Foc Unit 3
Foc Unit 3
Foc Unit 3
UNIT - III
BBA II SEM
(SYLLABUS AS PER UTTAR PRADESH
UNIFIED UNIVERSITIES)
This document will provide a basic overview of some common networking concepts.
We will discuss basic terminology, common protocols, and the responsibilities and
characteristics of the different layers of networking.
This document will provide a basic overview of some common networking concepts.
We will discuss basic terminology, common protocols, and the responsibilities and
characteristics of the different layers of networking.
Types of Topologies:
1- Point-to-Point
Point-to-point networks contains exactly two hosts such as computer, switches or
routers, servers connected back to back using a single piece of cable. Often, the
receiving end of one host is connected to sending end of the other and vice-versa.
Network Topology
2- Bus Topology
In case of Bus topology, all devices share single communication line or cable. Bus
topology may have problem while multiple hosts sending data at the same time.
Therefore, Bus topology either uses CSMA/CD technology or recognizes one host as
Bus Master to solve the issue. It is one of the simple forms of networking where a
failure of a device does not affect the other devices. But failure of the shared
communication line can make all other devices stop functioning.
Network Topology
3- Star Topology
All hosts in Star topology are connected to a central device, known as hub device,
using a point-to-point connection. That is, there exists a point to point connection
between hosts and hub. The hub device can be any of the following:
Layer-1 device such as hub or repeater
Layer-2 device such as switch or bridge
Layer-3 device such as router or
gateway
Network Topology
4- Ring Topology
In ring topology, each host machine connects to exactly two other machines, creating
a circular network structure. When one host tries to communicate or send message
to a host which is not adjacent to it, the data travels through all intermediate hosts.
To connect one more host in the existing structure, the administrator may need only
one more extra cable.
Network Topology
5- Mesh Topology
In this type of topology, a host is connected to one or multiple hosts. This topology has hosts in
point-to-point connection with every other host or may also have hosts which are in point-to-
point connection to few hosts only.
Hosts in Mesh topology also work as relay for other hosts which do not have
direct point-to-point links. Mesh technology comes into two types:
Full Mesh: All hosts have a point-to-point connection to every other host in the network. Thus
for every new host n(n-1)/2 connections are required. It provides the most reliable network
structure among all network topologies.
Partially Mesh: Not all hosts have point-to-point connection to every other host. Hosts connect
to each other in some arbitrarily fashion. This topology exists where we need to provide
reliability to some hosts out of all.
Network Topology
6- Tree Topology
Also known as Hierarchical Topology, this is the most common form of network topology in use
presently. This topology imitates as extended Star topology and inherits properties of bus
topology.
This topology divides the network in to multiple levels/layers of network. Mainly in LANs, a
network is bifurcated into three types of network devices. The lowermost is access-layer where
computers are attached. The middle layer is known as distribution layer, which works as
mediator between upper layer and lower layer. The highest layer is known as core layer, and is
central point of the network, i.e. root of the tree from which all nodes fork.
Network Topology
7- Daisy Chain
This topology connects all the hosts in a linear fashion. Similar to Ring topology, all hosts are
connected to two hosts only, except the end hosts. Means, if the end hosts in daisy chain are
connected then it represents Ring topology.
8- Hybrid Topology
A network structure whose design contains more than one topology is said to be hybrid
topology. Hybrid topology inherits merits and demerits of all the incorporating topologies.
Digital Privacy Management
Digital Privacy
Digital privacy is often used in contexts that promote advocacy on behalf of individual
and consumer privacy rights in e-services and is typically used in opposition to the
business practices of many e-marketers, businesses, and companies to collect and
use such information and data.
Electronic commerce and the Internet are changing the way information about
customers is gathered and used. Unfortunately, most of the changes have resulted in
the reduction of consumer privacy. The ease of processing, obtaining and
transmitting information has made easier both trading in data as well as collating
information from different sources, and information about individuals is often
collected and sold without their knowledge/consent. The ease of breaking into data
stores and wiretapping has reduced the security of stored and transmitted
information. Transfer of data from one location to another with different laws
complicates the privacy problem further. There is an increasing awareness among
consumers about privacy violations, and, with it, an increasing resistance to go along
with the privacy dilution. This is making the legal position of the data collector
extremely fragile.
