of the packet collission.
Disadvantages
- All the data being transferref over the network must pass through each workstation on the network , which can make it slower than a star topology.
- The entire network will be impacted if one workstation shuts down.
Tree Topology
- Tree topology is a combination of Bus and Star Topology
- It is usedto combine multiple star topologies.
Advantages
- It offers easy way of network expansion.
- Even if one network fails , the other network remains connected and working.
Network Security
- Network Security is any activity designed to protect the usability and integrity of your network and data.
- It includes both Hardware and SOftware Technologies.
- Effective network security manages access to the network. It targets a variety of threats and stops them from entering or spreading on your network.
- It includes measures to make sure that only legal or authorized users and programs gain access to information resources like databases.
Threats To Network Security
- Virus
- Worms
- Trojan Horse
- Spams
Protection Methods
- Authentication
- Authorization
- Encryption
- Biometric System
- Firewall
Authentication
- Authentication is the process of verifying who a user is.
Authorization
- Authorization is the process of varifying what they have access to.
Encryption
- Conversion of the form of data from one form to another form.
Biometric System
- Involves unique aspect for person’s identification such as Finger-prints , retinal patterns etc to establish his/her identity.
Firewall
- A system designed to prevent unauthorized access to or from a private network.
VIRUS
V: Vital
I: Information
R: Resource
U: Under
S: Seize
- Viruses are malacious code / programs that causes damage to data and files on a system.
- Virus attach itself to program or file so that it can spread from one computer to another.
Damages Caused By Viruses
- Damage or delete files
- Slows down your system.
- Screen FLickering
Prevention From Virus
- Install and update Antivirus software.
- Dont download or open email from any unknown sender.
- Dont click on link in email which is from unknown sources.
- Disconnect the internet , if you are anyway.
- Disable cookies , if possible.
Worm
- A worm is ** self replicating program which eats up the entire disk space or memory**.
- A worm keeps on creating its copies until all the disk space or memory is free.
- Consumes bandwidth and slow down the network.
- It is also a malacious program like a virus. But unlike viruses , it does not need to attach itself to a host program . A worm works by itself as an independent object.
Trojan Horse
- It is a program that appears harmless but actually performs malacious functions such as damaging or deleting files.
- Trojan Horses trick users into installing them by appearing to be ligitimate programs. Once installed on a system , they reveal their true nature and cause damage.
- Some trojan horses will contact a central server and report back information such as passwords , user ID’s , and captired keystrokes.
Spams
- Unwanted messages or mails are known as Spams.
- At times internet is flooded with multiple copies of the same message , it is nothing but spam.
- Most spam is commercial advertising. In addition to wasting people’s time , spam also eats up a lot of network bandwidth.
Virus Prevention
- Never use a secondary storage device without scanning it for virus.
- Always scan files downloaded from the internet.
- Use licensed software.
- Put password protection to the PC.
- Make regular backups.
- Install and run Antivirus software.
Cookies
- A cookie is a small piece of data sent from a website and stored in a user’s web browser while a user is browsing in a website.
- Google Chrome stores all cookies in a sigle file called Cookies. The file is located at the following path:
C:\Users\Your User Name\AppData\Local\Google\Chrome\UserData\Default
- Some cookies remain saved and load the next time , user visits the same website.
- Cookie help website to store information about visitors like username , password and other details.
- Cookies are messages that a web server transits to a web browser so thatthe web server can keep track of the user’s activity on a specific web site.
Firewall
- A system designed to prevent unauthorized access to or from a private network is called firewall. It can be implemented in both hardware and software or combination or both.
HTTPS
- Hypertext Transfer Protocol Secure is an internet communication protocol that protects the integrity and the confidentiality of data between the users computeer and the site.
- User expect a secure and private online experience when using a website.
- While doing transactions , make sure your protocol is https.
Hackers And Crackers
Hackers
- Hackers are more intrested in gsining knowledge about computer systems and possibly using this knowledge for playful pranks.
Crackers
- They are malacious programmers who break into secure systems.
Cyber Law
- Cyber law is the part of overall legal system that deals with Internet , cyberspace , and their respective legal issues.
- Generally , cyber law is reffered to as Law Of Internet.
- Cyber law also called IT law is the law regarding Information-Technology including computers and the Internet.
