KEMBAR78
Essentials of Computer Science Notes | PDF | Computer Network | Domain Name System
0% found this document useful (0 votes)
55 views41 pages

Essentials of Computer Science Notes

The document outlines the essentials of computer science, covering milestones in computer evolution, the history of computing, and key concepts such as networks, internet protocols, and cybersecurity. It details significant advancements from the abacus to modern innovations like cloud computing and the Internet of Things. Additionally, it discusses the role of Internet Service Providers and the importance of Domain Name Services in facilitating internet access and communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
55 views41 pages

Essentials of Computer Science Notes

The document outlines the essentials of computer science, covering milestones in computer evolution, the history of computing, and key concepts such as networks, internet protocols, and cybersecurity. It details significant advancements from the abacus to modern innovations like cloud computing and the Internet of Things. Additionally, it discusses the role of Internet Service Providers and the importance of Domain Name Services in facilitating internet access and communication.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 41

ESSENTIALS OF COMPUTER SCIENCE

UNIT V: ESSENTIALS OF COMPUTER SCIENCE: Milestones of computer evolution -


Internet, history, Internet Service Providers, Types of Networks, IP, Domain Name Services,
applications. Ethical and social implications: Network and security concepts- Information
Assurance Fundamentals, Cryptography-Symmetric and Asymmetric, Malware, Firewalls,
Fraud Techniques- Privacy and Data Protection

Computer Science is a multidisciplinary field that encompasses the study of computation,


algorithms, data structures, programming languages, computer systems, and the applications
of these principles.
• Algorithms and Data Structures: Algorithms are step-by-step procedures used to
solve problems.
• Programming Languages: Programming languages are used to write software and
instruct computers to perform specific tasks.
• Computer Architecture: Computer architecture deals with the design and
organization of computer systems, including processors, memory, storage, and
input/output devices.
• Operating Systems: Operating systems are software that manages computer
hardware and software resources, providing a convenient and efficient interface for
users and applications..
• Databases: Databases are systems for organizing, storing, and retrieving large
amounts of data..
• Networks and Communication: Networking involves the study of computer
networks, protocols, and communication between computers and devices.
• Artificial Intelligence and Machine Learning: Artificial Intelligence (AI) focuses
on creating intelligent systems that can simulate human-like intelligence. Machine
Learning is a subset of AI
• Software Engineering: Software Engineering deals with the systematic development
of software, including requirements analysis, software design, coding, testing, and
maintenance.
• Cyber security: With the increasing reliance on digital systems, cyber security has
become crucial. It involves protecting computer systems and networks from
unauthorized access, data breaches, and other forms of malicious activities
These are just some of the essential areas within Computer Science. The field
is vast and continually evolving, with new technologies and advancements emerging
regularly.

1
MILESTONES OF COMPUTER EVOLUTION
The evolution of computers can be traced back several centuries starting with
simple mechanical devices and progressing to the complex electronic systems we use
today

• Abacus (3000 BCE): The abacus, one of the earliest known calculating tools,
consisted of a series of beads or stones on rods used for arithmetic calculations.
• Analytical Engine (1837): Proposed by Charles Babbage the Analytical Engine was
a mechanical computing device that utilized punched cards for input and had the
capability to perform complex calculations.
• Vacuum Tubes (1940s): Vacuum tubes were electronic components used as switches
and amplifiers in early electronic computers
• ENIAC (1946): The Electronic Numerical Integrator and Computer (ENIAC) was
one of the first general-purpose electronic computers.
• Transistors (1947): The invention of the transistor by John Bardeen, Transistors
replaced vacuum tubes making computers smaller, more reliable, and more energy-
efficient.
• Integrated Circuits (1958): Jack Kilby and Robert Noyce independently integrated
circuit which allowed multiple transistors and other components to be miniaturized
onto a single silicon chip.
• Mainframe Computers (1960s): Mainframe computers were large centralized
machines capable of processing vast amounts of data.
• Microprocessors (1971): The invention of the microprocessor by Intel with the
release of the Intel 4004, marked a significant milestone. Microprocessors integrated
the functions of a central processing unit (CPU)
• Personal Computers (1980s): The introduction of personal computers, such as the
IBM PC and Apple Macintosh, made computing accessible to individuals.
• World Wide Web (1990): Tim Berners-Lee created the World Wide Web a system
of interlinked hypertext documents accessible via the internet.
• Mobile Computing (2000s): The rise of smartphones and tablets brought computing
to the fingertips of billions of people worldwide. Mobile devices the internet, apps,
and various services.
• Cloud Computing (2006): Cloud computing emerged as a paradigm where
computing resources such as storage and processing power, are accessed remotely
over the internet.

2
INTERNET
• The internet is a global network of interconnected computers and other devices that
allows for the exchange of information and communication across vast distances.

• The origin of Internet devised from the concept of Advanced Research Project
Agency Network (ARPANET).
• ARPANET was developed by United States Department of Defense.
• In 1972, the ARPANET spread over the globe with 23 nodes located at different
countries and thus became known as Internet