Digital Rights Management
Digital Privacy
Digital privacy is often used in contexts that promote advocacy on behalf of individual
and consumer privacy rights in e-services and is typically used in opposition to the
business practices of many e-marketers, businesses, and companies to collect and
use such information and data.
Electronic commerce and the Internet are changing the way information about
customers is gathered and used. Unfortunately, most of the changes have resulted in
the reduction of consumer privacy. The ease of processing, obtaining and
transmitting information has made easier both trading in data as well as collating
information from different sources, and information about individuals is often
collected and sold without their knowledge/consent. The ease of breaking into data
stores and wiretapping has reduced the security of stored and transmitted
information. Transfer of data from one location to another with different laws
complicates the privacy problem further. There is an increasing awareness among
consumers about privacy violations, and, with it, an increasing resistance to go along
with the privacy dilution. This is making the legal position of the data collector
extremely fragile.
Digital Privacy Management
While the current focus and a critical component of digital privacy
management is the management of personal data (data-related technology
and policies), individuals' privacy concerns extend to the preservation of
personal spaces, and thus, personal boundary management.
1- Fraud:
Consumers depend on cyber laws to protect them from online fraud. Laws
are made to prevent identity theft, credit card theft and other financial
crimes that happen online.
2- Copyright:
The internet has made copyright violations easier. In early days of online
communication, copyright violations was too easy.
3- Defamation:
Several personnel use the internet to speak their mind. When people use the
internet to say things that are not true, it can cross the line into defamation.
Defamation laws are civil laws that save individuals from fake public
statements that can harm a business or someone’s personal reputation.
Cyber laws
4- Harassment and Stalking:
Sometimes online statements can violate criminal laws that forbid
harassment and stalking. When a person makes threatening statements
again and again about someone else online, there is violation of both civil
and criminal laws.
5- Freedom of Speech:
Freedom of speech is an important area of cyber law. Even though cyber laws
forbid certain behaviors online, freedom of speech laws also allow people to
speak their minds.
6- Trade Secrets:
Companies doing businesses online often depend on cyber laws to protect
their trade secrets. For example, Google and other online search engines
spend lots of time developing the algorithms that produce search results.
Origin Of Internet:
The internet came in the year 1960 with the creation of the first working model called
ARPANET (Advanced Research Projects Agency). It allowed multiple computers to
work on a single network that was their biggest achievement at that time. ARPANET
use packet switching to communicate multiple computer systems under a single
network. In October 1969, using ARPANET first message was transferred from one
computer to another. After that technology continues to grow.
Internet Information
How is the Internet set up?
The internet is set up with the help of physical optical fiber data transmission
cables or copper wires and various other networking mediums like LAN,
WAN, MAN, etc. For accessing the Internet even the 2g, 3g, and 4g services
and the wifi require these physical cable setup to access the Internet. There
is an authority named ICANN (Internet Corporation for Assigned Names and
Numbers) located in the USA which manages the Internet and protocols
related to it like IP addresses.
WWW is also known as W3. It offers a way to access documents spread over
the several servers over the internet. These documents may contain texts,
graphics, audio, video, hyperlinks. The hyperlinks allow the users to navigate
between the documents.
4- Video Conferencing
Video conferencing or Video teleconferencing is a method of communicating
by two-way video and audio transmission with help of telecommunication
technologies.
Internet, Intranet, Extranet, Ethernet Services
1- Internet: The Internet is a vast network that connects computers all over the
world. Through the Internet, people can share information and communicate from
anywhere with an Internet connection.
2- Intranet: An intranet can be defined as a private network used by an organization.
Its primary purpose is to help employees securely communicate with each other, to
store information, and to help collaborate. Modern intranets use social intranet
features that allow employees to create profiles and to submit, like, comment, and
share posts.
3- Extranet: An extranet is an organization’s private network and its available only for
selected users. It’s a way to connect to third parties like vendors, customers, and
partners in a secure and controlled way. The users typically have a login mechanism
such as username and password to access the network. Extranet in simple terms
provides a secure network for an organization to share information with relevant
people outside the organization. It is part of an organization’s intranet divided via a
firewall.
4- Ethernet: Ethernet is a type of communication protocol that connects computers
within what’s called a “local area network (LAN)” and a “wide area network (WAN).”
LAN and WAN connect various devices, such as laptops and printers, within homes,
buildings, and even small neighborhoods.
Difference Between Internet, Intranet, Extranet
Difference Between Internet, Intranet, Extranet