network basic
network basic
Webpage Design)
By Atul Bhatt
Network
• A computer network is a system in which multiple
computers are connected to each other to share
information and resources.
Characteristics of a Computer Network
• Share resources from one computer to another.
• Create files and store them in one computer, access
those files from the other computer(s) connected over
the network.
• Connect a printer, scanner, or a fax machine to one
computer within the network and let other computers of
the network use the machines available over the
network.
Internet
• It is a worldwide/global system of interconnected
computer networks. It uses the standard Internet
Protocol (TCP/IP). Every computer in Internet is
identified by a unique IP address. IP Address is a
unique set of numbers (such as 110.22.33.114) which
identifies a computer’s location.
Intranet
• Intranet is the system in which multiple PCs are
connected to each other. PCs in intranet are not
available to the world outside the intranet. Usually
each organization has its own Intranet network and
members/employees of that organization can
access the computers in their intranet.
Differences between Internet and Intranet
• Internet is general to PCs all over the world whereas
Intranet is specific to few PCs.
• Internet provides a wider and better access to websites to
a large population, whereas Intranet is restricted.
• Internet is not as safe as Intranet. Intranet can be safely
privatized as per the need.
Features Of Computer network
A list Of Computer network features is given
below.
• Communication speed
• File sharing
• Back up and Roll back is easy
• Software and Hardware sharing
• Security
Communication speed
Network provides us to communicate over the network in a fast and efficient manner. For
example, we can do video conferencing, email messaging, etc. over the internet.
Therefore, the computer network is a great way to share our knowledge and ideas.
File sharing
File sharing is one of the major advantage of the computer network. Computer network
provides us to share the files with each other.
Since the files are stored in the main server which is centrally located. Therefore, it is easy
to take the back up from the main server.
Software and Hardware sharing
We can install the applications on the main server, therefore, the user can
access the applications centrally. So, we do not need to install the software
on every machine. Similarly, hardware can also be shared.
Security
Network allows the security by ensuring that the user has the right to
access the certain files and applications.
ARPANET
• Advanced Research Projects Agency
Network, ARPANET or ARPAnet began development
in 1966 by the United States ARPA. ARPANET was a Wide
Area Network linking many Universities and research
centers, was first to use packet switching, and was the
beginning of what we consider the Internet today. ARPANET
was created to make it easier for people to access
computers, improve computer equipment, and to have a
more effective communication method for the military.
World Wide Web (WWW)
1. It is easier to do research
• The bus topology is designed in such a way that all the stations are connected through
a single cable known as a backbone cable.
• Each node is either connected to the backbone cable by drop cable or directly
connected to the backbone cable.
• When a node wants to send a message over the network, it puts a message over the
network. All the stations available in the network will receive the message whether it
has been addressed or not.
Advantages of Bus topology:
•Low-cost cable: In bus topology, nodes are directly connected to
the cable without passing through a hub. Therefore, the initial cost of
installation is low.
•There is only one path exists between two nodes for the data
transmission. Thus, it forms a parent-child hierarchy.
Advantages of Tree topology
•Easily expandable: We can add the new device to the existing network.
Therefore, we can say that tree topology is easily expandable.
•Failure: A tree topology mainly relies on main bus cable and failure in
main bus cable will damage the overall network.
Mesh topology
•Mesh technology is an arrangement
of the network in which computers
are interconnected with each other
through various redundant
connections.
•There are multiple paths from one
computer to another computer.
•It does not contain the switch, hub or any central computer which acts as a
central point of communication.
•The Internet is an example of the mesh topology.
•Mesh topology is mainly used for WAN implementations where
communication failures are a critical concern.
Advantages of Mesh topology:
Reliable: The mesh topology networks are very reliable as if any link
breakdown will not affect the communication between connected
computers.
Fast Communication: Communication is very fast between the
nodes.
•Reliable: If a fault occurs in any part of the network will not affect the
functioning of the rest of the network.
•Scalable: Size of the network can be easily expanded by adding new
devices without affecting the functionality of the existing network.
• Addresses in IPv6 are 128-bits, which allows for 3.4 x 1038 (2128) unique
addresses.
(MAC) Address
MAC Addresses are unique 48-bits hardware number of a computer, which is
embedded into network card (known as Network Interface Card) during the
time of manufacturing. MAC Address is also known as Physical Address of a
network device.
OSI Model
• OSI stands for Open System Interconnection is a reference model that
describes how information from a software application in one computer
moves through a physical medium to the software application in another
computer.