Advantages

Disadvantages

3
.
• Internet Protocols: Protocols are the rules and standards that govern how data is
transmitted, addressed, and processed on the internet.
• Networking Technologies: Various networking technologies enable the functioning
of the internet. These include Ethernet, Wi-Fi, routers, switches, and modems.
• Internet Services and Applications: The internet offers a wide range of services and
applications that leverage its connectivity.
• Internet of Things (IoT): The IoT refers to the network of interconnected devices,
sensors, and objects that communicate and exchange data over the internet.
• Data Communication and Networking: Computer scientists study the principles
and techniques of data communication and networking to understand how data is
transmitted, routed, and received across the internet.
• Web Development and Internet Technologies: Computer science encompasses the
development of web-based applications and technologies.
HISTORY
The history of computers spans several centuries, with the development of various
mechanical and electronic devices that paved the way for the modern computer.
Mechanical Computing Devices
• Abacus: The abacus, developed in ancient times, was the earliest known mechanical
device used for performing arithmetic calculations.
First Programmable Computing Devices
• Jacquard Loom: In the early 19th century, Joseph-Marie Jacquard developed a
mechanical loom that used punched cards to control the weaving of intricate patterns.
• Analytical Engine: In the mid-19th century, Charles Babbage designed the
Analytical Engine, a mechanical computing device that incorporated concepts like
conditional branching and loops.
Early Electronic Computers
• Atanas off-Berry Computer (ABC): In the late 1930s and early 1940s, physicist
John Atanasoff and engineer Clifford Berry developed the ABC,

4
• Colossus: During World War II, British code breakers developed the Colossus
computer to decrypt German messages.
• Stored-Program Computers and Transistors
• ENIAC: The Electronic Numerical Integrator and Computer (ENIAC), completed in
1945 was the first general-purpose electronic computer.
• Transistors: In the late 1940s, transistors were invented, replacing vacuum tubes and
enabling smaller, more reliable and faster electronic components

Miniaturization and Integrated Circuits


• Integrated Circuits: In the late 1950s and early 1960s, researchers developed
integrated circuits, which combined multiple transistors and other components on a
single semiconductor chip.
• IBM System/360: Introduced in 1964, the IBM System/360 mainframe series became
widely adopted and marked a significant step toward standardized computer
architectures
Personal Computers and the Microprocessor Revolution
• Microprocessors: In 1971 Intel released the first microprocessor, the Intel 4004.
Microprocessors combined the central processing unit (CPU) onto a single chip,
leading to the development of affordable and compact personal computers.
• Apple II and IBM PC: In the late 1970s and early 1980s, machines like the Apple II
and the IBM Personal Computer (PC) popularized personal computing and brought
computers into homes and offices
Graphical User Interfaces and the Internet Age
• Graphical User Interfaces (GUI): In the 1980s, GUIs, such as those introduced by
Apple's Macintosh and Microsoft's Windows, made computers more user-friendly by
replacing text-based interfaces with visual elements like icons and windows.
• Internet and World Wide Web: In the 1990s, the internet became widely accessible
to the public, connecting computers globally and enabling the development of the
World Wide Web.

Mobile Computing and Modern Innovations:


• Smartphones and Tablets: Starting in the 2000s, the introduction of smartphones,
led by devices like the iPhone and Android-based phones, revolutionized mobile
computing, integrating communication.
• Cloud Computing and Big Data: The rise of cloud computing allowed for the
storage and processing of vast amounts of data, leading to advancements in fields like
data analytics.

5
• Internet of Things (IoT): With the growth of IoT, everyday objects are now
connected to the internet, enabling them to collect and exchange data.
Internet Service Providers
• An Internet Service Provider (ISP) is a company or organization that provides internet
access to individuals, businesses, and other entities.
• ISPs connect users to the internet, enabling them to browse websites, send and receive
emails, stream videos, and engage in various online activities.
• ISPs typically offer different types of internet connections, including dial-up, DSL
(Digital Subscriber Line), cable, fiber optic, and wireless

Characteristics
• E-mail Account:
• User Support:
• Access to high-speed internet:
• Spam Blocker:
• Web Hosting:

Advantages
• The customer need not then bother with either the technicalities
• Many ISPs, being professional companies, provide its clientele with high-speed
internet.
• ISPs offer a very high degree of reliability and availability

Disadvantages
• Because of the range of options available in the market and due to cut-throat
competition,

6
• If an Internet Service Provider is stretched thin because of hosting too many sites on a
shared server,.
Common Types of ISPs
• Dial-up ISPs: Dial-up ISPs were popular in the early days of the internet. Users
would connect to the internet using a modem and a telephone line.
• DSL ISPs: DSL ISPs use existing telephone lines to provide internet access. DSL
offers faster speeds compared to dial-up but is generally slower than cable or fiber
optic connections.
• Cable ISPs: Cable ISPs provide internet access over coaxial cables that are primarily
used for cable television.
• Fiber Optic ISPs: Fiber optic ISPs deliver internet access through fiber optic cables,
which transmit data using light signals.
• Wireless ISPs: Wireless ISPs (WISPs) use wireless technologies, such as radio waves
or satellite signals, to provide internet access.
• Mobile ISPs: Mobile ISPs offer internet access through cellular networks. Users can
connect to the internet using smartphones, tablets, or other mobile devices.
Types of Networks
There are several types of networks that are commonly used to connect devices and
facilitate communication and data sharing.

Common Types of Networks:


• Local Area Network (LAN): A Local Area Network is a network that connects
devices within a limited geographical area
• LANs typically use wired Ethernet connections or Wi-Fi to connect computers,
printers, servers, and other devices.

7
Wide Area Network (WAN):
• A Wide Area Network covers a larger geographic area, such as multiple buildings,
cities, or even countries.
• WANs are typically used to connect multiple LANs and provide connectivity between
different locations.

Metropolitan Area Network (MAN):


• A Metropolitan Area Network spans a larger area than a LAN but smaller than a
WAN, typically covering a city or a metropolitan area.
• MANs are designed to interconnect multiple LANs within a specific geographic
region.

Wireless Network
• A wireless network allows devices to connect to a network without the need for
physical cables.

8
• Wi-Fi is a common example of a wireless network, enabling devices such as laptops,
smartphones, and tablets to connect to a LAN or the internet.

Campus Area Network (CAN):


• A Campus Area Network is a network that covers a university campus, corporate
campus, or similar large-scale environments.
• CANs connect multiple buildings or facilities within a confined geographic area.