Cybercrime
- Any crime that involves a computer or a network as a tool or a target , is called a Computer Crime or a Cyber Crime.
- Or in other term , it is a crime in which a computer is the object of the crime (hacking , phishing , spamming) or is used as a tool to commit an offene (hate crimes).
Importance Of Cyber Laws
- It covers all transactions over Internet.
- It keeps an eye on all activities over Internet.
Classification Of Cybercrime
- Tempering with the conputer source document.
- Hacking
- Publishing any information which is obscene in electronic form.
- Child Pornography: Is considered to be any depiction of a minor or an individual who appears to be a minor who is engaged in sexually related conduct.
- Accessing protected system
- Breach of confidentiality and privacy.
Steps TO Protect Yourself Against Cyber Crime
- Make sure your security software is current -and update it regularly.
- Lock or log off your computer when you step away.
- Go offline when you don’t need an internet connection
- Consider sharing less online.
- Think twice about using public Wi-Fi.
- When in doubt , don’t click.
Computer Networking Terms
WWW
- WWW stands for World Wide Web.
- The term WWW was coined by Tim Berners Lee.
- It is a collection of linked documents or pages , stored on millions of computers and distributed across the internet.
- It is a set of protocols that allows you to access any document on the net through a naming system called the URL(Uniform Resource Locator).
Attributes Of WWW
- User Friendly: Works easily with most internet browsers.
- Multimedia documents: audio , vedio , text , animations.
- Hyperlinks and Hypertext
- Interactive Hyperlinks and input boxes.
- Includes Frames: Display of more than one independdently controllable section on single web page.
Telnet
- It is an Internet utility that allows you to log onto remote computer systems.
Web Browser
- A webbrowser is a WWW client that navigates through World Wide Web and display pages.
- A webrowser is a software used to access the websites.
- Eg: Google Chrome , Firefox , Internet Explorer
Web Server
- A web server is a WWW server that responds to the requests made by the web browser.
URL
- Uniform Resource Locator
- Each website has a unique address called URL.
- URL looks like this:
- type://address//path
- type-> refers type of server in which the file is located( FTP , HTTP)
- address-> address of the server
- path-> location of file in the server.
Domain Name
- Refers to the type of domain in which they are categorized into.
- com,edu,net,tv,biz,org,gov,co
Webpage
- A single page in a website is called as webpage.
Website
- A collection of related web pages is called web site.
Homepage
- The first page which is opened in a website is called as the Home page.
Web Portal
- It is a website that host other websites. In other words web portal has hyperlinks to many other websites.
- Eg yahoo.com , google.com , indiatimes.com
Web Hosting
- It is a way of hosting a web server application on a computer system through which the contents are readily available to any web browser.
- Basically , the web hosts allow their customers to place web documents such as HTML pages , graphics and other multimedia files to a special type of computer called a web server.
Types Of Web Hosting
- Free Hosting
- Virtual or Shared Hosting
- Dedicated Hosting
- Co-location Hosting
Free Hosting
- It offers to host web pages for no cost.
- If you want to experiment with a site or put up a small personal site for the fun of it , a free package will be sufficient.
- Example of such sites are : geocitees , tripod , homestead etc.
Virtual or Sharing Hosting
- In a shared hosting environment , you and other website owners shared one server. This includes sharing physical server and the software applications within the server. Shared hosting services are affordable because the low cost to operate the server is shared between you and these other owners. There are , however ,a number of down sides , such as being slower.
Dedicated hosting
- In this type of hosting , the company wishing to go online , rents an entire web server from a hosting company.
- This is suitable for companies hosting larger web sites.
- This allows for faster performance , as you have all the the server’s resources entire without sharing with other website owners.
- However , this also means that you will be responsible for the cost of server operation entirely. This is a good choice for websites that requires a lot of system resources , or need a higher level of security.
Co-location Hosting
- In this type of hosting , you wil purchase your own server and have it housed at a web host’s facilities.
- You will be responsible for the server itself.
- An advantage to this type of hosting is you have full control of the web server. YOu can install any scripts or applications you need.
Web 2.0
- The new features of web application that makes the web more interactive , support easy online information exchange. Some features of web 2.0 is blog , facebook , Myspace , Teitter , YouTube.