• OSI consists of seven layers, and each layer performs a particular network
function.
• OSI model was developed by the International Organization for
Standardization (ISO) in 1984, and it is now considered as an architectural
model for the inter-computer communications.
• OSI model divides the whole task into seven smaller and manageable
tasks. Each layer is assigned a particular task.
• Each layer is self-contained, so that task assigned to each layer can be
performed independently.
Characteristics of OSI Model:
•The OSI model is divided into two layers: upper layers and lower
layers.
•The upper layer of the OSI model mainly deals with the application
related issues, and they are implemented only in the software. The
application layer is closest to the end user. Both the end user and
the application layer interact with the software applications. An
upper layer refers to the layer just above another layer.
•The lower layer of the OSI model deals with the data transport
issues. The data link layer and the physical layer are implemented
in hardware and software. The physical layer is the lowest layer of
the OSI model and is closest to the physical medium. The physical
layer is mainly responsible for placing the information on the
physical medium.
Functions of the OSI Layers
Physical layer
•The main functionality of the physical layer is to transmit the individual bits
from one node to another node.
•It is the lowest layer of the OSI model.
•It establishes, maintains and deactivates the physical connection.
•Physical Layer: This layer defines the hardware, cabling wiring, power
output, pulse rate etc.
Functions of a Physical layer :
•Line Configuration: It defines the way how two or more devices can be
connected physically.
•Signals: It determines the type of the signal used for transmitting the
information.
Data-Link Layer
• This layer is responsible for the error-free transfer of data
frames.
• It defines the format of the data on the network.
• It provides a reliable and efficient communication
between two or more devices.
• It is mainly responsible for the unique identification of
each device that resides on a local network.
• It contains two sub-layers:
• Logical Link Control Layer
• It is responsible for transferring the packets to the Network layer
of the receiver that is receiving.
• It identifies the address of the network layer protocol from the
header.
• It also provides flow control.
• Media Access Control Layer
• A Media access control layer is a link between the Logical Link
Control layer and the network's physical layer.
• It is used for transferring the packets over the network.
2.Bit rate control: The Physical layer also defines the transmission rate i.e.
the number of bits sent per second.
2.Physical addressing: After creating frames, Data link layer adds physical
addresses (MAC address) of sender and/or receiver in the header of each frame.
3.Error control: Data link layer provides the mechanism of error control in which
it detects and retransmits damaged or lost frames.
4.Flow Control: The data rate must be constant on both sides else the data may
get corrupted thus , flow control coordinates that amount of data that can be sent
before receiving acknowledgement.
TCP refers to Transmission Control Protocol. OSI refers to Open Systems Interconnection.
TCP/IP does not have very strict boundaries. OSI has strict boundaries
TCP/IP uses both session and presentation OSI uses different session and presentation
layer in the application layer itself. layers.
TCP/IP developed protocols then model. OSI developed model then protocol.
1. Network Access Layer –
This layer corresponds to the combination of Data Link
Layer and Physical Layer of the OSI model. It looks out for
hardware addressing and the protocols present in this
layer allows for the physical transmission of data.
We just talked about ARP being a protocol of Internet
layer, but there is a conflict about declaring it as a protocol
of Internet Layer or Network access layer. It is described
as residing in layer 3, being encapsulated by layer 2
protocols.
2. Internet Layer –
This layer parallels the functions of OSI’s Network layer. It defines the
protocols which are responsible for logical transmission of data over the
entire network. The main protocols residing at this layer are :
Server
A server is a program that runs on the remote machine providing
services to the clients. When the client requests for a service, then the
server opens the door for the incoming requests, but it never initiates the
service.
A server program is an infinite program means that when it starts, it
runs infinitely unless the problem arises. The server waits for the
incoming requests from the clients. When the request arrives at the
server, then it responds to the request.
DNS Domain Name System.
• DNS stands for Domain Name System.
• DNS is a service that translates the domain name into IP addresses. This
allows the users of networks to utilize user-friendly names when looking for
other hosts instead of remembering the IP addresses.
DNS is a TCP/IP protocol used on different platforms. The domain name
space is divided into three different sections: generic domains, country
domains, and inverse domain.
Label Description
aero Airlines and aerospace companies
biz Businesses or firms
com Commercial Organizations
coop Cooperative business Organizations
3. The port number of SMTP is 25. The port number of POP3 is 110.
It is a MTA (Message Transfer Agent) for It is MAA (Message Access Agent) for accessing the
4.
sending the to the receiver. messages from mail box.