Virtual Private Network (VPN):


• A Virtual Private Network is a secure network connection established over a public
network infrastructure, such as the internet.
• VPNs provide encrypted communication channels to connect remote users or branch
offices to a private network allowing them to access resources securely

Intranet and Extranet


• An Intranet is a private network that uses internet protocols and technologies to share
information and resources within an organization.

9
• It provides a platform for internal communication, collaboration, and document
sharing.
• It enables secure collaboration and information sharing with external entities

Advantages of Computer Network


• Central Storage of Data: Files are stored on a central storage database which helps
to easily access and available to everyone.
• Sharing of Files: Files and data can be easily shared among multiple devices.

Disadvantages of Computer Network


• Virus and Malware: A virus is a program that can infect other programs by
modifying them.
• High Cost of Setup: The initial setup of Computer Networking is expensive because
it consists of a lot of wires and cables along with the device.
Network IP
An IP (Internet Protocol) address is a unique numerical label assigned to each device
connected to a computer network that uses the Internet Protocol for communication.
IP addresses serve two main purposes identifying the host or network interface and
providing a means for communication within a network and across different networks
Two Main Versions of IP Addresses
• IPv4 (Internet Protocol version 4): IPv4 is the most widely used version of IP
addressing. It uses a 32-bit address format, represented by four sets of numbers
separated by dots (e.g., 192.168.0.1). Each set of numbers, called an octet, can range
from 0 to 255

IPv6 (Internet Protocol version 6)


• IPv6 is the latest version of IP addressing designed to address the limitations of IPv4.
• It uses a 128-bit address format represented by eight sets of hexadecimal numbers
separated by colons

Key Points about IP addresses

10
• Public IP Address: A public IP address is assigned to a device directly connected to
the internet.
• It is unique and globally routable, allowing the device to communicate with other
devices on the internet.
• IPv4: 10.0.0.0 to 10.255.255.255, 172.16.0.0 to 172.31.255.255, and 192.168.0.0 to
192.168.255.255.
• IPv6: fc00::/7 (Unique Local Addresses) and fd00::/8 (Private-Use Addresses)
Sub Netting
• Sub netting is the process of dividing a larger network into smaller sub networks
called subnets.
• Sub netting helps optimize network performance, improve security, and efficiently
utilize IP addresses.

DNS (Domain Name System)


• DNS is a system that translates domain names into their corresponding IP addresses.
• DNS allows users to access websites and services using easy-to-remember domain
names rather than IP addresses

Domain Name Services


Domain Name Services (DNS) is a fundamental technology used on the Internet to
translate human-readable domain names into IP addresses, allowing users to access
websites and other resources using easy-to-remember names rather than numeric IP
addresses.

11
DNS Work Components
• Domain Names: Domain names are user-friendly hierarchical, and human-readable
names that represent specific resources on the Internet.
• IP Addresses: IP (Internet Protocol) addresses are numeric identifiers assigned to
every device connected to the Internet. For example, "192.0.2.1" is an IP address.
DNS Resolution Process
• When you enter a domain into your web browser or any other application, the DNS
resolution process begins. It involves the following steps

• Caching: Your device first checks its local DNS cache to see if the domain name and
its corresponding IP address have been recently accessed.
• Root Servers: If the DNS resolver doesn't have the requested information, it contacts
one of the 13 root DNS servers worldwide.
• TLD Servers: The root server directs the resolver to the appropriate TLD server
based on the domain's extension
• Authoritative Servers: The TLD server in turn, directs the resolver to the
authoritative DNS server responsible for the specific domain name
• IP Address Retrieval: The authoritative DNS server finally returns the corresponding
IP address for the requested domain name.
• DNS Response: The DNS resolver caches the IP address and sends the information
back to your device
• DNS Records: DNS records are stored on authoritative DNS servers and contain
various types of data related to domain names

12
Applications
• It seems like you're asking about general applications not necessarily network
applications.
• They can range from productivity tools to entertainment and there are countless
applications available across various platforms.
Productivity Applications
• Word Processors (e.g., Microsoft Word, Google Docs)
• Spread sheets (e.g., Microsoft Excel, Google Sheets)
• Presentation Software (e.g., Microsoft PowerPoint, Google Slides)
Communication and Social Media Applications
• Messaging Apps (e.g., WhatsApp, Facebook Messenger)
• Social Networking Apps (e.g., Facebook, Twitter, Instagram)
• Video Calling Apps (e.g., Zoom, Skype)

Web Browsers:
• Google Chrome,
• Mozilla Firefox,
• Apple Safari,
• Microsoft Edge
Travel and Navigation Applications
• Mapping and GPS Apps (e.g., Google Maps, Waze)
• Travel Planning Apps (e.g., Airbnb, Expedia)

Finance Applications:
• Online Banking Apps (e.g., Chase Mobile, PayPal)
• Budgeting and Expense Tracking Apps (e.g., Mint, YNAB)
Ethical and Social Implications
Ethical and social implications refer to the potential consequences and considerations
As technology becomes increasingly integrated into various aspects of our lives,

13
• Privacy and Data Protection: Advancements in technology have led to the
collection and storage of vast amounts of personal data.
• Artificial Intelligence and Automation: As AI and automation continue to advance
there are ethical considerations the impact on employment and the potential for biased
decision-making algorithms.
• Cyber security and Hacking: The digital world is vulnerable to cyber-attacks and
hacking incidents that can disrupt critical infrastructure steal sensitive information.
• Environmental Impact: The rapid growth of technology and electronic devices leads
to a significant environmental impact manufacturing processes.
• Globalization and Cultural Impact: The interconnectedness of the world through
technology can lead to cultural homogenization and the loss of traditional practices
and languages.
• Ethical Use of Emerging Technologies: Technologies like virtual reality, augmented
reality and brain-computer interfaces raise ethical questions about privacy, consent,
and potential misuse.
• Intellectual Property and Copyright: Digital technologies make it easier to
reproduce and distribute copyrighted material raising concerns about intellectual
property rights and fair compensation for creators
Network and Security Concepts
• Network and security concepts encompass a wide range of principles, protocols, and
practices that play a crucial role in establishing, maintaining, and protecting computer
networks
• These concepts is essential for building reliable and secure network infrastructures