Characteristics of Wb 2.0
- Makes web more interative through online social media.
- Supports easy online information exchange.
- Interoperability on the internet.
- Vedio sharing possible on the websites.
HTML
- The web document is written in a special language called HTML.
- It tells the browser , how the data , image should be displayed.
XML
- It stands for Extensible Markup Language.
- It is a language for defining a structures information.
- In XML , we create our own tags.
DHTML
- Dynamic HyperText Markup Language.
- refers to the web content that changes each time it is reviewed. (Time of the day , Geographic Location of the reader , News).
Cyber Safety
- Cyber Safety refers to the safe responsible use of Internet to ensure ssafety and security of personal information , and not posing threat to anyone else’s information.
IP Address
- IP address is a unique address of your device when you connect to the internet . From your IP address , a website can determine your rough geographic location.
Identity Theft
- Identity theft is a kind of fraud which involves else’s identity to steal money or gain other benefits.
Anonymous Browsing
- Anonymous browdsng allows users to view websites without revealing any personal information of users like IP address and location etc.
A safe site’s address starts with https and not by http
Cyber Crimes
Cyber Trolls
- Cyber trolls refers to a person who purposely post opposing -, sarcastic , or insulting comments about someone with an aim of targeting a person online.
- It is a cyber crime and is closely related to cyber bullying.
Cyber Bullying
- Cyber bullying occurs when someone uses the internet , a cellphone , email , etc to embarass , intimidate someone.
Cyber Stalking
- Cyber Stalking refers to online stalking where someone uses the internet , chat rooms etc to stalk his/her victim.
- Cyber Stalker follows the victim online everywhere and keeps posting / sending something which are unsolicited.
Spreading Rumours Online
- Spreading Rumours Onlinr is a Cybercrime and is punishable offence.
Online Fraud
This includes acts like:
- Non delivered goods
- Stealing information
- Non-existent companies
- Fraudulent payments
- Phishing is the criminally fraudulent process of attemplting to acquire sensitive information such as usernames , account details , passwords.
- In phishing , an imposter uses an authentic looking email or website to trick recippients into giving out sensitive personal information.
Scams
- Any fraudulent business practise that extracts money from an unsuspecting ignorant person is called a scam.
Do watch him catching a scam
Child Pronography
- According to newly ammended Information Technology Bill , Section 67 , has been amended that not only creating and transmitting obscene material in electronic form , but also to browse such site is an offence.
# To report A Cyber Crime
- The local police stations can be approached for filling complaints as the cybercrime cells specially designated with the jurisdiction to register complaint.
- Provixions have now been made for filling ‘E-FIR’ in most states.
- Cybercrime has global jurisdiction , meaning that the crime may be reposted in the cyber crime units of any city irrespective of the place where the act was committed.
Mobile Technologies
1G
- Considered to be the first analog cellular systems , used only for voice calls , no data security.
Some Mobile Terms
FDMA
- Frequency Division Multiple Access. In this , each user utilizes a portion of this frequency bandwidth available. Each user has its own frequency domain.
CDMA
- Code Division Multiple Access. In this , each user is allocated a unique code sequence. On the sender’s end , the data signal is encoded using the given unique code. The receiver decodes the signal according the unique code and recovers the original data.
TDMA
- Time Division Multiple Access. In this , each user is allowed to transmit only within specified time intervals. Diffrent users transmit in diffrent time slots. When users transmit , they occupy the whole frequency bandwidth.
2G
- Offered improved sounfdquality , better security , upto 104 kbit/s data rate. New services like text messaging , packet data called ID , SIM’s were introduced.
3G
- Web Browsing , E-Mail , Vedio Conferencing , Vedio ,etc now were supported. Data speed also increased to 144kbps to 2mbps.
4G
- 4G is all about faster internet speed which was from 100mbps to 1Gbps.
Various Parts Of Processors
CPU( Central Processing Unit )
- It receives commands , makes instant calculations and send signals throughout your device.
GPU( Graphics Processing Unit )
- The GPU assists the CPU by handling the visuals , even for games and other graphically rich applications.
Camera ISP(Image Signal Processor)
- It provides instant image capture , high resolution support , image stabilisation and other enhancements.