It has two MTAs one is client MTA (Message It has also two MAAs one is client MAA (Message
5. Transfer Agent) and second one is server Access Agent) and another is server is server (Message
MTA (Message Transfer Agent). Access Agent). MAA
6. SMTP is also known as PUSH protocol. POP3 is also known as POP protocol.
IMAP (Internet Message Access Protocol)
• IMAP (Internet Message Access Protocol) is a standard
email protocol that stores email messages on a mail server,
but allows the end user to view and manipulate the messages
as though they were stored locally on the end user's
computing device(s). This allows users to organize messages
into folders, have multiple client applications know which
messages have been read, flag messages for urgency or
follow-up and save draft messages on the server.
IMAP can be contrasted with another client/server email
protocol, Post Office Protocol 3 (POP3). With POP3, mail is
saved for the end user in a single mailbox on the server and
moved to the end user's device when the mail client opens.
While POP3 can be thought of as a "store-and-forward"
service, IMAP can be thought of as a remote file server.
Multipurpose Internet Mail Extension (MIME) Protocol
• Why do we need MIME?
Limitations of Simple Mail Transfer Protocol (SMTP):
• SMTP has a very simple structure
• It’s simplicity however comes with a price as it only send
messages in NVT 7-bit ASCII format.
• It cannot be used for languages that do not support 7-bit ASCII
format such as- French, German, Russian, Chinese and Japanese,
etc. so it cannot be transmitted using SMTP. So, in order to make
SMTP more broad we use MIME.
• t cannot be used to send binary files or video or audio data.
Purpose and Functionality of MIME –
Growing demand for Email Message as people also want to express in
terms of Multimedia. So, MIME another email application is introduced as it
is not restricted to textual data.
MIME transforms non-ASCII data at sender side to NVT 7-bit data and
delivers it to the client SMTP. The message at receiver side is transferred
back to the original data. As well as we can send video and audio data
using MIME as it transfers them also in 7-bit ASCII data.
Features of MIME –
It is able to send multiple attachments with a single message.
Unlimited message length.
Binary attachments (executables, images, audio, or video files) which may be
divided if needed.
MIME provided support for varying content types and multi-part messages.
Types of Transmission Media
These are easy to generate and can penetrate through buildings. The sending
and receiving antennas need not be aligned. Frequency Range:3KHz – 1GHz.
AM and FM radios and cordless phones use Radiowaves for transmission.
Further Categorized as (i) Terrestrial and (ii) Satellite.
ii) Microwaves –
It is a line of sight transmission i.e. the sending and receiving antennas need
to be properly aligned with each other. The distance covered by the signal is
directly proportional to the height of the antenna. Frequency Range:1GHz –
300GHz. These are majorly used for mobile phone communication and
television distribution.
(iii) Infrared –
Infrared waves are used for very short distance communication. They
cannot penetrate through obstacles. This prevents interference between
systems. Frequency Range:300GHz – 400THz. It is used in TV remotes,
wireless mouse, keyboard, printer, etc.
Web Hosting
Web hosting is a service that allows organizations and
individuals to post a website or web page onto the Internet. A
web host, or web hosting service provider, is a business that
provides the technologies and services needed for the website
or webpage to be viewed in the Internet. Websites are hosted,
or stored, on special computers called servers. When Internet
users want to view your website, all they need to do is type
your website address or domain into their browser. Their
computer will then connect to your server and your webpages
will be delivered to them through the browser.
Meta Search Engine
• A meta search engine is a type of search engine that
gives results based on a combination of results from
other search engine databases. It specializes in
concatenating databases from a variety of search
engines and linking search results to relevant
sources. To put it simply, a meta search engine
submits your query to several other search engines
and returns a summary of the results. Therefore, the
search results you receive are an aggregate result of
multiple searches.
JavaScript
• JavaScript is a lightweight programming
language(“scripting language”) and used to make web
pages interactive. It can insert dynamic text into HTML.
JavaScript is also known as browser’s language.
JavaScript(JS) is not similar or related to Java. Both the
languages have a C like a syntax and are widely used in
client-side Web applications, but there are few
similarities only. JavaScript is mainly used to make web
pages more interactive.
Java
• Java is an object-oriented programming language
and have virtual machine platform that allows you
to create compiled programs that run on nearly
every platform. Java promised, “Write Once, Run
Anywhere”. Java is used in a wide range of places,
including Android apps, credit card programming
and in the creation of desktop applications and
web enterprise applications.