14
• Network Topologies: Network topology refers to the physical or logical layout of
devices in a network
• Network Protocols: Protocols are rules and conventions that govern data
communication between devices on a network.
• IP Addressing: IP addresses are unique numeric identifiers assigned to devices on a
network. IPv4 (32-bit) and IPv6 (128-bit) are the two main versions of IP addressing
used to route data between devices across the Internet.
• Sub netting: Sub netting is the process of dividing a large IP network into smaller
more manageable sub networks. It allows for efficient IP address allocation and
improves network performance
• Routing and Switching: Routers and switches are essential network devices that
enable data packets to be forwarded between devices in different networks
• Firewalls: Firewalls are security devices that monitor and control incoming and
outgoing network traffic based on predetermined security rules.

• VPN (Virtual Private Network): A VPN allows secure remote access to a private
network over a public network, such as the Internet.

15
• Encryption: Encryption is the process of converting data into a code to prevent
unauthorized access.
• Access Control: Access control mechanisms determine who can access specific
network resources and access .
• Network Segmentation: Network segmentation involves dividing a large network
into smaller isolated segments.
• Load Balancing: Load balancing distributes network traffic across multiple servers
or devices to ensure efficient resource utilization and prevent network congestion
• Disaster Recovery and Redundancy: Disaster recovery strategies and redundancy
mechanisms implemented to ensure business continuity in the event of network
failures
• Social Engineering: Social engineering involves manipulating individuals into
divulging confidential information or performing actions that compromise network
security.
Information Assurance Fundamentals
Information Assurance (IA) is a multidisciplinary approach to protecting and
managing information assets, ensuring the confidentiality, integrity, availability, and
authenticity of information.
Fundamentals of Information Assurance
• Information Security: It involves protecting information from various threats, such
as cyber-attacks, data breaches, and insider threats.
• Risk Management: Risk management is the process of identifying, assessing, and
mitigating risks to information assets.
• Confidentiality: Confidentiality ensures that sensitive information is accessible only
to authorized individuals or entities and is protected from unauthorized disclosure.
• Integrity: Integrity guarantees that information remains accurate complete, and
unaltered throughout its lifecycle.
• Availability: Availability ensures that information and information systems are
accessible and operational when needed.
• Authentication: Authentication is the process of verifying the identity of users
devices, or entities attempting to access information or resources.
• Authorization: Authorization determines what actions or resources users or entities
are allowed to access after successful authentication.
• Non-Repudiation: Non-repudiation prevents individuals from denying their actions
or transactions.
• Compliance: Compliance ensures that organizations adhere to relevant laws,
regulations, and industry standards concerning information security and privacy

16
• Training and Awareness: Educating employees and stakeholders about security best
practices and potential threats
Cryptography-Symmetric and Asymmetric
• Cryptography is the science and practice of secure communication and data protection
through the use of mathematical algorithms and keys.
• It plays a vital role in ensuring the confidentiality integrity, and authenticity of
information.
• There are two primary types of cryptographic systems:
• symmetric cryptography
• asymmetric cryptography
Symmetric Cryptography
• Symmetric cryptography involves the use of a single secret key for both encryption
and decryption of data.
• The sender and receiver must share this secret key in advance making secure key
distribution a significant challenge

Overview of The Process


• Encryption: The sender uses the shared secret key to encrypt the plaintext data,
producing cipher text.
• Decryption: The receiver uses the same shared secret key to decrypt the cipher text
and retrieve the original plaintext
Advantages of Symmetric Cryptography
• Faster processing: Symmetric algorithms are generally faster and more efficient than
asymmetric algorithms, making them suitable for bulk data encryption.
• Simplicity: The process of encryption and decryption is straightforward since it uses
the same key for both operations
Disadvantages of Symmetric Cryptography
• Key distribution: One of the main challenges in symmetric cryptography is securely
distributing the secret key to all parties.

17
• Lack of non-repudiation: Symmetric cryptography does not provide a mechanism
for non-repudiation meaning the sender of a message can deny having sent it.
Asymmetric Cryptography
• Asymmetric cryptography uses a pair of mathematically related keys: a public key
and a private key.
• The public key is widely distributed and used for encryption, while the private key is
kept secret and used for decryption
Overview of The Process:
• Encryption: The sender uses the recipient's public key to encrypt the plaintext data,
generating cipher text.
• Decryption: The receiver uses their private key to decrypt the cipher text and recover
the original plaintext

Advantages of Asymmetric Cryptography


• Key distribution: Asymmetric cryptography eliminates the need for a secure key
distribution mechanism since the public keys can be freely shared.
• Non-repudiation: Asymmetric algorithms support digital signatures providing a way
to ensure the authenticity and integrity of messages and preventing the sender
Disadvantages of Asymmetric Cryptography
• Slower processing: Asymmetric algorithms are computationally more intensive than
symmetric algorithms, making them less efficient for large-scale data encryption.
• Key management: Managing and securely storing private keys is crucial to maintain
the security of asymmetric systems
Malware
Malware in a network is significant threat as it has the potential to spread rapidly
compromise multiple devices and cause extensive damage.
When malware infects a network it can disrupt operations steal sensitive data, and
compromise the overall security of the network
Common Malware

18
• Phishing Attacks: Phishing emails or messages with malicious attachments or links
are often used to trick users into downloading malware.
• Infected Removable Media: Malware can spread through infected USB drives
external hard drives to a network device, the malware may transfer to that device and
start infecting other connected devices
• Malicious Advertisements: Users may unknowingly click on these ads, leading to
malware infection on their devices.
• Insider Threats: Malicious actors within an organization can intentionally introduce
malware into the network.
Various Techniques
• Worm-like Behavior: Some malware, such as worms, are specifically designed to
self-propagate through network connections.
• Credential Theft: Malware can steal login credentials or use brute-force attacks to
compromise other devices or servers within the network.
• Lateral Movement: Malware can move laterally within a network exploiting weak
security controls to critical systems
Protect Malware Organizations
• Use reliable and up-to-date antivirus and anti-malware software on all network
devices.
• Regularly apply security patches and updates to close known vulnerabilities.
• Implement firewalls, intrusion detection and prevention systems (IDS/IPS), and other
network security measures.
Firewalls
• Firewalls are network security devices that act as a barrier between a trusted internal
network and an untrusted external network.
• Firewalls play a crucial role in protecting the network from unauthorized access
malicious activities, and potential cyber threats

19
Firewalls Work
• Packet Filtering: The basic function of a firewall is packet filtering, which means
examining individual data packets as they pass through the firewall. The firewall
checks the packet headers and applies filtering

• Application Layer Filtering: Some advanced firewalls go beyond simple packet


filtering and perform deep packet inspection (DPI) at the application layer.
• Network Address Translation (NAT): Firewalls often use Network Address
Translation to translate internal private IP addresses to a single public IP address
communicating with external networks.
• Virtual Private Network (VPN) Support: Firewalls can provide VPN functionality,
allowing remote users to securely connect to the internal network over the Internet.
• Access Control: Firewalls use access control lists (ACLs) to define rules that permit
or deny traffic based on various criteria, such as source/destination IP addresses, port
numbers, and time of day
• Web Filtering: Web filtering allows firewalls to block access to specific websites or
types of content based on predefined categories or custom rules.
• High Availability: For critical network environments firewalls is high availability
configurations where redundant firewalls work in tandem to ensure continuous
protection and minimize downtime

Fraud Techniques
Fraud techniques encompass a range of deceptive practices used to deceive
individuals, businesses, or systems in order to gain unauthorized access steal sensitive
information or obtain financial benefits

20
Overview Fraud Techniques
• Phishing: Phishing involves sending fraudulent emails, messages, sensitive
information, such as login credentials, credit card numbers, or personal details.
• Social Engineering: Social engineering relies on manipulating people into divulging
confidential information actions that compromise security.
• Identity Theft: Identity theft occurs when fraudsters steal someone's personal
information to impersonate them for financial gain or to commit other crimes.
• Malware: Fraudsters use malicious software to infect devices and steal information,
gain unauthorized access or cause harm
• Card Skimming: This technique involves installing devices on payment terminals or
ATMs to capture credit or debit card information when users make transactions.

Privacy and Data Protection


• Privacy and data protection are crucial aspects of modern digital life aimed at
safeguarding individuals' personal information from unauthorized access use
Privacy
• Privacy refers to an individual's right to control and manage their personal
information.

21
• Informational Privacy: Ensuring that personal information collected about
individuals is used only for the intended purposes and is not shared or sold to third
parties without explicit consent.
• Bodily Privacy: Protecting an individual's physical body from intrusive actions or
surveillance.
• Communication Privacy: Securing the confidentiality of communications, such as
emails messages, and phone calls, from unauthorized interception or monitoring
Data Protection
• Data protection refers to the measures and practices put in place to safeguard personal
data from unauthorized access, loss, alteration, or disclosure.

Components of Data Protection


• Data Collection and Processing: Organizations must be transparent about what data
they collect why they collect it, and how they process it.
• Data Security: Implementing technical and organizational measures to protect
personal data from unauthorized access, data breaches, and cyber-attacks.
• Data Minimization: Collecting and retaining only the necessary data required to
fulfill the intended purpose and minimizing data collection to limit potential risks.
• Data Subject Rights: Providing individuals with rights to access their data, correct
inaccuracies, restrict processing, and request the deletion of their personal information
• Data Transfer: Ensuring that when personal data is transferred across borders it is
done so in compliance with relevant laws and regulations.
Data Protection Regulations
• Data Protection Regulations Various countries and regions have enacted data
protection regulations to govern how organizations handle personal data.

22
Regulations
• General Data Protection Regulation (GDPR): Enforced in the European Union
(EU), GDPR sets comprehensive data protection rules and provides individuals with
enhanced rights over their data.
• Health Insurance Portability and Accountability Act (HIPAA): A U.S. law that
mandates data privacy and security standards for protected health information

23
ADVANCED APPLICATION OF COMPUTER SCIENCE
UNIT V: Advanced Applications of computer Science Number System-Binary,
Octal, decimal, and Hexadecimal, Signals-Analog, Digital, Modem, Codec,
Multiplexing, Transmission media, error detection and correction- Parity check and
CRC, Networking devices- Repeater, hub, bridge, switch, router, gateway.

Number System
A number system is a way of representing and expressing quantities in a systematic
and organized manner.
Different number systems have been developed and used throughout history, and they
serve as the foundation for mathematics and various computing systems
Common Number Systems
• Decimal Number System (Base-10): The decimal system is the one we use in our
day-to-day lives.
• It has ten digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, and 9. Each digit's position represents a power
of 10.
• For example, in the number "365," the '3' is in the hundreds place (10^2), the '6' is in
the tens place (10^1), and the '5' is in the units place (10^0)

Binary Number System (Base-2)


• Binary Number System (Base-2): The binary system is widely used in computing
and digital electronics.
• It has only two digits: 0 and 1. Each digit's position represents a power of 2.
• For example, in the binary number "1101," the '1' on the left is in the 2^3 (8s) place,
followed by 2^2 (4s), 2^1 (2s), and finally 2^0 (1s).