Authentication
• Authentication is the process of verifying who you are. When you
log on to a PC with a user name and password you are
authenticating, Authentication is about validating your credentials
like User Name/User ID and password to verify your identity. The
system determines whether you are what you say you are using your
credentials. In public and private networks, the system authenticates
the user identity via login passwords. Authentication is usually done
by a username and password, and sometimes in conjunction with
factors of authentication, which refers to the various ways to be
authenticated.
Authorization
• Authorization the process of verifying that you have access
to something. Gaining access to a resource (e.g. directory on
a hard disk) because the permissions configured on it allow
you access is authorization. Authorization, on the other
hand, occurs after your identity is successfully authenticated
by the system, which ultimately gives you full permission to
access the resources such as information, files, databases,
funds, locations, almost anything.
Automated Teller Machine (ATM)
• An ATM, which stands for automated teller machine, is a
specialized computer that makes it convenient to
manage a bank account holder’s funds. It allows a
person to check account balances, withdraw or deposit
money, print a statement of account activities or
transactions, and even purchase stamps.
HTTP
• HTTP stands for HyperText Transfer Protocol.
• It is a protocol used to access the data on the World Wide Web (www).
• The HTTP protocol can be used to transfer the data in the form of plain
text, hypertext, audio, video, and so on.
• This protocol is known as HyperText Transfer Protocol because of its
efficiency that allows us to use in a hypertext environment where there
are rapid jumps from one document to another document.
• HTTP is similar to the FTP as it also transfers the files from one host to
another host. But, HTTP is simpler than FTP as HTTP uses only one
connection, i.e., no control connection to transfer the files.
• HTTP is used to carry the data in the form of MIME-like format.
Ethernet
In this, the same key (secret key) and In public key cryptography, two keys are used one
2. same algorithm is used to encrypt and key is used for encryption and another key is used
decrypt the message. for decryption.
In private key cryptography, the key is In public key cryptography, one of the two keys is
3.
kept secret. kept secret.
Private key is Symmetrical because
Public key is Asymmetrical because the is two type
4. there is only one key that is called secret
of key: private and public key.
key.
In this cryptography, sender and In this cryptography, sender and receiver does not
5.
receiver met to share a key. need to met.
MAC Address is a six byte hexadecimal IP Address is either four byte (IPv4) or six byte (IPv6)
2.
address. address.
A device attached with MAC Address can A device attached with IP Address can retrieve by RARP
3.
retrieve by ARP protocol. protocol.
TCP is a connection-oriented protocol. Connection- UDP is the Datagram oriented protocol. This is because there is
orientation means that the communicating devices should no overhead for opening a connection, maintaining a
establish a connection before transmitting data and should connection, and terminating a connection. UDP is efficient for
close the connection after transmitting the data. broadcast and multicast type of network transmission.
TCP is reliable as it guarantees delivery of data to the The delivery of data to the destination cannot be guaranteed in
destination router. UDP.
TCP provides extensive error checking mechanisms. It is
UDP has only the basic error checking mechanism using
because it provides flow control and acknowledgment of
checksums.
data.
Sequencing of data is a feature of Transmission Control
There is no sequencing of data in UDP. If ordering is required, it
Protocol (TCP). this means that packets arrive in-order at
has to be managed by the application layer.
the receiver.
TCP is comparatively slower than UDP. UDP is faster, simpler and more efficient than TCP.
Retransmission of lost packets is possible in TCP, but not in There is no retransmission of lost packets in User Datagram
UDP. Protocol (UDP).
TCP has a (20-80) bytes variable length header. UDP has a 8 bytes fixed length header.
TCP is heavy-weight. UDP is lightweight.
TCP doesn’t supports Broadcasting. UDP supports Broadcasting.
Internet Service Provider (ISP)
• An Internet service provider (ISP) is a company that provides
customers with Internet access. Data may be transmitted using
several technologies,
• Typically, ISPs also provide their customers with the ability to
communicate with one another by providing Internet email
accounts, usually with numerous email addresses at the
customer’s discretion. Other services, such as telephone and
television services, may be provided as well. The services and
service combinations may be unique to each ISP.
• An Internet service provider is also known as an Internet
access provider (IAP).
Search Engine
The above figure shows the HTTP transaction between client and server. The
client initiates a transaction by sending a request message to the server. The
server replies to the request message by sending a response message.
Uniform Resource Locator (URL)
• A client that wants to access the document in an internet
needs an address and to facilitate the access of
documents, the HTTP uses the concept of Uniform
Resource Locator (URL).
• The Uniform Resource Locator (URL) is a standard way of
specifying any kind of information on the internet.
• The URL defines four parts: method, host computer, port,
and path.
•Method: The method is the protocol used to retrieve the document from a
server. For example, HTTP.
•Host: The host is the computer where the information is stored, and the
computer is given an alias name. Web pages are mainly stored in the
computers and the computers are given an alias name that begins with the
characters "www". This field is not mandatory.
•Port: The URL can also contain the port number of the server, but it's an
optional field. If the port number is included, then it must come between
the host and path and it should be separated from the host by a colon.
•Path: Path is the pathname of the file where the information is stored. The
path itself contain slashes that separate the directories from the
subdirectories and files.
Computer Network Security
• Computer network security consists of measures taken by business
or some organizations to monitor and prevent unauthorized access
from the outside attackers.
• Different approaches to computer network security management
have different requirements depending on the size of the
computer network. For example, a home office requires basic
network security while large businesses require high maintenance
to prevent the network from malicious attacks.
• Network Administrator controls access to the data and software on
the network. A network administrator assigns the user ID and
password to the authorized person.
What is Cryptography?
• Cryptography is used to secure and protect data during
communication. It is helpful to prevent unauthorized person
or group of users from accessing any confidential data.
Encryption and decryption are the two essential
functionalities of cryptography.
• A message sent over the network is transformed into an
unrecognizable encrypted message known as data encryption.
At the receiving end, the received message is converted to its
original form known as decryption.
Encryption
• Encryption is a process which transforms the original
information into an unrecognizable form. This new form of
the message is entirely different from the original message.
That's why a hacker is not able to read the data as senders
use an encryption algorithm. Encryption is usually done
using key algorithms.
• Data is encrypted to make it safe from stealing. However,
many known companies also encrypt data to keep their
trade secret from their competitors.
Decryption?
• Decryption is a process of converting encoded/encrypted
data in a form that is readable and understood by a human or
a computer. This method is performed by un-encrypting the
text manually or by using keys used to encrypt the original
data.
Secure Socket Layer (SSL)
• Secure Socket Layer (SSL) provide security to the
data that is transferred between web browser and
server. SSL encrypt the link between a web server
and a browser which ensures that all data passed
between them remain private and free from attack.
Cloud Hosting
• The method of outsourcing an enterprise's processing
and storage capabilities to a service provider that
provides its networking services in a utility model is
cloud hosting.
• The cloud vendor supervised the setup, cloud storage,
protection and management, while customers will
configure hardware and applications and scale servers
online. Computing and storage services are dispersed
in a cloud computing configuration through hundreds
of virtual machines according to the load balance I / O
demand.
• A cheaper alternative to the conventional
dedicated server model that allows
enterprises to develop and maintain their
own data centers is the cloud storage
model. Servers with
dedicated hardware and virtual
infrastructure exist on-premises
throughout the conventional model, which
can be an expensive operational cost for
organizations.
• Top vendors/providers
• As a technology model, cloud computing systems have
fuelled a growth in the infrastructure under which a third-
party vendor, usually with a pay-per-use system, provides
a customer with the hardware, applications, servers,
storage and networking facilities.
• Amazon Web Services, the Google Cloud Portal, IBM Cloud
and Microsoft Azure are common providers who offer
cloud hosting. AWS, which provides comprehensive
storage facilities and more areas and zones than most
cloud vendors, is the leading competitor in the market. In
recent years, Azure and Google have gained momentum.
What is the GPU?
• GPU stands for Graphics Processing Unit. GPUs are also
known as video cards or graphics cards. In order to
display pictures, videos, and 2D or 3D animations, each
device uses a GPU. A GPU performs fast calculations of
arithmetic and frees up the CPU to do different things. A
GPU has lots of smaller cores made for multi-tasking,
while a CPU makes use of some cores primarily based
on sequential serial processing. In the world of
computing, graphics processing technology has
advanced to offer specific benefits. The modern GPUs
enables new possibilities in content creation, machine
learning, gaming, etc.
IoT (Internet of Things) Tutorial
• Let's us look closely at our mobile device which contains GPS Tracking,
Mobile Gyroscope, Adaptive brightness, Voice detection, Face
detection etc. These components have their own individual features,
but what about if these all communicate with each other to provide a
better environment? For example, the phone brightness is adjusted
based on my GPS location or my direction.