24
Octal Number System (Base-8)
• Octal Number System (Base-8): The octal system uses eight digits: 0, 1, 2, 3, 4, 5, 6,
and 7.
• Each digit's position represents a power of 8.
• Octal is less common today but is still sometimes used in computing

Hexadecimal Number System (Base-16)


• Hexadecimal Number System (Base-16): The hexadecimal system is also essential
in computing and digital systems.
• It has sixteen digits: 0, 1, 2, 3, 4, 5, 6, 7, 8, 9, A, B, C, D, E, and F. The letters A to F
represent the values 10 to 15, respectively.
• Each digit's position represents a power of 16

• Converting between number systems can be achieved by using algorithms or


multiplying by the base of the target number system.
• Different number systems have specific use cases and advantages.

25
• For example, binary is used in computers because it directly maps to electronic on/off
states (0s and 1s).
Signals-Analog
• Analog signals are a fundamental concept in the field of electronics and
communication.
• They are a type of signal that represents information as continuous, varying quantities.
• In contrast to digital signals, which are discrete and represent information using a
series of 0s and 1s, analog signals convey data as continuous changes in voltage,
current, or frequency over time

Overview of Analog Signals


• Continuous Variation: Analog signals can take any value within a specific range,
and the values change smoothly over time.
• Waveform Representation: Analog signals are typically represented by waveforms.
• Signal Amplitude: The amplitude of an analog signal refers to the maximum value it
can attain during one cycle or period of the waveform.
• Frequency and Period: Analog signals can be periodic, meaning they repeat the
same waveform over regular intervals.
• Real-World Representation: Analog signals are commonly found in the real world.
• Signal Degradation: Analog signals are susceptible to noise and distortion during
transmission
• Analog Devices: Analog signals are prevalent in various electronic devices and
analog sensors used to measure physical quantities like temperature pressure
• Analog-to-Digital Conversion: To process or transmit analog signals using digital
systems, they must first be converted into digital form through a process called
analog-to-digital conversion (ADC).
Digital

26
• A digital system is a type of system that processes and represents data using discrete
values, typically in the form of binary digits, also known as "bits," which can be either
0 or 1.
Overview of Digital Systems:
• Binary Representation: In a digital system, data is represented using binary digits
(0s and 1s).
• Discrete Levels: Digital signals are discrete, meaning they can only take specific,
well-defined levels (0 and 1). This is in contrast to analog signals.
• Boolean Logic: Digital systems use Boolean logic to perform operations and make
decisions with true and false values, represented as 1 and 0, respectively. Logic gates,
such as AND, OR, NOT, and XOR, form the building blocks of digital circuits.
• Digital Circuits: Digital systems consist of electronic circuits that process digital
signals such as arithmetic operations, data storage, and logical decision-making
• Microprocessors and Microcontrollers: Microprocessors are central processing
units (CPUs) found in computers and other digital devices.
• Digital Communication: Digital technology is used extensively in communication
systems.
• Digital Storage: Digital data can be stored in various media, such as hard drives,
solid-state drives (SSDs), USB flash drives, and optical discs.
• Digital Signal Processing (DSP): Digital signal processing involves manipulating
digital signals to extract information
• Digital Entertainment: Digital technology has revolutionized entertainment
industries.
• Digital Security: Digital systems face various security challenges, such as data
breaches, hacking, and malware.
Modem
A modem, short for "modulator-demodulator," is a communication device used to
transmit and receive digital data over analog communication channels.
It is a critical component in connecting digital devices such as computers to analog
communication networks like telephone lines or cable systems.
Overview of Modems
• Modulation and Demodulation: The primary function of a modem is to convert
digital signals from a computer into analog signals for transmission over an analog
medium (modulation), and then convert the received analog signals back into digital
signals (demodulation) that can be understood by the digital device on the other end
Types of Modems

27
• Telephone Modems: These are the most common type of modems used historically
to connect computers to the public switched telephone network (PSTN) for dial-up
internet access.
• Cable Modems: Cable modems are used to access the internet via cable television
infrastructure.
Data Transmission Speeds
• Data Transmission Speeds: Modems are rated by their data transmission speeds,
usually expressed in bits per second (bps) or a multiple
• Connection Interfaces: Modems can connect to devices using various interfaces,
including serial ports (RS-232), USB, or Ethernet.
Obsolete Technology
• Traditional dial-up modems have become largely obsolete due to the widespread
availability of high-speed broadband internet connections like DSL, cable, fiber optic,
and wireless technologies they were essential in the early days of the internet when
broadband access was limited
• DSL Modems and Routers: DSL (Digital Subscriber Line) modems are commonly
used in homes and businesses to provide internet access over telephone lines.
Integrated Modems
• In many cases modems are now integrated into other devices such as routers, which
are often provided by internet service providers (ISPs) to customers for internet
connectivity.
Security Considerations
• With the rise of broadband internet connections, security concerns related to modems
have evolved.
• Firewalls and security features are now essential to protect against unauthorized
access and cyber threats
Codec
• A codec, short for "coder-decoder" or "compressor-decompressor," is a technology
used to encode (compress) and decode (decompress) data for efficient storage,
transmission, and playback.
• Codecs are widely used in various fields, including audio, video, and
telecommunications.
Data Compression
• Data Compression: The primary purpose of codecs is data compression which
reduces the size of digital data by eliminating redundant or unnecessary information.
• Lossless Codec: A lossless codec compresses data without any loss of quality. When
the data is decompressed, it is identical to the original, uncompressed data.

28
• Lossy Codec: A lossy codec achieves higher compression ratios by selectively
discarding some data. The loss of some detail is often imperceptible to human senses
Audio Codecs
• MP3 (MPEG Audio Layer III): A lossy audio codec commonly used for music and
audio streaming.
• AAC (Advanced Audio Codec): Another lossy codec used for audio compression,
known for its high quality at lower bit rates.
Video Codecs
• H.264 (AVC): A widely used and efficient video codec for various applications,
including online streaming and video conferencing.
• Real-Time Communication: In video conferencing and VoIP applications, codecs
play a crucial role in compressing audio and video data to ensure smooth real-time
communication over the internet
• Container Formats: Codecs are often used in combination with container formats
which provide a way to package compressed audio and video data, along with other
multimedia elements, into a single file
Hardware and Software Codecs
• Hardware and Software Codecs: Codecs can be implemented in both hardware and
software.
• They have revolutionized digital media allowing us to enjoy high-quality content
while minimizing data size and bandwidth requirements
Multiplexing
Multiplexing is a technique used in telecommunications and data communication to
combine multiple signals into a single transmission channel.
Multiplexing plays a crucial role in modern communication systems allowing multiple
to share a common communication link

Overview of Multiplexing
• Multiplexing takes advantage of the fact that different signals or data streams can be
combined without interfering with each other as long as they occupy different
frequency ranges or time slots.
Types of Multiplexing

29
• Frequency Division Multiplexing (FDM): FDM divides the available frequency
spectrum into multiple non-overlapping frequency bands, with each band assigned to
a different signal or data stream.
• Time Division Multiplexing (TDM): TDM allocates specific time slots within a
transmission cycle to different signals or data streams.
• Statistical Time Division Multiplexing (STDM): STDM is a variation of TDM that
dynamically allocates time slots to signals based on demand.

Wavelength Division Multiplexing (WDM):


• Wavelength Division Multiplexing (WDM): WDM is a multiplexing technique used
in fiber-optic communication systems.

• Code Division Multiplexing (CDM): CDM assigns a unique code to each signal or
data stream and then combines them.
• The receiver can isolate and decode the individual signals using the corresponding
codes.
Space Division Multiplexing
• Space Division Multiplexing (SDM): SDM uses physical separation in space to
multiplex signals.
Multiplexing in Networking
• Frequency Division Multiple Accesses (FDMA): Divides the radio frequency
spectrum into non-overlapping frequency channels.
• Time Division Multiple Access (TDMA): Divides time into discrete slots, allowing
multiple users to share the same frequency channel
• Orthogonal Frequency Division Multiplexing (OFDM): A popular modulation
technique that divides a high-speed data stream into multiple lower-speed sub
streams,
Transmission Media

30
• Transmission media also known as communication channels or communication links,
are the physical pathways that carry signals and data between devices in a
communication system.

Types of Transmission Media:


• Twisted Pair Cable:
• Unshielded Twisted Pair (UTP) and Shielded Twisted Pair (STP) are commonly used
for local area networks (LANs) and telephone systems.

Coaxial Cable
• Coaxial cables consist of a central conductor surrounded by an insulating layer a
metallic shield, and an outer jacket.
Fiber Optic Cable
• Fiber optic cables use strands of glass or plastic to transmit data as pulses of light.
• Fiber optic cables are widely used in long-distance telecommunications, internet
backbone networks, and high-speed data networks
Wireless Transmission
• Wireless transmission media use electromagnetic waves to transmit data without
physical cables.
Satellite Communication
• Satellite communication uses geostationary or low-earth-orbit satellites to relay
signals over long distances.

31
Infrared Transmission:
• Infrared transmission uses infrared light to transmit data between devices.
• It is commonly used for short-range communication between devices like remote
controls and some wireless keyboards
Microwave Transmission
• Microwave transmission uses microwave frequencies to transmit data over point-to-
point links.
• It is used in backhaul networks, connecting cell towers to the core network, and in
certain wireless communication applications

Power Line Communication


• PLC utilizes existing electrical power lines to carry data signals.
• It is used for home networking, smart grid applications, and some industrial
communication systems.
• The data exchange and connectivity between devices and users
Error Detection and Correction
Error detection and correction is a crucial concept in information and communication
systems.
Errors is introduced various factors such as noise in the communication channel
hardware malfunctions

Goals of Error Detection and Correction


• Error Detection: The primary objective is to identify whether errors have occurred
during data transmission.
• Error Correction: When errors are detected error correction techniques aim to
restore the original data either directly correcting the errors or requesting a
retransmission of the corrupted data

32
Error Detection and Correction Techniques

Error Detection and Correction Techniques


• Parity Bit: A simple method for error detection. It involves adding an additional bit
to a group of bits to make the total number of ones in the group either odd or even.
• Checksum: This technique involves generating a checksum value based on the data
being transmitted. The receiver also calculates the checksum and compares it to the
transmitted checksum.
• Cyclic Redundancy Check (CRC): CRC is a more robust and widely used error
detection technique. It uses polynomial division to generate a fixed-size checksum
which is appended to the data.
• Hamming Code: A type of error-correcting code that adds redundant bits to the data
to create a code word with specific properties. These redundant bits allow the receiver
to detect and correct single-bit errors
Parity Check and CRC
• Parity Check: Parity check is a simple method for error detection in data
transmission.
• The parity bit is set in such a way that the total number of ones in the group is either
even or odd
Two Types of Parity Checks
• Even Parity: The total number of ones, including the parity bit, is made even. So if
the number of ones in the original data is odd the parity bit is set to 1 otherwise it is
set to 0.

33
• Odd Parity: The total number of ones, including the parity bit, is made odd. If the
number of ones in the original data is even the parity bit is set to 1 otherwise it is set
to 0
Cyclic Redundancy Check (CRC)
• Cyclic Redundancy Check (CRC): CRC is a more robust error detection technique
commonly used in data communication and storage systems.
• The checksum is calculated using polynomial division

• The sender and receiver agree on a polynomial before transmission. This polynomial
is used to create the checksum at the sender's end which is then appended to the data
being sent.
Networking Devices
Networking devices are hardware components that play essential roles in the functioning and
management of computer networks.
These devices operate at different layers of the OSI (Open Systems Interconnection) model
each serving specific functions

Common Networking Devices


• Network Interface Card (NIC): The Network Interface Card, also known as a
network adapter or network interface controller (NIC), is a hardware component
installed in computers and other devices to connect them to a network.

34
Hub
• Hub: A hub is a basic networking device that operates at the physical layer (Layer 1)
of the OSI model.
• It is used to connect multiple devices within a local area network (LAN).
• Hubs are simple but inefficient devices, as they do not manage or control network
traffic, leading to collisions and reduced network performance

Switch
• Switch: A switch is a more intelligent device that operates at the data link layer
(Layer 2) of the OSI model.
• It connects multiple devices in a LAN and efficiently forwards data only to the
intended recipient.
• This reduces collisions and improves network performance

Router
• A router operates at the network layer (Layer 3) of the OSI model and is used to
connect multiple networks, such as LANs and Wide Area Networks (WANs).

35
• Routers are responsible for forwarding data between networks based on IP (Internet
Protocol) addresses.
• Network Address Translation (NAT) to enable private IP addresses in a LAN to
access the internet using a single public IP address

Wireless Access Point (WAP):


• A wireless access point (WAP) is a device that allows wireless devices to connect to a
wired network.
• It operates similarly to a hub or switch but provides wireless connectivity enabling
devices such as laptops, smartphones and tablets to access the network without
requiring physical cables

Modem
• A modem is a networking device used to connect computers and other digital devices
to the internet or other wide area networks.
• It converts digital data from a computer into analog signals suitable for transmission
over traditional telephone lines for transmission over cable lines

36
Firewall
• A firewall is a security device that helps protect a network from unauthorized access
and cyber threats.
• It filters incoming and outgoing network traffic based on predefined rules allowing or
blocking data packets as needed.
• Firewalls can be either hardware or software-based and are crucial for network
security

Repeater
• A repeater is a network device used to extend the reach and improve the signal
strength of data transmitted over a network.
• It operates at the physical layer OSI model and is commonly used in both wired and
wireless networks.

37
Signal Regeneration
• As data travels through a network medium it can suffer from signal degradation due to
factors like distance, interference, or environmental obstacles.
• This degradation leads to a weakening of the signal, which can result in errors and
data loss
Extending Network Range
• One of the primary purposes of using repeaters is to extend the range of a network the
strength of signals repeaters enable data to travel longer distances across the network
medium.
• This is especially useful in large-scale networks environments where the distance
between devices
Transparent Operation
• Repeaters are transparent devices, meaning they do not modify the data or headers of
the frames they receive.
• They operate at the physical layer, dealing with raw electrical signals, without any
knowledge of the network's higher-layer protocols.
Router
A router is a networking device that acts as an intermediary between multiple networks.
Its primary function is to forward data packets between different networks to enable
communication and data exchange.
Routers are essential components in computer networks including the internet

38
Types of Router
• Broadband Routers: These are one of the important kinds of routers. It is used to do
different types of things.
• Wireless routers: These routers are used to create a wireless signal in your office or
home.
• Edge Routers: As the name indicates these are located at the edges usually connected
• Core Routers: Core routers distribute packets within the same network.

Router Working

Key Features and Functions of a Router


• Packet Forwarding: Routers examine the destination address in data packets and
determine the best path for forwarding them to their intended destination.
• Network connectivity: Routers connect multiple devices and networks together
allowing them to communicate and share data.
• Network address translation (NAT): Many home routers use NAT to allow multiple
devices within a local network to share a single public IP address

Advantages of Router
• Easier Connection: Sharing a single network connection among numerous machines
is the router’s main job.
• Security: Undoubtedly installing a router is the first step in securing a network
connection.
• Supports Dynamic Routing: The router employs dynamic routing
• Filtering of Packets: Switching between packets and filtering packets are two more
router services

Disadvantages of Router
• Slower: Routers analyze multiple layers of information from the physical layer to
the network layer, which slows down connections.

39
• High Cost: They are more expensive than some other tools for systems
administration.
• Bandwidth shortages: Dynamic routing techniques used by routers to support
connections tend to cause network overhead
Gateway
• In networking a gateway is a network device software system that serves as an entry
point exit point between different networks.
• It acts as an interface or bridge that connects networks with different protocols
architectures communication methods.
• Gateways play a crucial role in enabling communication and data exchange between
diverse networks.

Types Of Gateways
• High Bandwidth Gateways
These Gateways are meant for a more complex and intelligent Internet of Things
• Low Bandwidth Gateway
These Gateways are really the best choice while choosing a simple smart object

Gateways Work
• The user end’s application made a request for a certain amount of data via its portal to
the gateway.

40
• The gateway sends this request for a password to the server.
• The server receives the request and search for the data type.
• The data is then sent to the smart door interface where it is matched with the data
entered for data type: “password”.

Gateways Functions
• Network Connectivity: The primary purpose of a gateway is to establish
connectivity between different networks.
• Internet Gateway: In home or small office environments, a gateway is commonly
referred to as an internet gateway.
• Cloud Gateways: With the rise of cloud computing cloud gateways have become
important components.
• IoT Gateways: In the context of the Internet of Things (IoT) gateways are used to
connect IoT devices to the internet or central servers.

41

You might also like