• Connecting everyday things embedded with electronics, software, and
sensors to internet enabling to collect and exchange data without
human interaction called as the Internet of Things (IoT).
• The term "Things" in the Internet of Things refers to anything and
everything in day to day life which is accessed or connected through
the internet.
• IoT is an advanced automation and analytics system which deals with
artificial intelligence, sensor, networking, electronic, cloud messaging
etc. to deliver complete systems for the product or services. The system
created by IoT has greater transparency, control, and performance.
• As we have a platform such as a cloud that contains all the data through
which we connect all the things around us. For example, a house,
where we can connect our home appliances such as air conditioner,
light, etc. through each other and all these things are managed at the
same platform. Since we have a platform, we can connect our car, track
its fuel meter, speed level, and also track the location of the car.
• If there is a common platform where all these things
can connect to each other would be great because
based on my preference, I can set the room
temperature. For example, if I love the room
temperature to to be set at 25 or 26-degree Celsius
when I reach back home from my office, then
according to my car location, my AC would start
before 10 minutes I arrive at home. This can be done
through the Internet of Things (IoT).
What is Big Data
• Data which are very large in size is
called Big Data. Normally we work on
data of size MB(WordDoc ,Excel) or
maximum GB(Movies, Codes) It is
stated that almost 90% of today's data
has been generated in the past 3 years.
Sources of Big Data
• These data come from many sources like
• Social networking sites: Facebook, Google, LinkedIn all these sites
generates huge amount of data on a day to day basis as they have
billions of users worldwide.
• E-commerce site: Sites like Amazon, Flipkart, Alibaba generates huge
amount of logs from which users buying trends can be traced.
• Weather Station: All the weather station and satellite gives very huge
data which are stored and manipulated to forecast weather.
• Telecom company: Telecom giants like Airtel, Vodafone study the user
trends and accordingly publish their plans and for this they store the
data of its million users.
• Share Market: Stock exchange across the world generates huge
amount of data through its daily transaction.
Artificial Intelligence
• In today's world, technology is growing very fast, and we are
getting in touch with different new technologies day by day.
Here, one of the booming technologies of computer science
is Artificial Intelligence which is ready to create a new
revolution in the world by making intelligent machines. The
Artificial Intelligence is now all around us. It is currently
working with a variety of subfields, ranging from general to
specific, such as self-driving cars, playing chess, proving
theorems, playing music, Painting, etc.
• AI is one of the fascinating and universal fields of Computer
science which has a great scope in future. AI holds a
tendency to cause a machine to work as a human.
• Artificial Intelligence is composed of two
words Artificial and Intelligence, where
Artificial defines "man-made," and intelligence
defines "thinking power", hence AI means "a
man-made thinking power.“
• So, we can define AI as:
• "It is a branch of computer science by which
we can create intelligent machines which can
behave like a human, think like humans, and
able to make decisions."
• Artificial Intelligence exists when a machine can have
human based skills such as learning, reasoning, and
solving problems
• With Artificial Intelligence you do not need to
preprogram a machine to do some work, despite that
you can create a machine with programmed algorithms
which can work with own intelligence, and that is the
awesomeness of AI.
• It is believed that AI is not a new technology, and some
people says that as per Greek myth, there were
Mechanical men in early days which can work and
behave like humans.
Automation
• Automation is the creation and application of
technologies to produce and deliver goods and
services with minimal human intervention. The
implementation of automation technologies,
techniques and processes improve the efficiency,
reliability, and/or speed of many tasks that were
previously performed by humans.
• Automation is being used in a number of areas
such as manufacturing, transport, utilities,
defense, facilities, operations and lately,
information technology.
What Is Cybersecurity?
• Cybersecurity is the practice of securing
networks, systems and any other digital
infrastructure from malicious attacks.
With cybercrime damages projected to exceed
a staggering $6 trillion by 2021, it’s no wonder
banks, tech companies, hospitals, government
agencies and just about every other sector are
investing in cybersecurity infrastructure to
protect their business practices and the
millions of customers that trust them with
their data.
Computer Network Security
• Computer network security consists of measures taken by
business or some organizations to monitor and prevent
unauthorized access from the outside attackers.
• Different approaches to computer network security
management have different requirements depending on the
size of the computer network. For example, a home office
requires basic network security while large businesses require
high maintenance to prevent the network from malicious
attacks.
• Network Administrator controls access to the data and
software on the network. A network administrator assigns the
user ID and password to the authorized person.
Aspects of Network Security: